id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0805.3062 | Feng Xia | Feng Xia, Yu-Chu Tian, Youxian Sun, Jinxiang Dong | Neural Feedback Scheduling of Real-Time Control Tasks | To appear in International Journal of Innovative Computing,
Information and Control | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many embedded real-time control systems suffer from resource constraints and
dynamic workload variations. Although optimal feedback scheduling schemes are
in principle capable of maximizing the overall control performance of
multitasking control systems, most of them induce excessively large
computational overheads associated with the mathematical optimization routines
involved and hence are not directly applicable to practical systems. To
optimize the overall control performance while minimizing the overhead of
feedback scheduling, this paper proposes an efficient feedback scheduling
scheme based on feedforward neural networks. Using the optimal solutions
obtained offline by mathematical optimization methods, a back-propagation (BP)
neural network is designed to adapt online the sampling periods of concurrent
control tasks with respect to changes in computing resource availability.
Numerical simulation results show that the proposed scheme can reduce the
computational overhead significantly while delivering almost the same overall
control performance as compared to optimal feedback scheduling.
| [
{
"version": "v1",
"created": "Tue, 20 May 2008 12:31:52 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Tian",
"Yu-Chu",
""
],
[
"Sun",
"Youxian",
""
],
[
"Dong",
"Jinxiang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.3082 | Gusztav Morvai | G. Morvai, S. Yakowitz and P. Algoet | Weakly Convergent Nonparametric Forecasting of Stationary Time Series | null | IEEE Transactions on Information Theory Vol. 43, pp. 483-498, 1997 | 10.1109/18.556107 | null | math.ST cs.IT math.IT stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The conditional distribution of the next outcome given the infinite past of a
stationary process can be inferred from finite but growing segments of the
past. Several schemes are known for constructing pointwise consistent
estimates, but they all demand prohibitive amounts of input data. In this paper
we consider real-valued time series and construct conditional distribution
estimates that make much more efficient use of the input data. The estimates
are consistent in a weak sense, and the question whether they are pointwise
consistent is still open. For finite-alphabet processes one may rely on a
universal data compression scheme like the Lempel-Ziv algorithm to construct
conditional probability mass function estimates that are consistent in expected
information divergence. Consistency in this strong sense cannot be attained in
a universal sense for all stationary processes with values in an infinite
alphabet, but weak consistency can. Some applications of the estimates to
on-line forecasting, regression and classification are discussed.
| [
{
"version": "v1",
"created": "Tue, 20 May 2008 13:54:09 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Morvai",
"G.",
""
],
[
"Yakowitz",
"S.",
""
],
[
"Algoet",
"P.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0805.3091 | Gusztav Morvai | L. Gy\"orfi, G. Lugosi and G. Morvai | A simple randomized algorithm for sequential prediction of ergodic time
series | null | IEEE Trans. Inform. Theory 45 (1999), no. 7, 2642--2650 | null | null | math.ST cs.IT math.IT stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a simple randomized procedure for the prediction of a binary
sequence. The algorithm uses ideas from recent developments of the theory of
the prediction of individual sequences. We show that if the sequence is a
realization of a stationary and ergodic random process then the average number
of mistakes converges, almost surely, to that of the optimum, given by the
Bayes predictor. The desirable finite-sample properties of the predictor are
illustrated by its performance for Markov processes. In such cases the
predictor exhibits near optimal behavior even without knowing the order of the
Markov process. Prediction with side information is also considered.
| [
{
"version": "v1",
"created": "Tue, 20 May 2008 14:38:37 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Györfi",
"L.",
""
],
[
"Lugosi",
"G.",
""
],
[
"Morvai",
"G.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0805.3118 | Jian-Kang Zhang | Jian-Kang Zhang and Chau Yuen | Full Diversity Blind Signal Designs for Unique Identification of
Frequency Selective Channels | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we develop two kinds of novel closed-form decompositions on
phase shift keying (PSK) constellations by exploiting linear congruence
equation theory: the one for factorizing a $pq$-PSK constellation into a
product of a $p$-PSK constellation and a $q$-PSK constellation, and the other
for decomposing a specific complex number into a difference of a $p$-PSK
constellation and a $q$-PSK constellation. With this, we propose a simple
signal design technique to blindly and uniquely identify frequency selective
channels with zero-padded block transmission under noise-free environments by
only using the first two block received signal vectors. Furthermore, a
closed-form solution to determine the transmitted signals and the channel
coefficients is obtained. In the Gaussian noise and Rayleigh fading
environment, we prove that the newly proposed signaling scheme enables
non-coherent full diversity for the Generalized Likelihood Ratio Test (GLRT)
receiver.
| [
{
"version": "v1",
"created": "Tue, 20 May 2008 16:52:04 GMT"
}
] | 2008-05-21T00:00:00 | [
[
"Zhang",
"Jian-Kang",
""
],
[
"Yuen",
"Chau",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.3126 | Robert Burger PhD | J. R. Burger | Cognitive Architecture for Direction of Attention Founded on Subliminal
Memory Searches, Pseudorandom and Nonstop | 6 pages, 4 figures | null | null | null | cs.AI cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | By way of explaining how a brain works logically, human associative memory is
modeled with logical and memory neurons, corresponding to standard digital
circuits. The resulting cognitive architecture incorporates basic psychological
elements such as short term and long term memory. Novel to the architecture are
memory searches using cues chosen pseudorandomly from short term memory.
Recalls alternated with sensory images, many tens per second, are analyzed
subliminally as an ongoing process, to determine a direction of attention in
short term memory.
| [
{
"version": "v1",
"created": "Tue, 20 May 2008 17:37:31 GMT"
}
] | 2008-05-21T00:00:00 | [
[
"Burger",
"J. R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0805.3155 | Hamed Amini | Hamed Amini, Moez Draief and Marc Lelarge | Marketing in Random Networks | to appear NetCoop 2008 | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Viral marketing takes advantage of preexisting social networks among
customers to achieve large changes in behaviour. Models of influence spread
have been studied in a number of domains, including the effect of "word of
mouth" in the promotion of new products or the diffusion of technologies. A
social network can be represented by a graph where the nodes are individuals
and the edges indicate a form of social relationship. The flow of influence
through this network can be thought of as an increasing process of active
nodes: as individuals become aware of new technologies, they have the potential
to pass them on to their neighbours. The goal of marketing is to trigger a
large cascade of adoptions. In this paper, we develop a mathematical model that
allows to analyze the dynamics of the cascading sequence of nodes switching to
the new technology. To this end we describe a continuous-time and a
discrete-time models and analyse the proportion of nodes that adopt the new
technology over time.
| [
{
"version": "v1",
"created": "Wed, 21 May 2008 08:36:01 GMT"
},
{
"version": "v2",
"created": "Thu, 22 May 2008 14:48:58 GMT"
},
{
"version": "v3",
"created": "Sat, 24 May 2008 08:47:27 GMT"
},
{
"version": "v4",
"created": "Sun, 7 Sep 2008 13:39:14 GMT"
}
] | 2008-09-08T00:00:00 | [
[
"Amini",
"Hamed",
""
],
[
"Draief",
"Moez",
""
],
[
"Lelarge",
"Marc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0805.3164 | Rahul Vaze | Rahul Vaze and Robert W. Heath Jr | To Code or Not To Code in Multi-Hop Relay Channels | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-hop relay channels use multiple relay stages, each with multiple relay
nodes, to facilitate communication between a source and destination.
Previously, distributed space-time coding was used to maximize diversity gain.
Assuming a low-rate feedback link from the destination to each relay stage and
the source, this paper proposes end-to-end antenna selection strategies as an
alternative to distributed space-time coding. One-way (where only the source
has data for destination) and two-way (where the destination also has data for
the source) multi-hop relay channels are considered with both the full-duplex
and half duplex relay nodes. End-to-end antenna selection strategies are
designed and proven to achieve maximum diversity gain by using a single antenna
path (using single antenna of the source, each relay stage and the destination)
with the maximum signal-to-noise ratio at the destination. For the half-duplex
case, two single antenna paths with the two best signal-to-noise ratios in
alternate time slots are used to overcome the rate loss with half-duplex nodes,
with a small diversity gain penalty. Finally to answer the question, whether to
code (distributed space-time code) or not (the proposed end-to-end antenna
selection strategy) in a multi-hop relay channel, end-to-end antenna selection
strategy and distributed space-time coding is compared with respect to several
important performance metrics.
| [
{
"version": "v1",
"created": "Tue, 20 May 2008 20:23:18 GMT"
}
] | 2008-05-22T00:00:00 | [
[
"Vaze",
"Rahul",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.3196 | Jean-Philippe Auzelle | Fr\'ed\'eric Autran (CRAN), Jean-Philippe Auzelle (CRAN), Denise
Cattan (CRAN), Jean-Luc Garnier (CRAN), Dominique Luzeaux (DGA/CTA/DT/GIP),
Fr\'ed\'erique Mayer (ERPI), Marc Peyrichon (CRAN), Jean-Ren\'e Ruault
(DGA/CTA/DT/GIP) | Coupling Component Systems towards Systems of Systems | null | Dans CD ROM - 18th Annual International Symposium of INCOSE, 6th
Biennal European System Engineering Conference, INCOSE 2008, Utrecht :
Pays-Bas (2008) | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Systems of systems (SoS) are a hot topic in our "fully connected global
world". Our aim is not to provide another definition of what SoS are, but
rather to focus on the adequacy of reusing standard system architecting
techniques within this approach in order to improve performance, fault
detection and safety issues in large-scale coupled systems that definitely
qualify as SoS, whatever the definition is. A key issue will be to secure the
availability of the services provided by the SoS despite the evolution of the
various systems composing the SoS. We will also tackle contracting issues and
responsibility transfers, as they should be addressed to ensure the expected
behavior of the SoS whilst the various independently contracted systems evolve
asynchronously.
| [
{
"version": "v1",
"created": "Wed, 21 May 2008 05:02:22 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Autran",
"Frédéric",
"",
"CRAN"
],
[
"Auzelle",
"Jean-Philippe",
"",
"CRAN"
],
[
"Cattan",
"Denise",
"",
"CRAN"
],
[
"Garnier",
"Jean-Luc",
"",
"CRAN"
],
[
"Luzeaux",
"Dominique",
"",
"DGA/CTA/DT/GIP"
],
[
"Mayer",
"Frédérique",
"",
"ERPI"
],
[
"Peyrichon",
"Marc",
"",
"CRAN"
],
[
"Ruault",
"Jean-René",
"",
"DGA/CTA/DT/GIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.3200 | Chung Chan | Chung Chan | On Tightness of Mutual Dependence Upperbound for Secret-key Capacity of
Multiple Terminals | 5 pages. This is a concise version. See the first version for
detailed explanations and an illustration of the proof | null | null | null | cs.IT cs.CR math.CO math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Csiszar and Narayan[3] defined the notion of secret key capacity for multiple
terminals, characterized it as a linear program with Slepian-Wolf constraints
of the related source coding problem of communication for omniscience, and
upper bounded it by some information divergence expression from the joint to
the product distribution of the private observations. This paper proves that
the bound is tight for the important case when all users are active, using the
polymatroidal structure[6] underlying the source coding problem. When some
users are not active, the bound may not be tight. This paper gives a
counter-example in which 3 out of the 6 terminals are active.
| [
{
"version": "v1",
"created": "Wed, 21 May 2008 05:46:48 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jun 2008 17:09:30 GMT"
}
] | 2008-06-16T00:00:00 | [
[
"Chan",
"Chung",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0805.3206 | Oded Kafri | Oded Kafri | Sociological Inequality and the Second Law | 8 pages 1 Fig | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There are two fair ways to distribute particles in boxes. The first way is to
divide the particles equally between the boxes. The second way, which is
calculated here, is to score fairly the particles between the boxes. The
obtained power law distribution function yields an uneven distribution of
particles in boxes. It is shown that the obtained distribution fits well to
sociological phenomena, such as the distribution of votes in polls and the
distribution of wealth and Benford's law.
| [
{
"version": "v1",
"created": "Wed, 21 May 2008 07:09:34 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Jul 2008 14:04:04 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Feb 2009 07:36:45 GMT"
}
] | 2009-02-09T00:00:00 | [
[
"Kafri",
"Oded",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.3217 | Fran\c{c}ois Lecellier | Fran\c{c}ois Lecellier, St\'ephanie Jehan-Besson, Jalal Fadili, Gilles
Aubert, Marinette Revenu | Statistical region-based active contours with exponential family
observations | 4 pages, ICASSP 2006 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we focus on statistical region-based active contour models
where image features (e.g. intensity) are random variables whose distribution
belongs to some parametric family (e.g. exponential) rather than confining
ourselves to the special Gaussian case. Using shape derivation tools, our
effort focuses on constructing a general expression for the derivative of the
energy (with respect to a domain) and derive the corresponding evolution speed.
A general result is stated within the framework of multi-parameter exponential
family. More particularly, when using Maximum Likelihood estimators, the
evolution speed has a closed-form expression that depends simply on the
probability density function, while complicating additive terms appear when
using other estimators, e.g. moments method. Experimental results on both
synthesized and real images demonstrate the applicability of our approach.
| [
{
"version": "v1",
"created": "Wed, 21 May 2008 07:54:07 GMT"
}
] | 2008-05-22T00:00:00 | [
[
"Lecellier",
"François",
""
],
[
"Jehan-Besson",
"Stéphanie",
""
],
[
"Fadili",
"Jalal",
""
],
[
"Aubert",
"Gilles",
""
],
[
"Revenu",
"Marinette",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0805.3218 | Fran\c{c}ois Lecellier | Fran\c{c}ois Lecellier, St\'ephanie Jehan-Besson, Jalal Fadili, Gilles
Aubert, Marinette Revenu, Eric Saloux | Region-based active contour with noise and shape priors | 4 pages, ICIP 2006 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose to combine formally noise and shape priors in
region-based active contours. On the one hand, we use the general framework of
exponential family as a prior model for noise. On the other hand, translation
and scale invariant Legendre moments are considered to incorporate the shape
prior (e.g. fidelity to a reference shape). The combination of the two prior
terms in the active contour functional yields the final evolution equation
whose evolution speed is rigorously derived using shape derivative tools.
Experimental results on both synthetic images and real life cardiac echography
data clearly demonstrate the robustness to initialization and noise,
flexibility and large potential applicability of our segmentation algorithm.
| [
{
"version": "v1",
"created": "Wed, 21 May 2008 08:06:01 GMT"
}
] | 2008-05-22T00:00:00 | [
[
"Lecellier",
"François",
""
],
[
"Jehan-Besson",
"Stéphanie",
""
],
[
"Fadili",
"Jalal",
""
],
[
"Aubert",
"Gilles",
""
],
[
"Revenu",
"Marinette",
""
],
[
"Saloux",
"Eric",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0805.3237 | Sebastien Collette | S. Collette and L. Cucu and J. Goossens | Integrating Job Parallelism in Real-Time Scheduling Theory | null | null | null | null | cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the global scheduling of sporadic, implicit deadline,
real-time task systems on multiprocessor platforms. We provide a task model
which integrates job parallelism. We prove that the time-complexity of the
feasibility problem of these systems is linear relatively to the number of
(sporadic) tasks for a fixed number of processors. We propose a scheduling
algorithm theoretically optimal (i.e., preemptions and migrations neglected).
Moreover, we provide an exact feasibility utilization bound. Lastly, we propose
a technique to limit the number of migrations and preemptions.
| [
{
"version": "v1",
"created": "Wed, 21 May 2008 09:38:15 GMT"
}
] | 2008-05-22T00:00:00 | [
[
"Collette",
"S.",
""
],
[
"Cucu",
"L.",
""
],
[
"Goossens",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0805.3256 | Paulo Matos | Paulo J. Matos, Joao Marques-Silva | Model Checking Event-B by Encoding into Alloy | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As systems become ever more complex, verification becomes more main stream.
Event-B and Alloy are two formal specification languages based on fairly
different methodologies. While Event-B uses theorem provers to prove that
invariants hold for a given specification, Alloy uses a SAT-based model finder.
In some settings, Event-B invariants may not be proved automatically, and so
the often difficult step of interactive proof is required. One solution for
this problem is to validate invariants with model checking. This work studies
the encoding of Event-B machines and contexts to Alloy in order to perform
temporal model checking with Alloy's SAT-based engine.
| [
{
"version": "v1",
"created": "Wed, 21 May 2008 11:35:25 GMT"
},
{
"version": "v2",
"created": "Fri, 30 May 2008 09:28:43 GMT"
}
] | 2008-05-30T00:00:00 | [
[
"Matos",
"Paulo J.",
""
],
[
"Marques-Silva",
"Joao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.3261 | Simone Bova | Simone Bova | k-Hyperarc Consistency for Soft Constraints over Divisible Residuated
Lattices | 15 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the applicability of divisible residuated lattices (DRLs) as a
general evaluation framework for soft constraint satisfaction problems (soft
CSPs). DRLs are in fact natural candidates for this role, since they form the
algebraic semantics of a large family of substructural and fuzzy logics.
We present the following results. (i) We show that DRLs subsume important
valuation structures for soft constraints, such as commutative idempotent
semirings and fair valuation structures, in the sense that the last two are
members of certain subvarieties of DRLs (namely, Heyting algebras and
BL-algebras respectively). (ii) In the spirit of previous work of J. Larrosa
and T. Schiex [2004], and S. Bistarelli and F. Gadducci [2006] we describe a
polynomial-time algorithm that enforces k-hyperarc consistency on soft CSPs
evaluated over DRLs. Observed that, in general, DRLs are neither idempotent nor
totally ordered, this algorithm amounts to a generalization of the available
algorithms that enforce k-hyperarc consistency.
| [
{
"version": "v1",
"created": "Wed, 21 May 2008 11:54:51 GMT"
},
{
"version": "v2",
"created": "Thu, 22 May 2008 07:35:02 GMT"
}
] | 2008-05-22T00:00:00 | [
[
"Bova",
"Simone",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.3267 | Peter Tiedemann | Esben Rune Hansen, S. Srinivasa Rao, Peter Tiedemann | Compressing Binary Decision Diagrams | Full (tech-report) version of ECAI 2008 short paper | null | null | null | cs.AI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper introduces a new technique for compressing Binary Decision Diagrams
in those cases where random access is not required. Using this technique,
compression and decompression can be done in linear time in the size of the BDD
and compression will in many cases reduce the size of the BDD to 1-2 bits per
node. Empirical results for our compression technique are presented, including
comparisons with previously introduced techniques, showing that the new
technique dominate on all tested instances.
| [
{
"version": "v1",
"created": "Wed, 21 May 2008 12:44:23 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Hansen",
"Esben Rune",
""
],
[
"Rao",
"S. Srinivasa",
""
],
[
"Tiedemann",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.3339 | Daniel Lemire | Kamel Aouiche, Daniel Lemire, Owen Kaser | Tri de la table de faits et compression des index bitmaps avec
alignement sur les mots | to appear at BDA'08 | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bitmap indexes are frequently used to index multidimensional data. They rely
mostly on sequential input/output. Bitmaps can be compressed to reduce
input/output costs and minimize CPU usage. The most efficient compression
techniques are based on run-length encoding (RLE), such as Word-Aligned Hybrid
(WAH) compression. This type of compression accelerates logical operations
(AND, OR) over the bitmaps. However, run-length encoding is sensitive to the
order of the facts. Thus, we propose to sort the fact tables. We review
lexicographic, Gray-code, and block-wise sorting. We found that a lexicographic
sort improves compression--sometimes generating indexes twice as small--and
make indexes several times faster. While sorting takes time, this is partially
offset by the fact that it is faster to index a sorted table. Column order is
significant: it is generally preferable to put the columns having more distinct
values at the beginning. A block-wise sort is much less efficient than a full
sort. Moreover, we found that Gray-code sorting is not better than
lexicographic sorting when using word-aligned compression.
| [
{
"version": "v1",
"created": "Wed, 21 May 2008 19:50:46 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Jul 2008 23:46:51 GMT"
},
{
"version": "v3",
"created": "Fri, 15 Aug 2008 00:08:42 GMT"
}
] | 2008-08-15T00:00:00 | [
[
"Aouiche",
"Kamel",
""
],
[
"Lemire",
"Daniel",
""
],
[
"Kaser",
"Owen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0805.3366 | Fabian Steeg | Fabian Steeg, Christoph Benden, Paul O. Samuelsdorff | Computational Representation of Linguistic Structures using
Domain-Specific Languages | 12 pages, 9 figures; based on work presented at the 12th
International Conference on Functional Grammar | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a modular system for generating sentences from formal definitions
of underlying linguistic structures using domain-specific languages. The system
uses Java in general, Prolog for lexical entries and custom domain-specific
languages based on Functional Grammar and Functional Discourse Grammar
notation, implemented using the ANTLR parser generator. We show how linguistic
and technological parts can be brought together in a natural language
processing system and how domain-specific languages can be used as a tool for
consistent formal notation in linguistic description.
| [
{
"version": "v1",
"created": "Wed, 21 May 2008 23:44:06 GMT"
}
] | 2008-05-23T00:00:00 | [
[
"Steeg",
"Fabian",
""
],
[
"Benden",
"Christoph",
""
],
[
"Samuelsdorff",
"Paul O.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0805.3390 | Agus Budiyono PhD | J. Muliadi, S.D. Jenie, A. Budiyono | Design of Attitude Stability System for Prolate Dual-spin Satellite in
Its Inclined Elliptical Orbit | 20 pages, 42 figures | Symposium on Aerospace Science and Technology, Jakarta, 2005 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In general, most of communication satellites were designed to be operated in
geostationary orbit. And many of them were designed in prolate dual-spin
configuration. As a prolate dual-spin vehicle, they have to be stabilized
against their internal energy dissipation effect. Several countries that
located in southern hemisphere, has shown interest to use communication
satellite. Because of those countries southern latitude, an idea emerged to
incline the communication satellite (due to its prolate dualspin configuration)
in elliptical orbit. This work is focused on designing Attitude Stability
System for prolate dual-spin satellite in the effect of perturbed field of
gravity due to the inclination of its elliptical orbit. DANDE (De-spin Active
Nutation Damping Electronics) provides primary stabilization method for the
satellite in its orbit. Classical Control Approach is used for the iteration of
DANDE parameters. The control performance is evaluated based on time response
analysis.
| [
{
"version": "v1",
"created": "Thu, 22 May 2008 06:17:57 GMT"
}
] | 2008-05-23T00:00:00 | [
[
"Muliadi",
"J.",
""
],
[
"Jenie",
"S. D.",
""
],
[
"Budiyono",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0805.3406 | Kazutaka Nakamura | Kazutaka Nakamura | Performance Analysis of Signal Detection using Quantized Received
Signals of Linear Vector Channel | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Performance analysis of optimal signal detection using quantized received
signals of a linear vector channel, which is an extension of code-division
multiple-access (CDMA) or multiple-input multiple-output (MIMO) channels, in
the large system limit, is presented in this paper. Here the dimensions of
channel input and output are both sent to infinity while their ratio remains
fixed. An optimal detector is one that uses a true channel model, true
distribution of input signals, and perfect knowledge about quantization.
Applying replica method developed in statistical mechanics, we show that, in
the case of a noiseless channel, the optimal detector has perfect detection
ability under certain conditions, and that for a noisy channel its detection
ability decreases monotonically as the quantization step size increases.
| [
{
"version": "v1",
"created": "Thu, 22 May 2008 08:27:34 GMT"
}
] | 2008-05-23T00:00:00 | [
[
"Nakamura",
"Kazutaka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.3410 | Sylvain Pogodalla | Sylvain Pogodalla (INRIA Lorraine - LORIA) | Exploring a type-theoretic approach to accessibility constraint
modelling | null | Dans Journ\'ees S\'emantiques et Mod\'elisation (2008) | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The type-theoretic modelling of DRT that [degroote06] proposed features
continuations for the management of the context in which a clause has to be
interpreted. This approach, while keeping the standard definitions of
quantifier scope, translates the rules of the accessibility constraints of
discourse referents inside the semantic recipes. In this paper, we deal with
additional rules for these accessibility constraints. In particular in the case
of discourse referents introduced by proper nouns, that negation does not
block, and in the case of rhetorical relations that structure discourses. We
show how this continuation-based approach applies to those accessibility
constraints and how we can consider the parallel management of various
principles.
| [
{
"version": "v1",
"created": "Thu, 22 May 2008 08:48:28 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Pogodalla",
"Sylvain",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0805.3462 | Aniello Murano | Alessandro Ferrante, Aniello Murano and Mimmo Parente | Enriched MU-Calculi Module Checking | null | Logical Methods in Computer Science, Volume 4, Issue 3 (July 29,
2008) lmcs:829 | 10.2168/LMCS-4(3:1)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The model checking problem for open systems has been intensively studied in
the literature, for both finite-state (module checking) and infinite-state
(pushdown module checking) systems, with respect to Ctl and Ctl*. In this
paper, we further investigate this problem with respect to the \mu-calculus
enriched with nominals and graded modalities (hybrid graded Mu-calculus), in
both the finite-state and infinite-state settings. Using an automata-theoretic
approach, we show that hybrid graded \mu-calculus module checking is solvable
in exponential time, while hybrid graded \mu-calculus pushdown module checking
is solvable in double-exponential time. These results are also tight since they
match the known lower bounds for Ctl. We also investigate the module checking
problem with respect to the hybrid graded \mu-calculus enriched with inverse
programs (Fully enriched \mu-calculus): by showing a reduction from the domino
problem, we show its undecidability. We conclude with a short overview of the
model checking problem for the Fully enriched Mu-calculus and the fragments
obtained by dropping at least one of the additional constructs.
| [
{
"version": "v1",
"created": "Thu, 22 May 2008 13:29:44 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Jul 2008 21:53:41 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Ferrante",
"Alessandro",
""
],
[
"Murano",
"Aniello",
""
],
[
"Parente",
"Mimmo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.3484 | Heide Gluesing-Luerssen | Heide Gluesing-Luerssen, Gert Schneider | A MacWilliams Identity for Convolutional Codes: The General Case | 20 pages | null | null | null | cs.IT math.IT math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A MacWilliams Identity for convolutional codes will be established. It makes
use of the weight adjacency matrices of the code and its dual, based on state
space realizations (the controller canonical form) of the codes in question.
The MacWilliams Identity applies to various notions of duality appearing in the
literature on convolutional coding theory.
| [
{
"version": "v1",
"created": "Thu, 22 May 2008 15:06:50 GMT"
}
] | 2008-05-23T00:00:00 | [
[
"Gluesing-Luerssen",
"Heide",
""
],
[
"Schneider",
"Gert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0805.3518 | Gianluca Caminiti | Francesco Buccafurri and Gianluca Caminiti | Logic programming with social features | 49 pages, 0 figures, to appear in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In everyday life it happens that a person has to reason about what other
people think and how they behave, in order to achieve his goals. In other
words, an individual may be required to adapt his behaviour by reasoning about
the others' mental state. In this paper we focus on a knowledge representation
language derived from logic programming which both supports the representation
of mental states of individual communities and provides each with the
capability of reasoning about others' mental states and acting accordingly. The
proposed semantics is shown to be translatable into stable model semantics of
logic programs with aggregates.
| [
{
"version": "v1",
"created": "Thu, 22 May 2008 18:17:58 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Buccafurri",
"Francesco",
""
],
[
"Caminiti",
"Gianluca",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.3521 | Giorgi Japaridze | Giorgi Japaridze | Towards applied theories based on computability logic | To appear in 2010 in the Journal of Symbolic Logic | Journal of Symbolic Logic 75 (2010), pp. 565-601 | 10.2178/jsl/1268917495 | null | cs.LO cs.AI math.LO math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Computability logic (CL) (see http://www.cis.upenn.edu/~giorgi/cl.html) is a
recently launched program for redeveloping logic as a formal theory of
computability, as opposed to the formal theory of truth that logic has more
traditionally been. Formulas in it represent computational problems, "truth"
means existence of an algorithmic solution, and proofs encode such solutions.
Within the line of research devoted to finding axiomatizations for ever more
expressive fragments of CL, the present paper introduces a new deductive system
CL12 and proves its soundness and completeness with respect to the semantics of
CL. Conservatively extending classical predicate calculus and offering
considerable additional expressive and deductive power, CL12 presents a
reasonable, computationally meaningful, constructive alternative to classical
logic as a basis for applied theories. To obtain a model example of such
theories, this paper rebuilds the traditional, classical-logic-based Peano
arithmetic into a computability-logic-based counterpart. Among the purposes of
the present contribution is to provide a starting point for what, as the author
wishes to hope, might become a new line of research with a potential of
interesting findings -- an exploration of the presumably quite unusual
metatheory of CL-based arithmetic and other CL-based applied systems.
| [
{
"version": "v1",
"created": "Thu, 22 May 2008 18:18:02 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Jun 2009 15:10:26 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Jul 2009 18:09:22 GMT"
},
{
"version": "v4",
"created": "Tue, 17 Nov 2009 04:49:51 GMT"
}
] | 2011-04-15T00:00:00 | [
[
"Japaridze",
"Giorgi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
0805.3528 | Natalia Silberstein | Natalia Silberstein | Coding Theory and Projective Spaces | This is a PhD thesis performed at the Technion by Natalia Silberstein
and supervised by Prof. Tuvi Etzion | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The projective space of order $n$ over a finite field $\F_q$ is a set of all
subspaces of the vector space $\F_q^{n}$. In this work, we consider
error-correcting codes in the projective space, focusing mainly on constant
dimension codes. We start with the different representations of subspaces in
the projective space. These representations involve matrices in reduced row
echelon form, associated binary vectors, and Ferrers diagrams. Based on these
representations, we provide a new formula for the computation of the distance
between any two subspaces in the projective space. We examine lifted maximum
rank distance (MRD) codes, which are nearly optimal constant dimension codes.
We prove that a lifted MRD code can be represented in such a way that it forms
a block design known as a transversal design. The incidence matrix of the
transversal design derived from a lifted MRD code can be viewed as a
parity-check matrix of a linear code in the Hamming space. We find the
properties of these codes which can be viewed also as LDPC codes. We present
new bounds and constructions for constant dimension codes. First, we present a
multilevel construction for constant dimension codes, which can be viewed as a
generalization of a lifted MRD codes construction. This construction is based
on a new type of rank-metric codes, called Ferrers diagram rank-metric codes.
Then we derive upper bounds on the size of constant dimension codes which
contain the lifted MRD code, and provide a construction for two families of
codes, that attain these upper bounds. We generalize the well-known concept of
a punctured code for a code in the projective space to obtain large codes which
are not constant dimension. We present efficient enumerative encoding and
decoding techniques for the Grassmannian. Finally we describe a search method
for constant dimension lexicodes.
| [
{
"version": "v1",
"created": "Thu, 22 May 2008 19:37:57 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Sep 2011 19:14:17 GMT"
}
] | 2011-09-09T00:00:00 | [
[
"Silberstein",
"Natalia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.3537 | Bernardo Huberman | Fang Wu and Bernardo A. Huberman | Public Discourse in the Web Does Not Exhibit Group Polarization | null | null | null | null | cs.CY | http://creativecommons.org/licenses/by/3.0/ | We performed a massive study of the dynamics of group deliberation among
several websites containing millions of opinions on topics ranging from books
to media. Contrary to the common phenomenon of group polarization observed
offline, we measured a strong tendency towards moderate views in the course of
time. This phenomenon possibly operates through a self-selection bias whereby
previous comments and ratings elicit contrarian views that soften the previous
opinions.
| [
{
"version": "v1",
"created": "Thu, 22 May 2008 20:28:37 GMT"
}
] | 2008-05-26T00:00:00 | [
[
"Wu",
"Fang",
""
],
[
"Huberman",
"Bernardo A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0805.3538 | Wojciech Mazurczyk | Wojciech Mazurczyk and Krzysztof Szczypiorski | Covert Channels in SIP for VoIP signalling | 8 pages, 4 figures | null | 10.1007/978-3-540-69403-8_9 | null | cs.MM cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we evaluate available steganographic techniques for SIP
(Session Initiation Protocol) that can be used for creating covert channels
during signaling phase of VoIP (Voice over IP) call. Apart from characterizing
existing steganographic methods we provide new insights by introducing new
techniques. We also estimate amount of data that can be transferred in
signalling messages for typical IP telephony call.
| [
{
"version": "v1",
"created": "Thu, 22 May 2008 20:43:38 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Szczypiorski",
"Krzysztof",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0805.3569 | Ben Liang | Sam Vakil and Ben Liang | Joint Cooperation and Multi-Hopping Increase the Capacity of Wireless
Networks | 11 pages; preliminary version in IEEE SECON 2008 | null | null | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of communication among nodes in an \emph{extended network} is
considered, where radio power decay and interference are limiting factors. It
has been shown previously that, with simple multi-hopping, the achievable total
communication rate in such a network is at most $\Theta(\sqrt{N})$. In this
work, we study the benefit of node cooperation in conjunction with
multi-hopping on the network capacity. We propose a multi-phase communication
scheme, combining distributed MIMO transmission with multi-hop forwarding among
clusters of nodes. We derive the network throughput of this communication
scheme and determine the optimal cluster size. This provides a constructive
lower bound on the network capacity. We first show that in \textit{regular
networks} a rate of $\omega(N^{{2/3}})$ can be achieved with transmission power
scaling of $\Theta(N^{\frac{\alpha}{6}-{1/3}})$, where $\alpha>2$ is the signal
path-loss exponent. We further extend this result to \textit{random networks},
where we show a rate of $\omega (N^{2/3}(\log{N})^{(2-\alpha)/6})$ can be
achieved with transmission power scaling of
$\Theta(N^{\alpha/6-1/3}(\log{N})^{-(\alpha-2)^2/6})$ in a random network with
unit node density. In particular, as $\alpha$ approaches 2, only constant
transmission power is required. Finally, we study a random network with density
$\lambda=\Omega(\log{N})$ and show that a rate of $\omega((\lambda N)^{2/3})$
is achieved and the required power scales as
$\Theta(N^{\alpha/6-1/3}/\lambda^{\alpha/3-2/3})$.
| [
{
"version": "v1",
"created": "Fri, 23 May 2008 03:33:50 GMT"
}
] | 2008-05-26T00:00:00 | [
[
"Vakil",
"Sam",
""
],
[
"Liang",
"Ben",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.3605 | Chung Chan | Chung Chan | Success Exponent of Wiretapper: A Tradeoff between Secrecy and
Reliability | 16 pages, 10 figures | null | null | null | cs.IT cs.CR math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Equivocation rate has been widely used as an information-theoretic measure of
security after Shannon[10]. It simplifies problems by removing the effect of
atypical behavior from the system. In [9], however, Merhav and Arikan
considered the alternative of using guessing exponent to analyze the Shannon's
cipher system. Because guessing exponent captures the atypical behavior, the
strongest expressible notion of secrecy requires the more stringent condition
that the size of the key, instead of its entropy rate, to be equal to the size
of the message. The relationship between equivocation and guessing exponent are
also investigated in [6][7] but it is unclear which is a better measure, and
whether there is a unifying measure of security.
Instead of using equivocation rate or guessing exponent, we study the wiretap
channel in [2] using the success exponent, defined as the exponent of a
wiretapper successfully learn the secret after making an exponential number of
guesses to a sequential verifier that gives yes/no answer to each guess. By
extending the coding scheme in [2][5] and the converse proof in [4] with the
new Overlap Lemma 5.2, we obtain a tradeoff between secrecy and reliability
expressed in terms of lower bounds on the error and success exponents of
authorized and respectively unauthorized decoding of the transmitted messages.
From this, we obtain an inner bound to the region of strongly achievable
public, private and guessing rate triples for which the exponents are strictly
positive. The closure of this region is equivalent to the closure of the region
in Theorem 1 of [2] when we treat equivocation rate as the guessing rate.
However, it is unclear if the inner bound is tight.
| [
{
"version": "v1",
"created": "Fri, 23 May 2008 10:45:12 GMT"
},
{
"version": "v2",
"created": "Sun, 25 May 2008 23:51:08 GMT"
},
{
"version": "v3",
"created": "Wed, 28 May 2008 00:21:54 GMT"
},
{
"version": "v4",
"created": "Sat, 31 May 2008 21:10:55 GMT"
}
] | 2008-06-01T00:00:00 | [
[
"Chan",
"Chung",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0805.3638 | Emanuele Grossi | Emanuele Grossi, Marco Lops | Sequential detection of Markov targets with trajectory estimation | To be published on IEEE Transaction on Information Theory. Part of
this work will be presented at the IEEE International Symposium on
Information Theory (ISIT'08), Toronto | IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER
2008 | 10.1109/TIT.2008.928261 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of detection and possible estimation of a signal generated by a
dynamic system when a variable number of noisy measurements can be taken is
here considered. Assuming a Markov evolution of the system (in particular, the
pair signal-observation forms a hidden Markov model), a sequential procedure is
proposed, wherein the detection part is a sequential probability ratio test
(SPRT) and the estimation part relies upon a maximum-a-posteriori (MAP)
criterion, gated by the detection stage (the parameter to be estimated is the
trajectory of the state evolution of the system itself). A thorough analysis of
the asymptotic behaviour of the test in this new scenario is given, and
sufficient conditions for its asymptotic optimality are stated, i.e. for almost
sure minimization of the stopping time and for (first-order) minimization of
any moment of its distribution. An application to radar surveillance problems
is also examined.
| [
{
"version": "v1",
"created": "Fri, 23 May 2008 13:18:43 GMT"
}
] | 2022-05-12T00:00:00 | [
[
"Grossi",
"Emanuele",
""
],
[
"Lops",
"Marco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.3643 | Richard Demo Souza | Ricardo Carvalho Pereira, Richard Demo Souza, Marcelo Eduardo Pellenz | Overlay Cognitive Radio in Wireless Mesh Networks | 12 pages, 8 figures, 2 tables | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we apply the concept of overlay cognitive radio to the
communication between nodes in a wireless mesh network. Based on the overlay
cognitive radio model, it is possible to have two concurrent transmissions in a
given interference region, where usually only one communication takes place at
a given time. We analyze the cases of wireless mesh networks with regular and
random topologies. Numerical results show that considerable network capacity
gains can be achieved.
| [
{
"version": "v1",
"created": "Fri, 23 May 2008 14:01:51 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Pereira",
"Ricardo Carvalho",
""
],
[
"Souza",
"Richard Demo",
""
],
[
"Pellenz",
"Marcelo Eduardo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.3742 | Henrik B\"a\"arnhielm | Henrik B\"a\"arnhielm | Algorithmic problems in twisted groups of Lie type | The author's PhD thesis | null | null | null | math.GR cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This thesis contains a collection of algorithms for working with the twisted
groups of Lie type known as Suzuki groups, and small and large Ree groups. The
two main problems under consideration are constructive recognition and
constructive membership testing. We also consider problems of generating and
conjugating Sylow and maximal subgroups. The algorithms are motivated by, and
form a part of, the Matrix Group Recognition Project. Obtaining both
theoretically and practically efficient algorithms has been a central goal. The
algorithms have been developed with, and implemented in, the computer algebra
system MAGMA.
| [
{
"version": "v1",
"created": "Sat, 24 May 2008 04:21:29 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Jun 2008 10:34:21 GMT"
}
] | 2008-06-08T00:00:00 | [
[
"Bäärnhielm",
"Henrik",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0805.3747 | Anon Plangprasopchok | Anon Plangprasopchok and Kristina Lerman | Constructing Folksonomies from User-specified Relations on Flickr | 14 Pages, Submitted to the Workshop on Web Mining and Web Usage
Analysis (WebKDD 2008) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many social Web sites allow users to publish content and annotate with
descriptive metadata. In addition to flat tags, some social Web sites have
recently began to allow users to organize their content and metadata
hierarchically. The social photosharing site Flickr, for example, allows users
to group related photos in sets, and related sets in collections. The social
bookmarking site Del.icio.us similarly lets users group related tags into
bundles. Although the sites themselves don't impose any constraints on how
these hierarchies are used, individuals generally use them to capture
relationships between concepts, most commonly the broader/narrower relations.
Collective annotation of content with hierarchical relations may lead to an
emergent classification system, called a folksonomy. While some researchers
have explored using tags as evidence for learning folksonomies, we believe that
hierarchical relations described above offer a high-quality source of evidence
for this task.
We propose a simple approach to aggregate shallow hierarchies created by many
distinct Flickr users into a common folksonomy. Our approach uses statistics to
determine if a particular relation should be retained or discarded. The
relations are then woven together into larger hierarchies. Although we have not
carried out a detailed quantitative evaluation of the approach, it looks very
promising since it generates very reasonable, non-trivial hierarchies.
| [
{
"version": "v1",
"created": "Sat, 24 May 2008 07:02:24 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Plangprasopchok",
"Anon",
""
],
[
"Lerman",
"Kristina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.3799 | Fionn Murtagh | Fionn Murtagh, Adam Ganz and Stewart McKie | The Structure of Narrative: the Case of Film Scripts | 28 pages, 7 figures, 21 references | Pattern Recognition, 42 (2), 302-312, 2009 | 10.1016/j.patcog.2008.05.026 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the style and structure of story narrative using the case of film
scripts. The practical importance of this is noted, especially the need to have
support tools for television movie writing. We use the Casablanca film script,
and scripts from six episodes of CSI (Crime Scene Investigation). For analysis
of style and structure, we quantify various central perspectives discussed in
McKee's book, "Story: Substance, Structure, Style, and the Principles of
Screenwriting". Film scripts offer a useful point of departure for exploration
of the analysis of more general narratives. Our methodology, using
Correspondence Analysis, and hierarchical clustering, is innovative in a range
of areas that we discuss. In particular this work is groundbreaking in taking
the qualitative analysis of McKee and grounding this analysis in a quantitative
and algorithmic framework.
| [
{
"version": "v1",
"created": "Sat, 24 May 2008 23:35:15 GMT"
}
] | 2011-01-11T00:00:00 | [
[
"Murtagh",
"Fionn",
""
],
[
"Ganz",
"Adam",
""
],
[
"McKie",
"Stewart",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.3800 | Vitaly Schetinin | Vitaly Schetinin, Dayou Li, Carsten Maple | An Evolutionary-Based Approach to Learning Multiple Decision Models from
Underrepresented Data | 5 pages, 3 figures, 2 tables, The 4 th International Conference on
Natural Computation (ICNC'08) | null | null | null | cs.AI cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The use of multiple Decision Models (DMs) enables to enhance the accuracy in
decisions and at the same time allows users to evaluate the confidence in
decision making. In this paper we explore the ability of multiple DMs to learn
from a small amount of verified data. This becomes important when data samples
are difficult to collect and verify. We propose an evolutionary-based approach
to solving this problem. The proposed technique is examined on a few clinical
problems presented by a small amount of data.
| [
{
"version": "v1",
"created": "Sat, 24 May 2008 23:37:51 GMT"
}
] | 2008-05-27T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
],
[
"Li",
"Dayou",
""
],
[
"Maple",
"Carsten",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0805.3802 | Vitaly Schetinin | L. Jakaite and V. Schetinin | Feature Selection for Bayesian Evaluation of Trauma Death Risk | 4 pages, 14th Nordic Baltic Conference on Biomedical Engineering and
Medical Physics | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the last year more than 70,000 people have been brought to the UK
hospitals with serious injuries. Each time a clinician has to urgently take a
patient through a screening procedure to make a reliable decision on the trauma
treatment. Typically, such procedure comprises around 20 tests; however the
condition of a trauma patient remains very difficult to be tested properly.
What happens if these tests are ambiguously interpreted, and information about
the severity of the injury will come misleading? The mistake in a decision can
be fatal: using a mild treatment can put a patient at risk of dying from
posttraumatic shock, while using an overtreatment can also cause death. How can
we reduce the risk of the death caused by unreliable decisions? It has been
shown that probabilistic reasoning, based on the Bayesian methodology of
averaging over decision models, allows clinicians to evaluate the uncertainty
in decision making. Based on this methodology, in this paper we aim at
selecting the most important screening tests, keeping a high performance. We
assume that the probabilistic reasoning within the Bayesian methodology allows
us to discover new relationships between the screening tests and uncertainty in
decisions. In practice, selection of the most informative tests can also reduce
the cost of a screening procedure in trauma care centers. In our experiments we
use the UK Trauma data to compare the efficiency of the proposed technique in
terms of the performance. We also compare the uncertainty in decisions in terms
of entropy.
| [
{
"version": "v1",
"created": "Sun, 25 May 2008 00:06:29 GMT"
}
] | 2008-05-27T00:00:00 | [
[
"Jakaite",
"L.",
""
],
[
"Schetinin",
"V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.3824 | Danilo Silva | Danilo Silva and Frank R. Kschischang | On Metrics for Error Correction in Network Coding | 28 pages, 1 figure, to be published at IEEE Transactions on
Information Theory | IEEE Transactions on Information Theory, vol. 55, no. 12, pp.
5479-5490, Dec. 2009 | 10.1109/TIT.2009.2032817 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of error correction in both coherent and noncoherent network
coding is considered under an adversarial model. For coherent network coding,
where knowledge of the network topology and network code is assumed at the
source and destination nodes, the error correction capability of an (outer)
code is succinctly described by the rank metric; as a consequence, it is shown
that universal network error correcting codes achieving the Singleton bound can
be easily constructed and efficiently decoded. For noncoherent network coding,
where knowledge of the network topology and network code is not assumed, the
error correction capability of a (subspace) code is given exactly by a new
metric, called the injection metric, which is closely related to, but different
than, the subspace metric of K\"otter and Kschischang. In particular, in the
case of a non-constant-dimension code, the decoder associated with the
injection metric is shown to correct more errors then a
minimum-subspace-distance decoder. All of these results are based on a general
approach to adversarial error correction, which could be useful for other
adversarial channels beyond network coding.
| [
{
"version": "v1",
"created": "Sun, 25 May 2008 13:23:54 GMT"
},
{
"version": "v2",
"created": "Sun, 18 Jan 2009 19:15:44 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Jul 2009 01:46:52 GMT"
},
{
"version": "v4",
"created": "Fri, 28 Aug 2009 17:29:00 GMT"
}
] | 2019-05-07T00:00:00 | [
[
"Silva",
"Danilo",
""
],
[
"Kschischang",
"Frank R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.3858 | An-Ping Li | An-Ping Li | A New Type of Cipher: DICING_csb | There is a new variant added in the section 5 | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we will propose a new type of cipher named DICING_csb, which
is derived from our previous stream cipher DICING. It has applied a stream of
subkey and an encryption form of block ciphers, so it may be viewed as a
combinative of stream cipher and block cipher. Hence, the new type of cipher
has fast rate like a stream cipher and need no MAC.
| [
{
"version": "v1",
"created": "Mon, 26 May 2008 02:09:32 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Jun 2008 01:13:20 GMT"
}
] | 2009-03-21T00:00:00 | [
[
"Li",
"An-Ping",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0805.3897 | Harmen L.A. van der Spek | H.L.A. van der Spek, E.M. Bakker, H.A.G. Wijshoff | SPARK00: A Benchmark Package for the Compiler Evaluation of
Irregular/Sparse Codes | null | null | null | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a set of benchmarks that specifically targets a major cause of
performance degradation in high performance computing platforms: irregular
access patterns. These benchmarks are meant to be used to asses the performance
of optimizing compilers on codes with a varying degree of irregular access. The
irregularity caused by the use of pointers and indirection arrays are a major
challenge for optimizing compilers. Codes containing such patterns are
notoriously hard to optimize but they have a huge impact on the performance of
modern architectures, which are under-utilized when encountering irregular
memory accesses. In this paper, a set of benchmarks is described that
explicitly measures the performance of kernels containing a variety of
different access patterns found in real world applications. By offering a
varying degree of complexity, we provide a platform for measuring the
effectiveness of transformations. The difference in complexity stems from a
difference in traversal patterns, the use of multiple indirections and control
flow statements. The kernels used cover a variety of different access patterns,
namely pointer traversals, indirection arrays, dynamic loop bounds and run-time
dependent if-conditions. The kernels are small enough to be fully understood
which makes this benchmark set very suitable for the evaluation of
restructuring transformations.
| [
{
"version": "v1",
"created": "Mon, 26 May 2008 08:58:16 GMT"
}
] | 2008-05-27T00:00:00 | [
[
"van der Spek",
"H. L. A.",
""
],
[
"Bakker",
"E. M.",
""
],
[
"Wijshoff",
"H. A. G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0805.3901 | Gregory Gutin | Gregory Gutin and Eun Jung Kim | Properly Coloured Cycles and Paths: Results and Open Problems | null | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider a number of results and seven conjectures on
properly edge-coloured (PC) paths and cycles in edge-coloured multigraphs. We
overview some known results and prove new ones. In particular, we consider a
family of transformations of an edge-coloured multigraph $G$ into an ordinary
graph that allow us to check the existence PC cycles and PC $(s,t)$-paths in
$G$ and, if they exist, to find shortest ones among them. We raise a problem of
finding the optimal transformation and consider a possible solution to the
problem.
| [
{
"version": "v1",
"created": "Mon, 26 May 2008 09:17:21 GMT"
},
{
"version": "v2",
"created": "Fri, 30 May 2008 14:33:10 GMT"
},
{
"version": "v3",
"created": "Sat, 31 May 2008 07:48:28 GMT"
}
] | 2008-05-31T00:00:00 | [
[
"Gutin",
"Gregory",
""
],
[
"Kim",
"Eun Jung",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0805.3935 | Arnaud Martin | Arnaud Martin (E3I2) | Fusion for Evaluation of Image Classification in Uncertain Environments | null | Dans Proceeding of the 9th International Conference on Information
Fusion - Information Fusion, Florence : Italie (2006) | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present in this article a new evaluation method for classification and
segmentation of textured images in uncertain environments. In uncertain
environments, real classes and boundaries are known with only a partial
certainty given by the experts. Most of the time, in many presented papers,
only classification or only segmentation are considered and evaluated. Here, we
propose to take into account both the classification and segmentation results
according to the certainty given by the experts. We present the results of this
method on a fusion of classifiers of sonar images for a seabed
characterization.
| [
{
"version": "v1",
"created": "Mon, 26 May 2008 11:50:25 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Martin",
"Arnaud",
"",
"E3I2"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.3939 | Arnaud Martin | Arnaud Martin (E3I2), Isabelle Quidu (E3I2) | Decision Support with Belief Functions Theory for Seabed
Characterization | null | Dans Proceeding of the 11th International Conference on
Information Fusion - International Conference on Information Fusion, Cologne
: Allemagne (2008) | null | null | cs.AI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The seabed characterization from sonar images is a very hard task because of
the produced data and the unknown environment, even for an human expert. In
this work we propose an original approach in order to combine binary
classifiers arising from different kinds of strategies such as one-versus-one
or one-versus-rest, usually used in the SVM-classification. The decision
functions coming from these binary classifiers are interpreted in terms of
belief functions in order to combine these functions with one of the numerous
operators of the belief functions theory. Moreover, this interpretation of the
decision function allows us to propose a process of decisions by taking into
account the rejected observations too far removed from the learning data, and
the imprecise decisions given in unions of classes. This new approach is
illustrated and evaluated with a SVM in order to classify the different kinds
of sediment on image sonar.
| [
{
"version": "v1",
"created": "Mon, 26 May 2008 11:55:55 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Martin",
"Arnaud",
"",
"E3I2"
],
[
"Quidu",
"Isabelle",
"",
"E3I2"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.3964 | Fabricio Martins Lopes | Fabricio Martins Lopes, David Correa Martins-Jr and Roberto M.
Cesar-Jr | DimReduction - Interactive Graphic Environment for Dimensionality
Reduction | 13 pages, 4 figures, site http://code.google.com/p/dimreduction/ | BMC Bioinformatics 2008, 9:451 | 10.1186/1471-2105-9-451 | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | Feature selection is a pattern recognition approach to choose important
variables according to some criteria to distinguish or explain certain
phenomena. There are many genomic and proteomic applications which rely on
feature selection to answer questions such as: selecting signature genes which
are informative about some biological state, e.g. normal tissues and several
types of cancer; or defining a network of prediction or inference among
elements such as genes, proteins, external stimuli and other elements of
interest. In these applications, a recurrent problem is the lack of samples to
perform an adequate estimate of the joint probabilities between element states.
A myriad of feature selection algorithms and criterion functions are proposed,
although it is difficult to point the best solution in general. The intent of
this work is to provide an open-source multiplataform graphical environment to
apply, test and compare many feature selection approaches suitable to be used
in bioinformatics problems.
| [
{
"version": "v1",
"created": "Mon, 26 May 2008 14:16:06 GMT"
},
{
"version": "v2",
"created": "Sun, 15 May 2011 18:57:54 GMT"
}
] | 2011-06-13T00:00:00 | [
[
"Lopes",
"Fabricio Martins",
""
],
[
"Martins-Jr",
"David Correa",
""
],
[
"Cesar-Jr",
"Roberto M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0805.3972 | Yoshiharu Maeno | Yoshiharu Maeno, and Yukio Ohsawa | Intuitive visualization of the intelligence for the run-down of
terrorist wire-pullers | 10 pages, and 2 figures | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The investigation of the terrorist attack is a time-critical task. The
investigators have a limited time window to diagnose the organizational
background of the terrorists, to run down and arrest the wire-pullers, and to
take an action to prevent or eradicate the terrorist attack. The intuitive
interface to visualize the intelligence data set stimulates the investigators'
experience and knowledge, and aids them in decision-making for an immediately
effective action. This paper presents a computational method to analyze the
intelligence data set on the collective actions of the perpetrators of the
attack, and to visualize it into the form of a social network diagram which
predicts the positions where the wire-pullers conceals themselves.
| [
{
"version": "v1",
"created": "Mon, 26 May 2008 14:28:28 GMT"
},
{
"version": "v2",
"created": "Wed, 28 May 2008 14:25:57 GMT"
}
] | 2008-05-28T00:00:00 | [
[
"Maeno",
"Yoshiharu",
""
],
[
"Ohsawa",
"Yukio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.4007 | Mikl\'os Pint\'er | Miklos Pinter | Every hierarchy of beliefs is a type | 19 pages | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When modeling game situations of incomplete information one usually considers
the players' hierarchies of beliefs, a source of all sorts of complications.
Hars\'anyi (1967-68)'s idea henceforth referred to as the "Hars\'anyi program"
is that hierarchies of beliefs can be replaced by "types". The types constitute
the "type space". In the purely measurable framework Heifetz and Samet (1998)
formalize the concept of type spaces and prove the existence and the uniqueness
of a universal type space. Meier (2001) shows that the purely measurable
universal type space is complete, i.e., it is a consistent object. With the aim
of adding the finishing touch to these results, we will prove in this paper
that in the purely measurable framework every hierarchy of beliefs can be
represented by a unique element of the complete universal type space.
| [
{
"version": "v1",
"created": "Mon, 26 May 2008 19:43:18 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Sep 2008 09:10:04 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Jan 2012 10:55:23 GMT"
}
] | 2012-01-06T00:00:00 | [
[
"Pinter",
"Miklos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0805.4020 | Raissa M. D'Souza | Raissa M. D'Souza and Soumen Roy | Network Growth with Feedback | 4 pages, 4 figures | Phys. Rev. E 78, 045101(R) (2008) (Rapid Comm.) | 10.1103/PhysRevE.78.045101 | null | physics.soc-ph cond-mat.stat-mech cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing models of network growth typically have one or two parameters or
strategies which are fixed for all times. We introduce a general framework
where feedback on the current state of a network is used to dynamically alter
the values of such parameters. A specific model is analyzed where limited
resources are shared amongst arriving nodes, all vying to connect close to the
root. We show that tunable feedback leads to growth of larger, more efficient
networks. Exact results show that linear scaling of resources with system size
yields crossover to a trivial condensed state, which can be considerably
delayed with sublinear scaling.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 17:55:56 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Jan 2009 20:54:34 GMT"
},
{
"version": "v3",
"created": "Wed, 7 Jan 2009 21:05:28 GMT"
}
] | 2009-01-07T00:00:00 | [
[
"D'Souza",
"Raissa M.",
""
],
[
"Roy",
"Soumen",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0805.4023 | Mahmoud Taherzadeh | Mahmoud Taherzadeh and Amir K. Khandani | Robust Joint Source-Channel Coding for Delay-Limited Applications | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider the problem of robust joint source-channel coding
over an additive white Gaussian noise channel. We propose a new scheme which
achieves the optimal slope of the signal-to-distortion (SDR) curve (unlike the
previously known coding schemes). Also, we propose a family of robust codes
which together maintain a bounded gap with the optimum SDR curve (in terms of
dB). To show the importance of this result, we drive some theoretical bounds on
the asymptotic performance of delay-limited hybrid digital-analog (HDA) coding
schemes. We show that, unlike the delay-unlimited case, for any family of
delay-limited HDA codes, the asymptotic performance loss is unbounded (in terms
of dB).
| [
{
"version": "v1",
"created": "Mon, 26 May 2008 23:33:10 GMT"
}
] | 2008-05-28T00:00:00 | [
[
"Taherzadeh",
"Mahmoud",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4029 | Avik Chaudhuri | Avik Chaudhuri | Event Synchronization by Lightweight Message Passing | null | null | null | null | cs.PL cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Concurrent ML's events and event combinators facilitate modular concurrent
programming with first-class synchronization abstractions. A standard
implementation of these abstractions relies on fairly complex manipulations of
first-class continuations in the underlying language. In this paper, we present
a lightweight implementation of these abstractions in Concurrent Haskell, a
language that already provides first-order message passing. At the heart of our
implementation is a new distributed synchronization protocol. In contrast with
several previous translations of event abstractions in concurrent languages, we
remain faithful to the standard semantics for events and event combinators; for
example, we retain the symmetry of $\mathtt{choose}$ for expressing selective
communication.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 01:31:05 GMT"
}
] | 2008-05-28T00:00:00 | [
[
"Chaudhuri",
"Avik",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.4049 | Zhi Xu | Zhi Xu, J. Shallit | An NP-hardness Result on the Monoid Frobenius Problem | 2 pages, working paper; an error in Problem 5 is corrected | null | null | null | cs.DM cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The following problem is NP-hard: given a regular expression $E$, decide if
$E^*$ is not co-finite.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 16:18:19 GMT"
},
{
"version": "v2",
"created": "Tue, 27 May 2008 22:51:22 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Jun 2008 15:00:26 GMT"
}
] | 2008-06-30T00:00:00 | [
[
"Xu",
"Zhi",
""
],
[
"Shallit",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.4053 | Roy Timo | R. Timo, A. Grant, T. Chan and G. Kramer | Source Coding for a Simple Network with Receiver Side Information | To be presented at the 2008 International Symposium on Information
Theory (ISIT), Toronto, Canada | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of source coding with receiver side information for
the simple network proposed by R. Gray and A. Wyner in 1974. In this network, a
transmitter must reliably transport the output of two correlated information
sources to two receivers using three noiseless channels: a public channel which
connects the transmitter to both receivers, and two private channels which
connect the transmitter directly to each receiver. We extend Gray and Wyner's
original problem by permitting side information to be present at each receiver.
We derive inner and outer bounds for the achievable rate region and, for three
special cases, we show that the outer bound is tight.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 05:47:24 GMT"
}
] | 2008-05-28T00:00:00 | [
[
"Timo",
"R.",
""
],
[
"Grant",
"A.",
""
],
[
"Chan",
"T.",
""
],
[
"Kramer",
"G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4059 | Guangyue Han | Guangyue Han | Menger's Paths with Minimum Mergings | 28 pages, 7 figures | null | null | null | cs.IT math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For an acyclic directed graph with multiple sources and multiple sinks, we
prove that one can choose the Merger's paths between the sources and the sinks
such that the number of mergings between these paths is upper bounded by a
constant depending only on the min-cuts between the sources and the sinks,
regardless of the size and topology of the graph. We also give bounds on the
minimum number of mergings between these paths, and discuss how it depends on
the min-cuts.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 06:51:25 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Sep 2008 06:30:04 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Nov 2008 07:44:00 GMT"
},
{
"version": "v4",
"created": "Thu, 28 Apr 2011 05:45:14 GMT"
}
] | 2011-04-29T00:00:00 | [
[
"Han",
"Guangyue",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4060 | Amitabha Bagchi | Amitabha Bagchi | Sparse power-efficient topologies for wireless ad hoc sensor networks | A few of the results (dealing with nearest-neighbor graphs) have
appeared earlier in arXiv:0804.3784v1. A brief announcement of those results
will appear in PODC 2008 | null | null | null | cs.NI math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of power-efficient routing for multihop wireless ad hoc
sensor networks. The guiding insight of our work is that unlike an ad hoc
wireless network, a wireless ad hoc sensor network does not require full
connectivity among the nodes. As long as the sensing region is well covered by
connected nodes, the network can perform its task. We consider two kinds of
geometric random graphs as base interconnection structures: unit disk graphs
$\UDG(2,\lambda)$ and $k$-nearest-neighbor graphs $\NN(2,k)$ built on points
generated by a Poisson point process of density $\lambda$ in $\RR^2$. We
provide subgraph constructions for these two models $\US(2,\lambda)$ and
$\NS(2,k)$ and show that there are values $\lambda_s$ and $k_s$ above which
these constructions have the following good properties: (i) they are sparse;
(ii) they are power-efficient in the sense that the graph distance is no more
than a constant times the Euclidean distance between any pair of points; (iii)
they cover the space well; (iv) the subgraphs can be set up easily using local
information at each node. We also describe a simple local algorithm for routing
packets on these subgraphs. Our constructions also give new upper bounds for
the critical values of the parameters $\lambda$ and $k$ for the models
$\UDG(2,\lambda)$ and $\NN(2,k)$.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 09:47:06 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Jun 2008 17:33:11 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Jun 2008 12:35:58 GMT"
},
{
"version": "v4",
"created": "Tue, 1 Jul 2008 07:00:24 GMT"
},
{
"version": "v5",
"created": "Fri, 18 Jul 2008 08:57:08 GMT"
}
] | 2008-07-18T00:00:00 | [
[
"Bagchi",
"Amitabha",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0805.4072 | Michael Thomas | Pierre McKenzie, Michael Thomas and Heribert Vollmer | Extensional Uniformity for Boolean Circuits | null | null | null | null | cs.LO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Imposing an extensional uniformity condition on a non-uniform circuit
complexity class C means simply intersecting C with a uniform class L. By
contrast, the usual intensional uniformity conditions require that a
resource-bounded machine be able to exhibit the circuits in the circuit family
defining C. We say that (C,L) has the "Uniformity Duality Property" if the
extensionally uniform class C \cap L can be captured intensionally by means of
adding so-called "L-numerical predicates" to the first-order descriptive
complexity apparatus describing the connection language of the circuit family
defining C.
This paper exhibits positive instances and negative instances of the
Uniformity Duality Property.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 08:49:36 GMT"
},
{
"version": "v2",
"created": "Wed, 28 May 2008 07:31:01 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"McKenzie",
"Pierre",
""
],
[
"Thomas",
"Michael",
""
],
[
"Vollmer",
"Heribert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.4081 | Dmitry Lande | D.V. Lande, S.M. Braichevskii | Dynamics of thematic information flows | 8 pages, 4 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The studies of the dynamics of topical dataflow of new information in the
framework of a logistic model were suggested. The condition of topic balance,
when the number of publications on all topics is proportional to the
information space and time, was presented. General time dependence of the
publication intensity in the Internet, devoted to particular topics, was
observed; unlike an exponent model, it has a saturation area. Some limitations
of a logistic model were identified opening the way for further research.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 09:31:35 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Lande",
"D. V.",
""
],
[
"Braichevskii",
"S. M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4085 | Dmitry Lande | D. V. Lande, S. M. Braichevskii, A. T. Darmokhval, A. A. Snarskii | Peculiarities of the Correlation between Local and Global News
Popularity of Electronic Mass Media | 5 pages, 5 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the approaches to the solution of the navigation problem in current
information flows is ranking the documents according to their popularity level.
The definition of local and global news popularity which is based on the number
of similar-in-content documents, published within local and global time
interval, was suggested. Mutual behavior of the documents of local and global
popularity levels was studied. The algorithm of detecting the documents which
received great popularity before new topics appeared was suggested.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 09:47:03 GMT"
},
{
"version": "v2",
"created": "Fri, 30 May 2008 10:05:58 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Lande",
"D. V.",
""
],
[
"Braichevskii",
"S. M.",
""
],
[
"Darmokhval",
"A. T.",
""
],
[
"Snarskii",
"A. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4101 | Sylvie Saget | Sylvie Saget (IRISA), Marc Guyomard (IRISA) | Goal-oriented Dialog as a Collaborative Subordinated Activity involving
Collective Acceptance | null | Dans Proceedings of the 10th Workshop on the Semantics and the
Pragmatics of Dialogue (Brandial 2006) - 10th Workshop on the Semantics and
the Pragmatics of Dialogue (Brandial 2006), Potsdam : Allemagne (2006) | null | null | cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modeling dialog as a collaborative activity consists notably in specifying
the content of the Conversational Common Ground and the kind of social mental
state involved. In previous work (Saget, 2006), we claim that Collective
Acceptance is the proper social attitude for modeling Conversational Common
Ground in the particular case of goal-oriented dialog. In this paper, a
formalization of Collective Acceptance is shown, besides elements in order to
integrate this attitude in a rational model of dialog are provided; and
finally, a model of referential acts as being part of a collaborative activity
is presented. The particular case of reference has been chosen in order to
exemplify our claims.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 12:16:12 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Saget",
"Sylvie",
"",
"IRISA"
],
[
"Guyomard",
"Marc",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0805.4107 | Nicolas Bonnel | Nicolas Bonnel (VALORIA), Gilbas M\'enier (VALORIA),
Pierre-Fran\c{c}ois Marteau (VALORIA) | Spiral Walk on Triangular Meshes : Adaptive Replication in Data P2P
Networks | null | null | null | null | cs.NI cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a decentralized replication strategy for peer-to-peer file
exchange based on exhaustive exploration of the neighborhood of any node in the
network. The replication scheme lets the replicas evenly populate the network
mesh, while regulating the total number of replicas at the same time. This is
achieved by self adaptation to entering or leaving of nodes. Exhaustive
exploration is achieved by a spiral walk algorithm that generates a number of
messages linearly proportional to the number of visited nodes. It requires a
dedicated topology (a triangular mesh on a closed surface). We introduce
protocols for node connection and departure that maintain the triangular mesh
at low computational and bandwidth cost. Search efficiency is increased using a
mechanism based on dynamically allocated super peers. We conclude with a
discussion on experimental validation results.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 12:49:55 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Bonnel",
"Nicolas",
"",
"VALORIA"
],
[
"Ménier",
"Gilbas",
"",
"VALORIA"
],
[
"Marteau",
"Pierre-François",
"",
"VALORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0805.4112 | Oliver Johnson | Oliver Johnson, Ioannis Kontoyiannis and Mokshay Madiman | On the entropy and log-concavity of compound Poisson measures | null | null | null | Superceded by arXiv:0912.0581 | cs.IT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated, in part, by the desire to develop an information-theoretic
foundation for compound Poisson approximation limit theorems (analogous to the
corresponding developments for the central limit theorem and for simple Poisson
approximation), this work examines sufficient conditions under which the
compound Poisson distribution has maximal entropy within a natural class of
probability measures on the nonnegative integers. We show that the natural
analog of the Poisson maximum entropy property remains valid if the measures
under consideration are log-concave, but that it fails in general. A parallel
maximum entropy result is established for the family of compound binomial
measures. The proofs are largely based on ideas related to the semigroup
approach introduced in recent work by Johnson for the Poisson family.
Sufficient conditions are given for compound distributions to be log-concave,
and specific examples are presented illustrating all the above results.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 13:01:47 GMT"
}
] | 2010-10-21T00:00:00 | [
[
"Johnson",
"Oliver",
""
],
[
"Kontoyiannis",
"Ioannis",
""
],
[
"Madiman",
"Mokshay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0805.4134 | Spyros Sioutas SS | V.Chrissikopoulos, G.Papaloukopoulos, E.Sakkopoulos, S. Sioutas | Design and Implementation Aspects of a novel Java P2P Simulator with GUI | 8 Pages, 7 figures, This article was accepted for presentation in the
IEEE Panhellenic Conference in Informatics (PCI 2008),
http://www.aegean.gr/PCI2008 | null | null | null | cs.NI cs.DB cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Peer-to-peer networks consist of thousands or millions of nodes that might
join and leave arbitrarily. The evaluation of new protocols in real
environments is many times practically impossible, especially at design and
testing stages. The purpose of this paper is to describe the implementation
aspects of a new Java based P2P simulator that has been developed to support
scalability in the evaluation of such P2P dynamic environments. Evolving the
functionality presented by previous solutions, we provide a friendly graphical
user interface through which the high-level theoretic researcher/designer of a
P2P system can easily construct an overlay with the desirable number of nodes
and evaluate its operations using a number of key distributions. Furthermore,
the simulator has built-in ability to produce statistics about the distributed
structure. Emphasis was given to the parametrical configuration of the
simulator. As a result the developed tool can be utilized in the simulation and
evaluation procedures of a variety of different protocols, with only few
changes in the Java code.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 14:36:20 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Chrissikopoulos",
"V.",
""
],
[
"Papaloukopoulos",
"G.",
""
],
[
"Sakkopoulos",
"E.",
""
],
[
"Sioutas",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.4147 | Meng He | Prosenjit Bose, Eric Y. Chen, Meng He, Anil Maheshwari, Pat Morin | Succinct Geometric Indexes Supporting Point Location Queries | null | null | null | null | cs.CG cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose to design data structures called succinct geometric indexes of
negligible space (more precisely, o(n) bits) that, by taking advantage of the n
points in the data set permuted and stored elsewhere as a sequence, to support
geometric queries in optimal time. Our first and main result is a succinct
geometric index that can answer point location queries, a fundamental problem
in computational geometry, on planar triangulations in O(lg n) time. We also
design three variants of this index. The first supports point location using
$\lg n + 2\sqrt{\lg n} + O(\lg^{1/4} n)$ point-line comparisons. The second
supports point location in o(lg n) time when the coordinates are integers
bounded by U. The last variant can answer point location in O(H+1) expected
time, where H is the entropy of the query distribution. These results match the
query efficiency of previous point location structures that use O(n) words or
O(n lg n) bits, while saving drastic amounts of space.
We then generalize our succinct geometric index to planar subdivisions, and
design indexes for other types of queries. Finally, we apply our techniques to
design the first implicit data structures that support point location in
$O(\lg^2 n)$ time.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 15:15:05 GMT"
}
] | 2008-05-28T00:00:00 | [
[
"Bose",
"Prosenjit",
""
],
[
"Chen",
"Eric Y.",
""
],
[
"He",
"Meng",
""
],
[
"Maheshwari",
"Anil",
""
],
[
"Morin",
"Pat",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0805.4167 | Krishnendu Chatterjee | Krishnendu Chatterjee, Thomas A. Henzinger and Barbara Jobstmann | Environment Assumptions for Synthesis | 15 pages | null | null | null | cs.GT cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The synthesis problem asks to construct a reactive finite-state system from
an $\omega$-regular specification. Initial specifications are often
unrealizable, which means that there is no system that implements the
specification. A common reason for unrealizability is that assumptions on the
environment of the system are incomplete. We study the problem of correcting an
unrealizable specification $\phi$ by computing an environment assumption $\psi$
such that the new specification $\psi\to\phi$ is realizable. Our aim is to
construct an assumption $\psi$ that constrains only the environment and is as
weak as possible. We present a two-step algorithm for computing assumptions.
The algorithm operates on the game graph that is used to answer the
realizability question. First, we compute a safety assumption that removes a
minimal set of environment edges from the graph. Second, we compute a liveness
assumption that puts fairness conditions on some of the remaining environment
edges. We show that the problem of finding a minimal set of fair edges is
computationally hard, and we use probabilistic games to compute a locally
minimal fairness assumption.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 16:17:34 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Chatterjee",
"Krishnendu",
""
],
[
"Henzinger",
"Thomas A.",
""
],
[
"Jobstmann",
"Barbara",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.4211 | Grenville Croll | Soheil Saadat | Managing Critical Spreadsheets in a Compliant Environment | 4 Pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 21-24
ISBN 978-905617-58-6 | null | null | cs.SE cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The use of uncontrolled financial spreadsheets can expose organizations to
unacceptable business and compliance risks, including errors in the financial
reporting process, spreadsheet misuse and fraud, or even significant
operational errors. These risks have been well documented and thoroughly
researched. With the advent of regulatory mandates such as SOX 404 and FDICIA
in the U.S., and MiFID, Basel II and Combined Code in the UK and Europe,
leading tax and audit firms are now recommending that organizations automate
their internal controls over critical spreadsheets and other end-user computing
applications, including Microsoft Access databases. At a minimum, auditors
mandate version control, change control and access control for operational
spreadsheets, with more advanced controls for critical financial spreadsheets.
This paper summarises the key issues regarding the establishment and
maintenance of control of Business Critical spreadsheets.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 20:28:10 GMT"
}
] | 2008-05-29T00:00:00 | [
[
"Saadat",
"Soheil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0805.4218 | Grenville Croll | Brian Knight, David Chadwick, Kamalesen Rajalingham | A Structured Methodology for Spreadsheet Modelling | 8 Pages, 7 Figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2000 43-50
ISBN:1 86166 158 4 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we discuss the problem of the software engineering of a class
of business spreadsheet models. A methodology for structured software
development is proposed, which is based on structured analysis of data,
represented as Jackson diagrams. It is shown that this analysis allows a
straightforward modularisation, and that individual modules may be represented
with indentation in the block-structured form of structured programs. The
benefits of structured format are discussed, in terms of comprehensibility,
ease of maintenance, and reduction in errors. The capability of the methodology
to provide a modular overview in the model is described, and examples are
given. The potential for a reverse-engineering tool, to transform existing
spreadsheet models is discussed.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 20:56:35 GMT"
}
] | 2008-05-29T00:00:00 | [
[
"Knight",
"Brian",
""
],
[
"Chadwick",
"David",
""
],
[
"Rajalingham",
"Kamalesen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0805.4219 | Grenville Croll | Andrew Hawker | Building Financial Accuracy into Spreadsheets | 6 Pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2000 35-40
ISBN:1 86166 158 4 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Students learning how to apply spreadsheets to accounting problems are not
always well served by the built-in financial functions. Problems can arise
because of differences between UK and US practice, through anomalies in the
functions themselves, and because the promptings of Wizards' engender an
attitude of filling in the blanks on the screen, and hoping for the best. Some
examples of these problems are described, and suggestions are presented for
ways of improving the situation. Principally, it is suggested that spreadsheet
prompts and 'Help' screens should offer integrated guidance, covering some
aspects of financial practice, as well as matters of spreadsheet technique.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 21:11:48 GMT"
}
] | 2008-05-29T00:00:00 | [
[
"Hawker",
"Andrew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0805.4224 | Grenville Croll | Kamalasen Rajalingham, David R. Chadwick, Brian Knight | Classification of Spreadsheet Errors | 9 Pages, 6 Figures | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a framework for a systematic classification of
spreadsheet errors. This classification or taxonomy of errors is aimed at
facilitating analysis and comprehension of the different types of spreadsheet
errors. The taxonomy is an outcome of an investigation of the widespread
problem of spreadsheet errors and an analysis of specific types of these
errors. This paper contains a description of the various elements and
categories of the classification and is supported by appropriate examples.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 21:27:42 GMT"
}
] | 2008-05-29T00:00:00 | [
[
"Rajalingham",
"Kamalasen",
""
],
[
"Chadwick",
"David R.",
""
],
[
"Knight",
"Brian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0805.4236 | Grenville Croll | Raymond J. Butler | Risk Assessment For Spreadsheet Developments: Choosing Which Models to
Audit | 11 Pages, 1 Figure | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2000 65-74
ISBN:1 86166 158 4 | null | null | cs.SE cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Errors in spreadsheet applications and models are alarmingly common (some
authorities, with justification cite spreadsheets containing errors as the norm
rather than the exception). Faced with this body of evidence, the auditor can
be faced with a huge task - the temptation may be to launch code inspections
for every spreadsheet in an organisation. This can be very expensive and
time-consuming. This paper describes risk assessment based on the "SpACE" audit
methodology used by H M Customs & Excise's tax inspectors. This allows the
auditor to target resources on the spreadsheets posing the highest risk of
error, and justify the deployment of those resources to managers and clients.
Since the opposite of audit risk is audit assurance the paper also offers an
overview of some elements of good practice in the use of spreadsheets in
business.
| [
{
"version": "v1",
"created": "Tue, 27 May 2008 23:26:32 GMT"
}
] | 2008-05-29T00:00:00 | [
[
"Butler",
"Raymond J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0805.4247 | Ralph Linsker | Ralph Linsker | Neural network learning of optimal Kalman prediction and control | null | null | null | IBM Research Report RC24390 | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although there are many neural network (NN) algorithms for prediction and for
control, and although methods for optimal estimation (including filtering and
prediction) and for optimal control in linear systems were provided by Kalman
in 1960 (with nonlinear extensions since then), there has been, to my
knowledge, no NN algorithm that learns either Kalman prediction or Kalman
control (apart from the special case of stationary control). Here we show how
optimal Kalman prediction and control (KPC), as well as system identification,
can be learned and executed by a recurrent neural network composed of
linear-response nodes, using as input only a stream of noisy measurement data.
The requirements of KPC appear to impose significant constraints on the
allowed NN circuitry and signal flows. The NN architecture implied by these
constraints bears certain resemblances to the local-circuit architecture of
mammalian cerebral cortex. We discuss these resemblances, as well as caveats
that limit our current ability to draw inferences for biological function. It
has been suggested that the local cortical circuit (LCC) architecture may
perform core functions (as yet unknown) that underlie sensory, motor,and other
cortical processing. It is reasonable to conjecture that such functions may
include prediction, the estimation or inference of missing or noisy sensory
data, and the goal-driven generation of control signals. The resemblances found
between the KPC NN architecture and that of the LCC are consistent with this
conjecture.
| [
{
"version": "v1",
"created": "Wed, 28 May 2008 01:57:11 GMT"
}
] | 2008-05-29T00:00:00 | [
[
"Linsker",
"Ralph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0805.4248 | Alireza Bayesteh | Seyed Reza Mirghaderi, Alireza Bayesteh, and Amir K. Khandani | On the Capacity of Wireless Multicast Networks | presented in ISIT2007, Nice, France, submitted to IEEE Trans. on
Information Theory | null | null | UW Technical Report#25-2006 | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of maximizing the average rate in a multicast network subject to
a coverage constraint (minimum quality of service) is studied. Assuming the
channel state information is available only at the receiver side and single
antenna nodes, the highest expected rate achievable by a random user in the
network, called expected typical rate, is derived in two scenarios: hard
coverage constraint and soft coverage constraint. In the first case, the
coverage is expressed in terms of the outage probability, while in the second
case, the expected rate should satisfy certain minimum requirement. It is shown
that the optimum solution in both cases (achieving the highest expected typical
rate for given coverage requirements) is achieved by an infinite layer
superposition code for which the optimum power allocation among the different
layers is derived. For the MISO case, a suboptimal coding scheme is proposed,
which is shown to be asymptotically optimal, when the number of transmit
antennas grows at least logarithmically with the number of users in the
network.
| [
{
"version": "v1",
"created": "Wed, 28 May 2008 02:01:29 GMT"
}
] | 2008-05-29T00:00:00 | [
[
"Mirghaderi",
"Seyed Reza",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4249 | Zhu Han | Zhu Han and Vincent Poor | Coalition Games with Cooperative Transmission: A Cure for the Curse of
Boundary Nodes in Selfish Packet-Forwarding Wireless Networks | to appear in IEEE Transactions on Communications | null | null | null | cs.IT cs.GT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In wireless packet-forwarding networks with selfish nodes, application of a
repeated game can induce the nodes to forward each others' packets, so that the
network performance can be improved. However, the nodes on the boundary of such
networks cannot benefit from this strategy, as the other nodes do not depend on
them. This problem is sometimes known as {\em the curse of the boundary nodes}.
To overcome this problem, an approach based on coalition games is proposed, in
which the boundary nodes can use cooperative transmission to help the backbone
nodes in the middle of the network. In return, the backbone nodes are willing
to forward the boundary nodes' packets. Here, the concept of core is used to
study the stability of the coalitions in such games. Then three types of
fairness are investigated, namely, min-max fairness using nucleolus, average
fairness using the Shapley function, and a newly proposed market fairness.
Based on the specific problem addressed in this paper, market fairness is a new
fairness concept involving fairness between multiple backbone nodes and
multiple boundary nodes. Finally, a protocol is designed using both repeated
games and coalition games. Simulation results show how boundary nodes and
backbone nodes form coalitions according to different fairness criteria. The
proposed protocol can improve the network connectivity by about 50%, compared
with pure repeated game schemes.
| [
{
"version": "v1",
"created": "Wed, 28 May 2008 02:39:08 GMT"
}
] | 2008-05-29T00:00:00 | [
[
"Han",
"Zhu",
""
],
[
"Poor",
"Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4290 | Abdel Ennaji | Abdel Ennaji (LITIS), Arnaud Ribert (LITIS), Yves Lecourtier (LITIS) | From Data Topology to a Modular Classifier | null | International Journal On Document Analysis and Recognition 6, 1
(2003) 1-9 | 10.1007/s10032-002-0095-3 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article describes an approach to designing a distributed and modular
neural classifier. This approach introduces a new hierarchical clustering that
enables one to determine reliable regions in the representation space by
exploiting supervised information. A multilayer perceptron is then associated
with each of these detected clusters and charged with recognizing elements of
the associated cluster while rejecting all others. The obtained global
classifier is comprised of a set of cooperating neural networks and completed
by a K-nearest neighbor classifier charged with treating elements rejected by
all the neural networks. Experimental results for the handwritten digit
recognition problem and comparison with neural and statistical nonmodular
classifiers are given.
| [
{
"version": "v1",
"created": "Wed, 28 May 2008 09:16:44 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Ennaji",
"Abdel",
"",
"LITIS"
],
[
"Ribert",
"Arnaud",
"",
"LITIS"
],
[
"Lecourtier",
"Yves",
"",
"LITIS"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0805.4300 | Shai Gutner | Noga Alon and Shai Gutner | Balanced Families of Perfect Hash Functions and Their Applications | null | Proc. of 34th ICALP (2007), 435-446 | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The construction of perfect hash functions is a well-studied topic. In this
paper, this concept is generalized with the following definition. We say that a
family of functions from $[n]$ to $[k]$ is a $\delta$-balanced $(n,k)$-family
of perfect hash functions if for every $S \subseteq [n]$, $|S|=k$, the number
of functions that are 1-1 on $S$ is between $T/\delta$ and $\delta T$ for some
constant $T>0$. The standard definition of a family of perfect hash functions
requires that there will be at least one function that is 1-1 on $S$, for each
$S$ of size $k$. In the new notion of balanced families, we require the number
of 1-1 functions to be almost the same (taking $\delta$ to be close to 1) for
every such $S$. Our main result is that for any constant $\delta > 1$, a
$\delta$-balanced $(n,k)$-family of perfect hash functions of size $2^{O(k \log
\log k)} \log n$ can be constructed in time $2^{O(k \log \log k)} n \log n$.
Using the technique of color-coding we can apply our explicit constructions to
devise approximation algorithms for various counting problems in graphs. In
particular, we exhibit a deterministic polynomial time algorithm for
approximating both the number of simple paths of length $k$ and the number of
simple cycles of size $k$ for any $k \leq O(\frac{\log n}{\log \log \log n})$
in a graph with $n$ vertices. The approximation is up to any fixed desirable
relative error.
| [
{
"version": "v1",
"created": "Wed, 28 May 2008 09:49:18 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Alon",
"Noga",
""
],
[
"Gutner",
"Shai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0805.4323 | Martin Hoefer | Ulrik Brandes, Martin Hoefer, Bobo Nick | Network Connection Games with Disconnected Equilibria | 18 pages, 4 figures, extended abstract in WINE 2008 | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we extend a popular non-cooperative network creation game (NCG)
to allow for disconnected equilibrium networks. There are n players, each is a
vertex in a graph, and a strategy is a subset of players to build edges to. For
each edge a player must pay a cost \alpha, and the individual cost for a player
represents a trade-off between edge costs and shortest path lengths to all
other players. We extend the model to a penalized game (PCG), for which we
reduce the penalty counted towards the individual cost for a pair of
disconnected players to a finite value \beta. Our analysis concentrates on
existence, structure, and cost of disconnected Nash and strong equilibria.
Although the PCG is not a potential game, pure Nash equilibria always and pure
strong equilibria very often exist. We provide tight conditions under which
disconnected Nash (strong) equilibria can evolve. Components of these
equilibria must be Nash (strong) equilibria of a smaller NCG. However, in
contrast to the NCG, for almost all parameter values no tree is a stable
component. Finally, we present a detailed characterization of the price of
anarchy that reveals cases in which the price of anarchy is \Theta(n) and thus
several orders of magnitude larger than in the NCG. Perhaps surprisingly, the
strong price of anarchy increases to at most 4. This indicates that global
communication and coordination can be extremely valuable to overcome socially
inferior topologies in distributed selfish network design.
| [
{
"version": "v1",
"created": "Wed, 28 May 2008 12:09:15 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Oct 2008 22:12:35 GMT"
}
] | 2008-10-28T00:00:00 | [
[
"Brandes",
"Ulrik",
""
],
[
"Hoefer",
"Martin",
""
],
[
"Nick",
"Bobo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0805.4338 | Kush Varshney | Kush R. Varshney and Lav R. Varshney | Quantization of Prior Probabilities for Hypothesis Testing | null | IEEE Transactions on Signal Processing, vol. 56, no. 10, October
2008, p. 4553-4562 | 10.1109/TSP.2008.928164 | null | cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bayesian hypothesis testing is investigated when the prior probabilities of
the hypotheses, taken as a random vector, are quantized. Nearest neighbor and
centroid conditions are derived using mean Bayes risk error as a distortion
measure for quantization. A high-resolution approximation to the
distortion-rate function is also obtained. Human decision making in segregated
populations is studied assuming Bayesian hypothesis testing with quantized
priors.
| [
{
"version": "v1",
"created": "Wed, 28 May 2008 12:51:49 GMT"
}
] | 2008-09-20T00:00:00 | [
[
"Varshney",
"Kush R.",
""
],
[
"Varshney",
"Lav R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0805.4369 | Benoit Lemaire | Guy Denhi\`ere (LPC), Beno\^it Lemaire (TIMC), C\'edrick Bellissens,
Sandra Jhean | A semantic space for modeling children's semantic memory | null | The handbook of Latent Semantic Analysis, Lawrence Erlbaum
Associates (Ed.) (2007) 143-165 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of this paper is to present a model of children's semantic memory,
which is based on a corpus reproducing the kinds of texts children are exposed
to. After presenting the literature in the development of the semantic memory,
a preliminary French corpus of 3.2 million words is described. Similarities in
the resulting semantic space are compared to human data on four tests:
association norms, vocabulary test, semantic judgments and memory tasks. A
second corpus is described, which is composed of subcorpora corresponding to
various ages. This stratified corpus is intended as a basis for developmental
studies. Finally, two applications of these models of semantic memory are
presented: the first one aims at tracing the development of semantic
similarities paragraph by paragraph; the second one describes an implementation
of a model of text comprehension derived from the Construction-integration
model (Kintsch, 1988, 1998) and based on such models of semantic memory.
| [
{
"version": "v1",
"created": "Wed, 28 May 2008 14:56:18 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Denhière",
"Guy",
"",
"LPC"
],
[
"Lemaire",
"Benoît",
"",
"TIMC"
],
[
"Bellissens",
"Cédrick",
""
],
[
"Jhean",
"Sandra",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0805.4374 | Jin Xu | Jin Xu, Yi Cao, and Biao Chen | Capacity Bounds for Broadcast Channels with Confidential Messages | 27 pages, 1 figure, submitted to IEEE Transaction on Information
Theory | null | 10.1109/TIT.2009.2027500 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study capacity bounds for discrete memoryless broadcast
channels with confidential messages. Two private messages as well as a common
message are transmitted; the common message is to be decoded by both receivers,
while each private message is only for its intended receiver. In addition, each
private message is to be kept secret from the unintended receiver where secrecy
is measured by equivocation. We propose both inner and outer bounds to the rate
equivocation region for broadcast channels with confidential messages. The
proposed inner bound generalizes Csisz\'{a}r and K\"{o}rner's rate equivocation
region for broadcast channels with a single confidential message, Liu {\em et
al}'s achievable rate region for broadcast channels with perfect secrecy,
Marton's and Gel'fand and Pinsker's achievable rate region for general
broadcast channels. Our proposed outer bounds, together with the inner bound,
helps establish the rate equivocation region of several classes of discrete
memoryless broadcast channels with confidential messages, including less noisy,
deterministic, and semi-deterministic channels. Furthermore, specializing to
the general broadcast channel by removing the confidentiality constraint, our
proposed outer bounds reduce to new capacity outer bounds for the discrete
memory broadcast channel.
| [
{
"version": "v1",
"created": "Wed, 28 May 2008 15:36:46 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Xu",
"Jin",
""
],
[
"Cao",
"Yi",
""
],
[
"Chen",
"Biao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4394 | Luciana Guimaraes Ms | Luciana Guimaraes | Confidentiality, Integrity and High Availability with Open Source IT
green | 11 pages, 0 figures | Z. Pan, X. Ren, R. Eigenmann, and D. Xu. Executing mpi programs on
virtual machines in a internet sharing system. In 20th International Parallel
and Distributed Processing Symposium (IPDPS 2006). IEEE, 2006 | null | M. L. Massie, B. N. Chun, and D. E. Culler. Te ganglia distributed
system: design, implementatiosn, and experience. Parrallel Computing,
30(7):817-840, July 2004 | cs.CR cs.CY | http://creativecommons.org/licenses/by/3.0/ | This paper presents elements that form the structure of a network of data
using secure stable and mature technologies that meet the requirement of having
code free. The principle would be conflicting code open Tuesday where he wants
to keep maximum control over the data but is already evidence that open source
does not hide the famous backdoor possible in closed systems code.
Basearemos this work experience gained in a real environment and using
paravirtualization to show a situation more critical and now real in most
companies, the virtualization of servers.
| [
{
"version": "v1",
"created": "Wed, 28 May 2008 17:59:29 GMT"
}
] | 2008-05-29T00:00:00 | [
[
"Guimaraes",
"Luciana",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0805.4425 | Vasanthan Raghavan | Vasanthan Raghavan, Akbar Sayeed, Venu Veeravalli | Low-Complexity Structured Precoding for Spatially Correlated MIMO
Channels | 45 pages, 7 figures, to be submitted to IEEE Trans. Inform. Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The focus of this paper is on spatial precoding in correlated multi-antenna
channels, where the number of independent data-streams is adapted to trade-off
the data-rate with the transmitter complexity. Towards the goal of a
low-complexity implementation, a structured precoder is proposed, where the
precoder matrix evolves fairly slowly at a rate comparable with the statistical
evolution of the channel. Here, the eigenvectors of the precoder matrix
correspond to the dominant eigenvectors of the transmit covariance matrix,
whereas the power allocation across the modes is fixed, known at both the ends,
and is of low-complexity. A particular case of the proposed scheme (semiunitary
precoding), where the spatial modes are excited with equal power, is shown to
be near-optimal in matched channels. A matched channel is one where the
dominant eigenvalues of the transmit covariance matrix are well-conditioned and
their number equals the number of independent data-streams, and the receive
covariance matrix is also well-conditioned. In mismatched channels, where the
above conditions are not met, it is shown that the loss in performance with
semiunitary precoding when compared with a perfect channel information
benchmark is substantial. This loss needs to be mitigated via limited feedback
techniques that provide partial channel information to the transmitter. More
importantly, we develop matching metrics that capture the degree of matching of
a channel to the precoder structure continuously, and allow ordering two matrix
channels in terms of their mutual information or error probability performance.
| [
{
"version": "v1",
"created": "Wed, 28 May 2008 20:17:34 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Raghavan",
"Vasanthan",
""
],
[
"Sayeed",
"Akbar",
""
],
[
"Veeravalli",
"Venu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4440 | Shervan Fashandi | Shervan Fashandi, Shahab Oveis Gharan and Amir K. Khandani | Optimal Coding for the Erasure Channel with Arbitrary Alphabet Size | 15 pages, 3 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An erasure channel with a fixed alphabet size $q$, where $q \gg 1$, is
studied. It is proved that over any erasure channel (with or without memory),
Maximum Distance Separable (MDS) codes achieve the minimum probability of error
(assuming maximum likelihood decoding). Assuming a memoryless erasure channel,
the error exponent of MDS codes are compared with that of random codes and
linear random codes. It is shown that the envelopes of all these exponents are
identical for rates above the critical rate. Noting the optimality of MDS
codes, it is concluded that both random codes and linear random codes are
exponentially optimal, whether the block sizes is larger or smaller than the
alphabet size.
| [
{
"version": "v1",
"created": "Wed, 28 May 2008 22:18:16 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Jun 2008 20:43:08 GMT"
}
] | 2008-06-06T00:00:00 | [
[
"Fashandi",
"Shervan",
""
],
[
"Gharan",
"Shahab Oveis",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4471 | Emmanuel Candes | Emmanuel J. Candes and Benjamin Recht | Exact Matrix Completion via Convex Optimization | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a problem of considerable practical interest: the recovery of a
data matrix from a sampling of its entries. Suppose that we observe m entries
selected uniformly at random from a matrix M. Can we complete the matrix and
recover the entries that we have not seen?
We show that one can perfectly recover most low-rank matrices from what
appears to be an incomplete set of entries. We prove that if the number m of
sampled entries obeys m >= C n^{1.2} r log n for some positive numerical
constant C, then with very high probability, most n by n matrices of rank r can
be perfectly recovered by solving a simple convex optimization program. This
program finds the matrix with minimum nuclear norm that fits the data. The
condition above assumes that the rank is not too large. However, if one
replaces the 1.2 exponent with 1.25, then the result holds for all values of
the rank. Similar results hold for arbitrary rectangular matrices as well. Our
results are connected with the recent literature on compressed sensing, and
show that objects other than signals and images can be perfectly reconstructed
from very limited information.
| [
{
"version": "v1",
"created": "Thu, 29 May 2008 05:29:56 GMT"
}
] | 2008-05-30T00:00:00 | [
[
"Candes",
"Emmanuel J.",
""
],
[
"Recht",
"Benjamin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4502 | Laura Luzzi | L. Luzzi, G. Rekaya-Ben Othman, J.-C. Belfiore, E. Viterbo | Golden Space-Time Block Coded Modulation | 13 pages, 9 figures, Submitted to IEEE Trans. on Information Theory
Dec. 2007 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a block coded modulation scheme for a 2 x 2 MIMO
system over slow fading channels, where the inner code is the Golden Code. The
scheme is based on a set partitioning of the Golden Code using two-sided ideals
whose norm is a power of two. In this case, a lower bound for the minimum
determinant is given by the minimum Hamming distance. The description of the
ring structure of the quotients suggests further optimization in order to
improve the overall distribution of determinants. Performance simulations show
that the GC-RS schemes achieve a significant gain over the uncoded Golden Code.
| [
{
"version": "v1",
"created": "Thu, 29 May 2008 10:29:36 GMT"
}
] | 2008-05-30T00:00:00 | [
[
"Luzzi",
"L.",
""
],
[
"Othman",
"G. Rekaya-Ben",
""
],
[
"Belfiore",
"J. -C.",
""
],
[
"Viterbo",
"E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4508 | Hong Tang | Hong Tang, Nozha Boujemma, Yunhao Chen | Modeling Loosely Annotated Images with Imagined Annotations | 10 pages | null | null | null | cs.IR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present an approach to learning latent semantic analysis
models from loosely annotated images for automatic image annotation and
indexing. The given annotation in training images is loose due to: (1)
ambiguous correspondences between visual features and annotated keywords; (2)
incomplete lists of annotated keywords. The second reason motivates us to
enrich the incomplete annotation in a simple way before learning topic models.
In particular, some imagined keywords are poured into the incomplete annotation
through measuring similarity between keywords. Then, both given and imagined
annotations are used to learning probabilistic topic models for automatically
annotating new images. We conduct experiments on a typical Corel dataset of
images and loose annotations, and compare the proposed method with
state-of-the-art discrete annotation methods (using a set of discrete blobs to
represent an image). The proposed method improves word-driven probability
Latent Semantic Analysis (PLSA-words) up to a comparable performance with the
best discrete annotation method, while a merit of PLSA-words is still kept,
i.e., a wider semantic range.
| [
{
"version": "v1",
"created": "Thu, 29 May 2008 10:35:29 GMT"
}
] | 2008-05-30T00:00:00 | [
[
"Tang",
"Hong",
""
],
[
"Boujemma",
"Nozha",
""
],
[
"Chen",
"Yunhao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.4521 | Doina Tatar | Doina Tatar and Militon Frentiu | Textual Entailment Recognizing by Theorem Proving Approach | 10 pages | Studia Univ.Babes-Bolyai, Informatica, Vol.LI, Number 2, 2006 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present two original methods for recognizing textual
inference. First one is a modified resolution method such that some linguistic
considerations are introduced in the unification of two atoms. The approach is
possible due to the recent methods of transforming texts in logic formulas.
Second one is based on semantic relations in text, as presented in WordNet.
Some similarities between these two methods are remarked.
| [
{
"version": "v1",
"created": "Thu, 29 May 2008 11:53:39 GMT"
}
] | 2008-05-30T00:00:00 | [
[
"Tatar",
"Doina",
""
],
[
"Frentiu",
"Militon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0805.4543 | Timur R. Seifullin | Timur R. Seifullin | Determination of the basis of the space of all root functionals of a
system of polynomial equations and of the basis of its ideal by the operation
of the extension of bounded root functionals | Paper translated from Russian. Summary in English | Dopov. Nats. Akad. Nauk Ukr. Mat. Prirodozn. Tekh. Nauki 2003, no.
8, 29--36. MR2046291 (2005a:13055) | null | null | math.AG cs.SC math.AC | http://creativecommons.org/licenses/by/3.0/ | It is proposed the algorithm that find a basis of the ideal and a basis of
the space of all root functionals by using the extension operation for bounded
root functionals, when the number of polynomials is equal to the number of
variables, if it is known that the ideal of polynomials is 0-dimensional. The
asyptotic complexity of this algorithm is d^{O(n)} operations, where n is the
number of polynomials and the number of variables, d is the maximal degree of
polynomials. The extension operation has connection with the multivariate
Bezoutian construction.
| [
{
"version": "v1",
"created": "Thu, 29 May 2008 18:15:22 GMT"
},
{
"version": "v2",
"created": "Fri, 30 May 2008 10:57:31 GMT"
}
] | 2008-06-01T00:00:00 | [
[
"Seifullin",
"Timur R.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
0805.4560 | \^Hamed \"Owladeghaffari | H.Owladeghaffari | Rock mechanics modeling based on soft granulation theory | null | null | 10.1016/j.ijrmms.2008.09.001 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes application of information granulation theory, on the
design of rock engineering flowcharts. Firstly, an overall flowchart, based on
information granulation theory has been highlighted. Information granulation
theory, in crisp (non-fuzzy) or fuzzy format, can take into account engineering
experiences (especially in fuzzy shape-incomplete information or superfluous),
or engineering judgments, in each step of designing procedure, while the
suitable instruments modeling are employed. In this manner and to extension of
soft modeling instruments, using three combinations of Self Organizing Map
(SOM), Neuro-Fuzzy Inference System (NFIS), and Rough Set Theory (RST) crisp
and fuzzy granules, from monitored data sets are obtained. The main underlined
core of our algorithms are balancing of crisp(rough or non-fuzzy) granules and
sub fuzzy granules, within non fuzzy information (initial granulation) upon the
open-close iterations. Using different criteria on balancing best granules
(information pockets), are obtained. Validations of our proposed methods, on
the data set of in-situ permeability in rock masses in Shivashan dam, Iran have
been highlighted.
| [
{
"version": "v1",
"created": "Thu, 29 May 2008 14:39:57 GMT"
}
] | 2014-07-29T00:00:00 | [
[
"Owladeghaffari",
"H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.4583 | Tobias Koch | Tobias Koch, Amos Lapidoth, Paul P. Sotiriadis | Channels that Heat Up | 29 pages, submitted to the IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2023753 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work considers an additive noise channel where the time-k noise variance
is a weighted sum of the channel input powers prior to time k. This channel is
motivated by point-to-point communication between two terminals that are
embedded in the same chip. Transmission heats up the entire chip and hence
increases the thermal noise at the receiver. The capacity of this channel (both
with and without feedback) is studied at low transmit powers and at high
transmit powers.
At low transmit powers, the slope of the capacity-vs-power curve at zero is
computed and it is shown that the heating-up effect is beneficial. At high
transmit powers, conditions are determined under which the capacity is bounded,
i.e., under which the capacity does not grow to infinity as the allowed average
power tends to infinity.
| [
{
"version": "v1",
"created": "Thu, 29 May 2008 16:35:36 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Koch",
"Tobias",
""
],
[
"Lapidoth",
"Amos",
""
],
[
"Sotiriadis",
"Paul P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4606 | Kristina Lerman | Rumi Ghosh and Kristina Lerman | Community Detection using a Measure of Global Influence | 10 pages, submitted to 2008 KDD workshop on Social Network Analysis | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The growing popularity of online social networks has provided researchers
with access to large amount of social network data. This, coupled with the ever
increasing computation speed, storage capacity and data mining capabilities,
led to the renewal of interest in automatic community detection methods.
Surprisingly, there is no universally accepted definition of the community. One
frequently used definition states that ``communities, that have more and/or
better-connected `internal edges' connecting members of the set than `cut
edges' connecting the set to the rest of the world''[Leskovec et al. 20008].
This definition inspired the modularity-maximization class of community
detection algorithms, which look for regions of the network that have higher
than expected density of edges within them. We introduce an alternative
definition which states that a community is composed of individuals who have
more influence on others within the community than on those outside of it. We
present a mathematical formulation of influence, define an influence-based
modularity metric, and show how to use it to partition the network into
communities. We evaluated our approach on the standard data sets used in
literature, and found that it often outperforms the edge-based modularity
algorithm.
| [
{
"version": "v1",
"created": "Thu, 29 May 2008 19:11:17 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Ghosh",
"Rumi",
""
],
[
"Lerman",
"Kristina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0805.4620 | Amichai Sanderovich | Amichai Sanderovich, Oren Somekh, H. Vincent Poor and Shlomo Shamai
(Shitz) | Uplink Macro Diversity of Limited Backhaul Cellular Network | 42 pages, 12 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work new achievable rates are derived, for the uplink channel of a
cellular network with joint multicell processing, where unlike previous
results, the ideal backhaul network has finite capacity per-cell. Namely, the
cell sites are linked to the central joint processor via lossless links with
finite capacity. The cellular network is abstracted by symmetric models, which
render analytical treatment plausible. For this idealistic model family,
achievable rates are presented for cell-sites that use compress-and-forward
schemes combined with local decoding, for both Gaussian and fading channels.
The rates are given in closed form for the classical Wyner model and the
soft-handover model. These rates are then demonstrated to be rather close to
the optimal unlimited backhaul joint processing rates, already for modest
backhaul capacities, supporting the potential gain offered by the joint
multicell processing approach. Particular attention is also given to the
low-SNR characterization of these rates through which the effect of the limited
backhaul network is explicitly revealed. In addition, the rate at which the
backhaul capacity should scale in order to maintain the original high-SNR
characterization of an unlimited backhaul capacity system is found.
| [
{
"version": "v1",
"created": "Thu, 29 May 2008 20:29:27 GMT"
}
] | 2008-06-02T00:00:00 | [
[
"Sanderovich",
"Amichai",
"",
"Shitz"
],
[
"Somekh",
"Oren",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4648 | Amitabh Saxena | Amitabh Saxena and Brecht Wyseur | On White-box Cryptography and Obfuscation | unpublished manuscript (as of May'08) | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the relationship between obfuscation and white-box cryptography. We
capture the requirements of any white-box primitive using a \emph{White-Box
Property (WBP)} and give some negative/positive results. Loosely speaking, the
WBP is defined for some scheme and a security notion (we call the pair a
\emph{specification}), and implies that w.r.t. the specification, an
obfuscation does not leak any ``useful'' information, even though it may leak
some ``useless'' non-black-box information.
Our main result is a negative one - for most interesting programs, an
obfuscation (under \emph{any} definition) cannot satisfy the WBP for every
specification in which the program may be present. To do this, we define a
\emph{Universal White-Box Property (UWBP)}, which if satisfied, would imply
that under \emph{whatever} specification we conceive, the WBP is satisfied. We
then show that for every non-approximately-learnable family, there exist
(contrived) specifications for which the WBP (and thus, the UWBP) fails.
On the positive side, we show that there exists an obfuscator for a
non-approximately-learnable family that achieves the WBP for a certain
specification. Furthermore, there exists an obfuscator for a non-learnable (but
approximately-learnable) family that achieves the UWBP.
Our results can also be viewed as formalizing the distinction between
``useful'' and ``useless'' non-black-box information.
| [
{
"version": "v1",
"created": "Fri, 30 May 2008 00:49:05 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Jun 2008 01:37:07 GMT"
}
] | 2008-06-15T00:00:00 | [
[
"Saxena",
"Amitabh",
""
],
[
"Wyseur",
"Brecht",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0805.4665 | Avik Chaudhuri | Avik Chaudhuri | On Secure Distributed Implementations of Dynamic Access Control | null | null | null | null | cs.CR cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distributed implementations of access control abound in distributed storage
protocols. While such implementations are often accompanied by informal
justifications of their correctness, our formal analysis reveals that their
correctness can be tricky. In particular, we discover several subtleties in a
standard protocol based on capabilities, that can break security under a simple
specification of access control. At the same time, we show a sensible
refinement of the specification for which a secure implementation of access
control is possible. Our models and proofs are formalized in the applied pi
calculus, following some new techniques that may be of independent interest.
Finally, we indicate how our principles can be applied to securely distribute
other state machines.
| [
{
"version": "v1",
"created": "Fri, 30 May 2008 03:50:12 GMT"
}
] | 2008-06-02T00:00:00 | [
[
"Chaudhuri",
"Avik",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.4680 | Marc Shapiro | Lamia Benmouffok (INRIA Rocquencourt, LIP6), Jean-Michel Busca (INRIA
Rocquencourt, LIP6), Joan Manuel Marqu\`es (LIP6, UOC), Marc Shapiro (INRIA
Rocquencourt, LIP6), Pierre Sutra (INRIA Rocquencourt, LIP6), Georgios
Tsoukalas (NTUA) | Telex: Principled System Support for Write-Sharing in Collaborative
Applications | null | null | null | RR-6546 | cs.OS cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Telex system is designed for sharing mutable data in a distributed
environment, particularly for collaborative applications. Users operate on
their local, persistent replica of shared documents; they can work disconnected
and suffer no network latency. The Telex approach to detect and correct
conflicts is application independent, based on an action-constraint graph (ACG)
that summarises the concurrency semantics of applications. The ACG is stored
efficiently in a multilog structure that eliminates contention and is optimised
for locality. Telex supports multiple applications and multi-document updates.
The Telex system clearly separates system logic (which includes replication,
views, undo, security, consistency, conflicts, and commitment) from application
logic. An example application is a shared calendar for managing multi-user
meetings; the system detects meeting conflicts and resolves them consistently.
| [
{
"version": "v1",
"created": "Fri, 30 May 2008 07:01:51 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Jun 2008 08:40:53 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Jun 2008 07:13:01 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Benmouffok",
"Lamia",
"",
"INRIA Rocquencourt, LIP6"
],
[
"Busca",
"Jean-Michel",
"",
"INRIA\n Rocquencourt, LIP6"
],
[
"Marquès",
"Joan Manuel",
"",
"LIP6, UOC"
],
[
"Shapiro",
"Marc",
"",
"INRIA\n Rocquencourt, LIP6"
],
[
"Sutra",
"Pierre",
"",
"INRIA Rocquencourt, LIP6"
],
[
"Tsoukalas",
"Georgios",
"",
"NTUA"
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.4718 | Radoslaw Hofman | Radoslaw Hofman | Report on article The Travelling Salesman Problem: A Linear Programming
Formulation | Counter example for extended version of Diaby model for his
publication in arXiv:0803.4354v1 [cs.DM] | null | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article describes counter example prepared in order to prove that linear
formulation of TSP problem proposed in [arXiv:0803.4354] is incorrect (it
applies also to QAP problem formulation in [arXiv:0802.4307]). Article refers
not only to model itself, but also to ability of extension of proposed model to
be correct.
| [
{
"version": "v1",
"created": "Fri, 30 May 2008 10:22:45 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Jun 2008 07:04:11 GMT"
}
] | 2008-06-02T00:00:00 | [
[
"Hofman",
"Radoslaw",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0805.4722 | Bernard Jacquemin | Bernard Jacquemin (LIMSI), Aur\'elien Lauf (LIMSI), C\'eline Poudat
(LTCI), Martine Hurault-Plantet (LIMSI), Nicolas Auray (LTCI) | La fiabilit\'e des informations sur le web | 8 pp | Dans Actes de la Conf\'erence en Recherche d'Information et
Applications CORIA 2008 - Conf\'erence en Recherche d'Information et
Applications 2008, Tr\'egastel : France (2008) | null | null | cs.IR cs.CL cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online IR tools have to take into account new phenomena linked to the
appearance of blogs, wiki and other collaborative publications. Among these
collaborative sites, Wikipedia represents a crucial source of information.
However, the quality of this information has been recently questionned. A
better knowledge of the contributors' behaviors should help users navigate
through information whose quality may vary from one source to another. In order
to explore this idea, we present an analysis of the role of different types of
contributors in the control of the publication of conflictual articles.
| [
{
"version": "v1",
"created": "Fri, 30 May 2008 10:45:42 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Jacquemin",
"Bernard",
"",
"LIMSI"
],
[
"Lauf",
"Aurélien",
"",
"LIMSI"
],
[
"Poudat",
"Céline",
"",
"LTCI"
],
[
"Hurault-Plantet",
"Martine",
"",
"LIMSI"
],
[
"Auray",
"Nicolas",
"",
"LTCI"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0805.4745 | Juan de Lara | Juan de Lara and Esther Guerra | Pattern-based Model-to-Model Transformation: Long Version | extended version of the paper from the ICGT'2008 conference
(Leicester) | null | null | null | cs.SE cs.DM cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new, high-level approach for the specification of model-to-model
transformations based on declarative patterns. These are (atomic or composite)
constraints on triple graphs declaring the allowed or forbidden relationships
between source and target models. In this way, a transformation is defined by
specifying a set of triple graph constraints that should be satisfied by the
result of the transformation.
The description of the transformation is then compiled into lower-level
operational mechanisms to perform forward or backward transformations, as well
as to establish mappings between two existent models. In this paper we study
one of such mechanisms based on the generation of operational triple graph
grammar rules. Moreover, we exploit deduction techniques at the specification
level to generate more specialized constraints (preserving the specification
semantics) reflecting pattern dependencies, from which additional rules can be
derived.
This is an extended version of the paper submitted to ICGT'08, with
additional definitions and proofs.
| [
{
"version": "v1",
"created": "Fri, 30 May 2008 12:48:16 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"de Lara",
"Juan",
""
],
[
"Guerra",
"Esther",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.4748 | Eric Chen | Eric Z. Chen | New Construction of 2-Generator Quasi-Twisted Codes | 4 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quasi-twisted (QT) codes are a generalization of quasi-cyclic (QC) codes.
Based on consta-cyclic simplex codes, a new explicit construction of a family
of 2-generator quasi-twisted (QT) two-weight codes is presented. It is also
shown that many codes in the family meet the Griesmer bound and therefore are
length-optimal. New distance-optimal binary QC [195, 8, 96], [210, 8, 104] and
[240, 8, 120] codes, and good ternary QC [208, 6, 135] and [221, 6, 144] codes
are also obtained by the construction.
| [
{
"version": "v1",
"created": "Fri, 30 May 2008 13:06:18 GMT"
}
] | 2008-06-02T00:00:00 | [
[
"Chen",
"Eric Z.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.4754 | Bernard Jacquemin | Bernard Jacquemin (LIMSI), Aur\'elien Lauf (LIMSI), C\'eline Poudat
(LTCI), Martine Hurault-Plantet (LIMSI), Nicolas Auray (LTCI) | Managing conflicts between users in Wikipedia | 12 pp | Dans BIS 2008 Workshop proceedings - 11th Conference on Business
Information Systems (BIS 2008), Social Aspects of the Web Workshop (SAW
2008), Innsbruck : Autriche (2008) | null | null | cs.IR cs.CL cs.CY cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wikipedia is nowadays a widely used encyclopedia, and one of the most visible
sites on the Internet. Its strong principle of collaborative work and free
editing sometimes generates disputes due to disagreements between users. In
this article we study how the wikipedian community resolves the conflicts and
which roles do wikipedian choose in this process. We observed the users
behavior both in the article talk pages, and in the Arbitration Committee pages
specifically dedicated to serious disputes. We first set up a users typology
according to their involvement in conflicts and their publishing and management
activity in the encyclopedia. We then used those user types to describe users
behavior in contributing to articles that are tagged by the wikipedian
community as being in conflict with the official guidelines of Wikipedia, or
conversely as being well featured.
| [
{
"version": "v1",
"created": "Fri, 30 May 2008 13:20:42 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Jacquemin",
"Bernard",
"",
"LIMSI"
],
[
"Lauf",
"Aurélien",
"",
"LIMSI"
],
[
"Poudat",
"Céline",
"",
"LTCI"
],
[
"Hurault-Plantet",
"Martine",
"",
"LIMSI"
],
[
"Auray",
"Nicolas",
"",
"LTCI"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0806.0036 | Mahdi Ramezani | Ali Sanaei, Mahdi Ramezani, and Masoud Ardakani | On the Design of Universal LDPC Codes | 5 pages, 2 figures, To appear in Proc. IEEE International Symposium
on Information Theory (ISIT 2008), Toronto, Canada, July 2008 | null | 10.1109/ISIT.2008.4595097 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Low-density parity-check (LDPC) coding for a multitude of equal-capacity
channels is studied. First, based on numerous observations, a conjecture is
stated that when the belief propagation decoder converges on a set of
equal-capacity channels, it would also converge on any convex combination of
those channels. Then, it is proved that when the stability condition is
satisfied for a number of channels, it is also satisfied for any channel in
their convex hull. For the purpose of code design, a method is proposed which
can decompose every symmetric channel with capacity C into a set of
identical-capacity basis channels. We expect codes that work on the basis
channels to be suitable for any channel with capacity C. Such codes are found
and in comparison with existing LDPC codes that are designed for specific
channels, our codes obtain considerable coding gains when used across a
multitude of channels.
| [
{
"version": "v1",
"created": "Fri, 30 May 2008 22:03:00 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Sanaei",
"Ali",
""
],
[
"Ramezani",
"Mahdi",
""
],
[
"Ardakani",
"Masoud",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.0043 | Narad Rampersad | James Currie and Narad Rampersad | Dejean's conjecture holds for n >= 30 | introductory material added, minor corrections, 6 pages | null | null | null | math.CO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We extend Carpi's results by showing that Dejean's conjecture holds for n >=
30.
| [
{
"version": "v1",
"created": "Fri, 30 May 2008 23:20:30 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Jan 2009 22:59:58 GMT"
}
] | 2009-04-14T00:00:00 | [
[
"Currie",
"James",
""
],
[
"Rampersad",
"Narad",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0806.0075 | Sherif Sakr | Sherif Sakr | An Experimental Investigation of XML Compression Tools | http://xmlcompbench.sourceforge.net/ | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an extensive experimental study of the state-of-the-art
of XML compression tools. The study reports the behavior of nine XML
compressors using a large corpus of XML documents which covers the different
natures and scales of XML documents. In addition to assessing and comparing the
performance characteristics of the evaluated XML compression tools, the study
tries to assess the effectiveness and practicality of using these tools in the
real world. Finally, we provide some guidelines and recommen- dations which are
useful for helping developers and users for making an effective decision for
selecting the most suitable XML compression tool for their needs.
| [
{
"version": "v1",
"created": "Sat, 31 May 2008 14:49:00 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Sakr",
"Sherif",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0806.0080 | Ravi Tandon | Ravi Tandon, Sennur Ulukus | Outer Bounds for Multiple Access Channels with Feedback using Dependence
Balance | submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2027532 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We use the idea of dependence balance to obtain a new outer bound for the
capacity region of the discrete memoryless multiple access channel with
noiseless feedback (MAC-FB). We consider a binary additive noisy MAC-FB whose
feedback capacity is not known. The binary additive noisy MAC considered in
this paper can be viewed as the discrete counterpart of the Gaussian MAC-FB.
Ozarow established that the capacity region of the two-user Gaussian MAC-FB is
given by the cut-set bound. Our result shows that for the discrete version of
the channel considered by Ozarow, this is not the case. Direct evaluation of
our outer bound is intractable due to an involved auxiliary random variable
whose large cardinality prohibits an exhaustive search. We overcome this
difficulty by using functional analysis to explicitly evaluate our outer bound.
Our outer bound is strictly less than the cut-set bound at all points on the
capacity region where feedback increases capacity. In addition, we explicitly
evaluate the Cover-Leung achievable rate region for the binary additive noisy
MAC-FB in consideration. Furthermore, using the tools developed for the
evaluation of our outer bound, we also explicitly characterize the boundary of
the feedback capacity region of the binary erasure MAC, for which the
Cover-Leung achievable rate region is known to be tight. This last result
confirms that the feedback strategies developed by Kramer for the binary
erasure MAC are capacity achieving.
| [
{
"version": "v1",
"created": "Sat, 31 May 2008 15:21:31 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Tandon",
"Ravi",
""
],
[
"Ulukus",
"Sennur",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.