id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0806.0081
Anna Zamansky
Arnon Avron and Anna Zamansky
Canonical calculi with (n,k)-ary quantifiers
Special Issue of IJCAR2006, edited by Prof. Natarajan Shankar, paper LMCS-2007-204
Logical Methods in Computer Science, Volume 4, Issue 3 (August 6, 2008) lmcs:1139
10.2168/LMCS-4(3:2)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Propositional canonical Gentzen-type systems, introduced in 2001 by Avron and Lev, are systems which in addition to the standard axioms and structural rules have only logical rules in which exactly one occurrence of a connective is introduced and no other connective is mentioned. A constructive coherence criterion for the non-triviality of such systems was defined and it was shown that a system of this kind admits cut-elimination iff it is coherent. The semantics of such systems is provided using two-valued non-deterministic matrices (2Nmatrices). In 2005 Zamansky and Avron extended these results to systems with unary quantifiers of a very restricted form. In this paper we substantially extend the characterization of canonical systems to (n,k)-ary quantifiers, which bind k distinct variables and connect n formulas, and show that the coherence criterion remains constructive for such systems. Then we focus on the case of k∈{0,1} and for a canonical calculus G show that it is coherent precisely when it has a strongly characteristic 2Nmatrix, which in turn is equivalent to admitting strong cut-elimination.
[ { "version": "v1", "created": "Sat, 31 May 2008 15:35:40 GMT" }, { "version": "v2", "created": "Thu, 5 Jun 2008 20:04:14 GMT" }, { "version": "v3", "created": "Wed, 6 Aug 2008 15:34:52 GMT" }, { "version": "v4", "created": "Thu, 7 Aug 2008 17:23:35 GMT" } ]
2015-07-01T00:00:00
[ [ "Avron", "Arnon", "" ], [ "Zamansky", "Anna", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.0103
Hans Adler
Hans Adler and Isolde Adler
A note on clique-width and tree-width for structures
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a simple proof that the straightforward generalisation of clique-width to arbitrary structures can be unbounded on structures of bounded tree-width. This can be corrected by allowing fusion of elements.
[ { "version": "v1", "created": "Mon, 2 Jun 2008 10:41:48 GMT" }, { "version": "v2", "created": "Mon, 2 Jun 2008 21:35:39 GMT" } ]
2008-06-03T00:00:00
[ [ "Adler", "Hans", "" ], [ "Adler", "Isolde", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.0128
Feng Xia
Feng Xia
QoS Challenges and Opportunities in Wireless Sensor/Actuator Networks
12 pages, 1 figure; review
Sensors 2008, 8(2), 1099-1110
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A wireless sensor/actuator network (WSAN) is a group of sensors and actuators that are geographically distributed and interconnected by wireless networks. Sensors gather information about the state of physical world. Actuators react to this information by performing appropriate actions. WSANs thus enable cyber systems to monitor and manipulate the behavior of the physical world. WSANs are growing at a tremendous pace, just like the exploding evolution of Internet. Supporting quality of service (QoS) will be of critical importance for pervasive WSANs that serve as the network infrastructure of diverse applications. To spark new research and development interests in this field, this paper examines and discusses the requirements, critical challenges, and open research issues on QoS management in WSANs. A brief overview of recent progress is given.
[ { "version": "v1", "created": "Sun, 1 Jun 2008 07:27:05 GMT" } ]
2008-12-18T00:00:00
[ [ "Xia", "Feng", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.0130
Feng Xia
Feng Xia, Youxian Sun, Yu-Chu Tian
Feedback Scheduling of Priority-Driven Control Networks
To appear in Computer Standards and Interfaces; doi:10.1016/j.csi.2008.03.020
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With traditional open-loop scheduling of network resources, the quality-of-control (QoC) of networked control systems (NCSs) may degrade significantly in the presence of limited bandwidth and variable workload. The goal of this work is to maximize the overall QoC of NCSs through dynamically allocating available network bandwidth. Based on codesign of control and scheduling, an integrated feedback scheduler is developed to enable flexible QoC management in dynamic environments. It encompasses a cascaded feedback scheduling module for sampling period adjustment and a direct feedback scheduling module for priority modification. The inherent characteristics of priority-driven control networks make it feasible to implement the proposed feedback scheduler in real-world systems. Extensive simulations show that the proposed approach leads to significant QoC improvement over the traditional open-loop scheduling scheme under both underloaded and overloaded network conditions.
[ { "version": "v1", "created": "Sun, 1 Jun 2008 08:03:02 GMT" } ]
2008-12-18T00:00:00
[ [ "Xia", "Feng", "" ], [ "Sun", "Youxian", "" ], [ "Tian", "Yu-Chu", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.0132
Feng Xia
Feng Xia, Yu-Chu Tian, Youxian Sun, Jinxiang Dong
Control-theoretic dynamic voltage scaling for embedded controllers
Accepted for publication in IET Computers and Digital Techniques. doi:10.1049/iet-cdt:20070112
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For microprocessors used in real-time embedded systems, minimizing power consumption is difficult due to the timing constraints. Dynamic voltage scaling (DVS) has been incorporated into modern microprocessors as a promising technique for exploring the trade-off between energy consumption and system performance. However, it remains a challenge to realize the potential of DVS in unpredictable environments where the system workload cannot be accurately known. Addressing system-level power-aware design for DVS-enabled embedded controllers, this paper establishes an analytical model for the DVS system that encompasses multiple real-time control tasks. From this model, a feedback control based approach to power management is developed to reduce dynamic power consumption while achieving good application performance. With this approach, the unpredictability and variability of task execution times can be attacked. Thanks to the use of feedback control theory, predictable performance of the DVS system is achieved, which is favorable to real-time applications. Extensive simulations are conducted to evaluate the performance of the proposed approach.
[ { "version": "v1", "created": "Sun, 1 Jun 2008 08:30:10 GMT" } ]
2008-12-18T00:00:00
[ [ "Xia", "Feng", "" ], [ "Tian", "Yu-Chu", "" ], [ "Sun", "Youxian", "" ], [ "Dong", "Jinxiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0806.0134
Feng Xia
Feng Xia, Wenhong Zhao, Youxian Sun and Yu-Chu Tian
Fuzzy Logic Control Based QoS Management in Wireless Sensor/Actuator Networks
13 pages, 8 figures; Open Access at http://www.mdpi.org/sensors
Sensors 2007, 7(12), 3179-3191
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless sensor/actuator networks (WSANs) are emerging rapidly as a new generation of sensor networks. Despite intensive research in wireless sensor networks (WSNs), limited work has been found in the open literature in the field of WSANs. In particular, quality-of-service (QoS) management in WSANs remains an important issue yet to be investigated. As an attempt in this direction, this paper develops a fuzzy logic control based QoS management (FLC-QM) scheme for WSANs with constrained resources and in dynamic and unpredictable environments. Taking advantage of the feedback control technology, this scheme deals with the impact of unpredictable changes in traffic load on the QoS of WSANs. It utilizes a fuzzy logic controller inside each source sensor node to adapt sampling period to the deadline miss ratio associated with data transmission from the sensor to the actuator. The deadline miss ratio is maintained at a pre-determined desired level so that the required QoS can be achieved. The FLC-QM has the advantages of generality, scalability, and simplicity. Simulation results show that the FLC-QM can provide WSANs with QoS support.
[ { "version": "v1", "created": "Sun, 1 Jun 2008 08:39:23 GMT" } ]
2008-12-18T00:00:00
[ [ "Xia", "Feng", "" ], [ "Zhao", "Wenhong", "" ], [ "Sun", "Youxian", "" ], [ "Tian", "Yu-Chu", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.0142
Nina Filimonova
N. A. Filimonova
Regularization of Invers Problem for M-Ary Channel
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of computation of parameters of m-ary channel is considered. It is demonstrated that although the problem is ill-posed, it is possible turning of the parameters of the system and transform the problem to well-posed one.
[ { "version": "v1", "created": "Sun, 1 Jun 2008 11:42:20 GMT" } ]
2008-06-03T00:00:00
[ [ "Filimonova", "N. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.0172
Grenville Croll
David Chadwick
EuSpRIG TEAM work:Tools, Education, Audit, Management
7 Pages, 1 Figure
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2003 1-6 ISBN 1 86166 199 1
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research on spreadsheet errors began over fifteen years ago. During that time, there has been ample evidence demonstrating that spreadsheet errors are common and nontrivial. Quite simply, spreadsheet error rates are comparable to error rates in other human cognitive activities and are caused by fundamental limitations in human cognition, not mere sloppiness. Nor does ordinary "being careful" eliminate errors or reduce them to acceptable levels.
[ { "version": "v1", "created": "Sun, 1 Jun 2008 21:01:15 GMT" } ]
2008-06-03T00:00:00
[ [ "Chadwick", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0806.0182
Grenville Croll
David R. Chadwick
Training Gamble leads to Corporate Grumble?
8 Pages, 4 Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2002 1-11 ISBN 1 86166 182
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fifteen years of research studies have concluded unanimously that spreadsheet errors are both common and non-trivial. Now we must seek ways to reduce spreadsheet errors. Several approaches have been suggested, some of which are promising and others, while appealing because they are easy to do, are not likely to be effective. To date, only one technique, cell-by-cell code inspection, has been demonstrated to be effective. We need to conduct further research to determine the degree to which other techniques can reduce spreadsheet errors.
[ { "version": "v1", "created": "Sun, 1 Jun 2008 23:14:22 GMT" } ]
2008-06-03T00:00:00
[ [ "Chadwick", "David R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0806.0189
Grenville Croll
Pat Cleary, Dr David Ball, Mukul Madahar, Simon Thorne, Christopher Gosling, Karen Fernandez
Investigating the use of Software Agents to Reduce The Risk of Undetected Errors in Strategic Spreadsheet Applications
12 Pages, 3 Tables, 3 Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2003 147-159 ISBN 1 86166 199 1
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is an overlooked iceberg of problems in end user computing. Spreadsheets are developed by people who are very skilled in their main job function, be it finance, procurement, or production planning, but often have had no formal training in spreadsheet use. IT auditors focus on mainstream information systems but regard spreadsheets as user problems, outside their concerns. Internal auditors review processes, but not the tools that support decision making in these processes. This paper highlights the gaps between risk management and end user awareness in spreadsheet research. In addition the potential benefits of software agent technologies to the management of risk in spreadsheets are explored. This paper discusses the current research into end user computing and spreadsheet use awareness.
[ { "version": "v1", "created": "Sun, 1 Jun 2008 23:51:12 GMT" } ]
2008-06-03T00:00:00
[ [ "Cleary", "Pat", "" ], [ "Ball", "Dr David", "" ], [ "Madahar", "Mukul", "" ], [ "Thorne", "Simon", "" ], [ "Gosling", "Christopher", "" ], [ "Fernandez", "Karen", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0806.0250
Arjen Hommersom
Arjen Hommersom, Peter J.F. Lucas, and Patrick van Bommel
Checking the Quality of Clinical Guidelines using Automated Reasoning Tools
To appear in Theory and Practice of Logic Programming
null
null
null
cs.AI cs.LO cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Requirements about the quality of clinical guidelines can be represented by schemata borrowed from the theory of abductive diagnosis, using temporal logic to model the time-oriented aspects expressed in a guideline. Previously, we have shown that these requirements can be verified using interactive theorem proving techniques. In this paper, we investigate how this approach can be mapped to the facilities of a resolution-based theorem prover, Otter, and a complementary program that searches for finite models of first-order statements, Mace. It is shown that the reasoning required for checking the quality of a guideline can be mapped to such fully automated theorem-proving facilities. The medical quality of an actual guideline concerning diabetes mellitus 2 is investigated in this way.
[ { "version": "v1", "created": "Mon, 2 Jun 2008 11:02:40 GMT" } ]
2008-12-18T00:00:00
[ [ "Hommersom", "Arjen", "" ], [ "Lucas", "Peter J. F.", "" ], [ "van Bommel", "Patrick", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0806.0253
Oleg Verbitsky
Alexander Ravsky and Oleg Verbitsky
On collinear sets in straight line drawings
Several small amendments; 21 pages, 11 figures
null
null
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider straight line drawings of a planar graph $G$ with possible edge crossings. The \emph{untangling problem} is to eliminate all edge crossings by moving as few vertices as possible to new positions. Let $fix(G)$ denote the maximum number of vertices that can be left fixed in the worst case. In the \emph{allocation problem}, we are given a planar graph $G$ on $n$ vertices together with an $n$-point set $X$ in the plane and have to draw $G$ without edge crossings so that as many vertices as possible are located in $X$. Let $fit(G)$ denote the maximum number of points fitting this purpose in the worst case. As $fix(G)\le fit(G)$, we are interested in upper bounds for the latter and lower bounds for the former parameter. For each $\epsilon>0$, we construct an infinite sequence of graphs with $fit(G)=O(n^{\sigma+\epsilon})$, where $\sigma<0.99$ is a known graph-theoretic constant, namely the shortness exponent for the class of cubic polyhedral graphs. To the best of our knowledge, this is the first example of graphs with $fit(G)=o(n)$. On the other hand, we prove that $fix(G)\ge\sqrt{n/30}$ for all $G$ with tree-width at most 2. This extends the lower bound obtained by Goaoc et al. [Discrete and Computational Geometry 42:542-569 (2009)] for outerplanar graphs. Our upper bound for $fit(G)$ is based on the fact that the constructed graphs can have only few collinear vertices in any crossing-free drawing. To prove the lower bound for $fix(G)$, we show that graphs of tree-width 2 admit drawings that have large sets of collinear vertices with some additional special properties.
[ { "version": "v1", "created": "Mon, 2 Jun 2008 18:01:35 GMT" }, { "version": "v2", "created": "Mon, 28 Jul 2008 12:17:43 GMT" }, { "version": "v3", "created": "Tue, 8 Mar 2011 09:43:57 GMT" }, { "version": "v4", "created": "Tue, 8 Nov 2011 15:18:17 GMT" }, { "version": "v5", "created": "Fri, 11 Nov 2011 12:09:51 GMT" } ]
2011-11-14T00:00:00
[ [ "Ravsky", "Alexander", "" ], [ "Verbitsky", "Oleg", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0806.0282
Jukka Suomela
Patrik Flor\'een, Marja Hassinen, Petteri Kaski, Jukka Suomela
Local approximation algorithms for a class of 0/1 max-min linear programs
7 pages, 3 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the applicability of distributed, local algorithms to 0/1 max-min LPs where the objective is to maximise ${\min_k \sum_v c_{kv} x_v}$ subject to ${\sum_v a_{iv} x_v \le 1}$ for each $i$ and ${x_v \ge 0}$ for each $v$. Here $c_{kv} \in \{0,1\}$, $a_{iv} \in \{0,1\}$, and the support sets ${V_i = \{v : a_{iv} > 0 \}}$ and ${V_k = \{v : c_{kv}>0 \}}$ have bounded size; in particular, we study the case $|V_k| \le 2$. Each agent $v$ is responsible for choosing the value of $x_v$ based on information within its constant-size neighbourhood; the communication network is the hypergraph where the sets $V_k$ and $V_i$ constitute the hyperedges. We present a local approximation algorithm which achieves an approximation ratio arbitrarily close to the theoretical lower bound presented in prior work.
[ { "version": "v1", "created": "Mon, 2 Jun 2008 14:27:46 GMT" } ]
2008-12-18T00:00:00
[ [ "Floréen", "Patrik", "" ], [ "Hassinen", "Marja", "" ], [ "Kaski", "Petteri", "" ], [ "Suomela", "Jukka", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0806.0283
Dmitry Lande
D.V. Lande
Model of information diffusion
5 pages, 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The system of cellular automata, which expresses the process of dissemination and publication of the news among separate information resources, has been described. A bell-shaped dependence of news diffusion on internet-sources (web-sites) coheres well with a real behavior of thematic data flows, and at local time spans - with noted models, e.g., exponential and logistic ones.
[ { "version": "v1", "created": "Mon, 2 Jun 2008 14:22:41 GMT" } ]
2008-12-18T00:00:00
[ [ "Lande", "D. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.0311
Dieter Mitsche
J. Diaz, D. Mitsche, X. Perez
On the Probability of the Existence of Fixed-Size Components in Random Geometric Graphs
14 pages, 5 figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we give precise asymptotic expressions on the probability of the existence of fixed-size components at the threshold of connectivity for random geometric graphs.
[ { "version": "v1", "created": "Mon, 2 Jun 2008 15:44:38 GMT" }, { "version": "v2", "created": "Tue, 3 Jun 2008 09:49:01 GMT" }, { "version": "v3", "created": "Wed, 23 Jul 2008 13:13:26 GMT" } ]
2008-07-23T00:00:00
[ [ "Diaz", "J.", "" ], [ "Mitsche", "D.", "" ], [ "Perez", "X.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0806.0314
Nicholas Manoukis
N. C. Manoukis and E. C. Anderson
GuiLiner: A Configurable and Extensible Graphical User Interface for Scientific Analysis and Simulation Software
4 pages; for the current version of this software, please visit http://guiliner.sourceforge.net/
null
null
null
cs.HC cs.SE
http://creativecommons.org/licenses/publicdomain/
The computer programs most users interact with daily are driven by a graphical user interface (GUI). However, many scientific applications are used with a command line interface (CLI) for the ease of development and increased flexibility this mode provides. Scientific application developers would benefit from being able to provide a GUI easily for their CLI programs, thus retaining the advantages of both modes of interaction. GuiLiner is a generic, extensible and flexible front-end designed to ``host'' a wide variety of data analysis or simulation programs. Scientific application developers who produce a correctly formatted XML file describing their program's options and some of its documentation can immediately use GuiLiner to produce a carefully implemented GUI for their analysis or simulation programs.
[ { "version": "v1", "created": "Mon, 2 Jun 2008 15:57:55 GMT" } ]
2008-06-03T00:00:00
[ [ "Manoukis", "N. C.", "" ], [ "Anderson", "E. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0806.0341
David Eppstein
David Eppstein and Michael T. Goodrich
Succinct Greedy Graph Drawing in the Hyperbolic Plane
12 pages, 8 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an efficient method for drawing any n-vertex simple graph G in the hyperbolic plane. Our algorithm produces greedy drawings, which support greedy geometric routing, so that a message M between any pair of vertices may be routed geometrically, simply by having each vertex that receives M pass it along to any neighbor that is closer in the hyperbolic metric to the message's eventual destination. More importantly, for networking applications, our algorithm produces succinct drawings, in that each of the vertex positions in one of our embeddings can be represented using O(log n) bits and the calculation of which neighbor to send a message to may be performed efficiently using these representations. These properties are useful, for example, for routing in sensor networks, where storage and bandwidth are limited.
[ { "version": "v1", "created": "Mon, 2 Jun 2008 17:35:58 GMT" } ]
2008-06-03T00:00:00
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0806.0398
Wesley Calvert
Wesley Calvert
Metric Structures and Probabilistic Computation
null
null
null
null
math.LO cs.LO math.FA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Continuous first-order logic is used to apply model-theoretic analysis to analytic structures (e.g. Hilbert spaces, Banach spaces, probability spaces, etc.). Classical computable model theory is used to examine the algorithmic structure of mathematical objects that can be described in classical first-order logic. The present paper shows that probabilistic computation (sometimes called randomized computation) can play an analogous role for structures described in continuous first-order logic. The main result of this paper is an effective completeness theorem, showing that every decidable continuous first-order theory has a probabilistically decidable model. Later sections give examples of the application of this framework to various classes of structures, and to some problems of computational complexity theory.
[ { "version": "v1", "created": "Mon, 2 Jun 2008 21:15:00 GMT" } ]
2008-06-04T00:00:00
[ [ "Calvert", "Wesley", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" } ]
0806.0473
Damien Chablat
Damien Chablat (IRCCyN)
Kinematic Analysis of the vertebra of an eel like robot
null
Dans ASME Design Engineering Technical Conferences - 32nd Annual Mechanisms and Robotics Conference (MR), New-York : \'Etats-Unis d'Am\'erique (2008)
null
null
cs.RO physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The kinematic analysis of a spherical wrist with parallel architecture is the object of this article. This study is part of a larger French project, which aims to design and to build an eel like robot to imitate the eel swimming. To implement direct and inverse kinematics on the control law of the prototype, we need to evaluate the workspace without any collisions between the different bodies. The tilt and torsion parameters are used to represent the workspace.
[ { "version": "v1", "created": "Tue, 3 Jun 2008 09:33:53 GMT" } ]
2008-12-18T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0806.0478
Akira Terui
Akira Terui
Subresultants in Recursive Polynomial Remainder Sequence
13 pages. Presented at CASC 2003 (Passau, Germany, September 20-26, 2003)
Proceedings of The 6th International Workshop on Computer Algebra in Scientific Computing: CASC 2003, Institute for Informatics, Technische Universitat Munchen, Garching, Germanay, 2003, 363-375
null
null
math.AC cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce concepts of "recursive polynomial remainder sequence (PRS)" and "recursive subresultant," and investigate their properties. In calculating PRS, if there exists the GCD (greatest common divisor) of initial polynomials, we calculate "recursively" with new PRS for the GCD and its derivative, until a constant is derived. We call such a PRS a recursive PRS. We define recursive subresultants to be determinants representing the coefficients in recursive PRS by coefficients of initial polynomials. Finally, we discuss usage of recursive subresultants in approximate algebraic computation, which motivates the present work.
[ { "version": "v1", "created": "Tue, 3 Jun 2008 10:09:36 GMT" } ]
2010-07-13T00:00:00
[ [ "Terui", "Akira", "" ] ]
[ { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0806.0488
Akira Terui
Akira Terui
Recursive Polynomial Remainder Sequence and the Nested Subresultants
12 pages. Presented at CASC 2005 (Kalamata, Greece, Septermber 12-16, 2005)
Computer Algebra in Scientific Computing (Proc. CASC 2005), Lecture Notes in Computer Science 3718, Springer, 2005, 445-456
10.1007/11555964_38
null
math.AC cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give two new expressions of subresultants, nested subresultant and reduced nested subresultant, for the recursive polynomial remainder sequence (PRS) which has been introduced by the author. The reduced nested subresultant reduces the size of the subresultant matrix drastically compared with the recursive subresultant proposed by the authors before, hence it is much more useful for investigation of the recursive PRS. Finally, we discuss usage of the reduced nested subresultant in approximate algebraic computation, which motivates the present work.
[ { "version": "v1", "created": "Tue, 3 Jun 2008 10:24:55 GMT" } ]
2010-07-13T00:00:00
[ [ "Terui", "Akira", "" ] ]
[ { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0806.0495
Akira Terui
Akira Terui
Recursive Polynomial Remainder Sequence and its Subresultants
30 pages. Preliminary versions of this paper have been presented at CASC 2003 (arXiv:0806.0478 [math.AC]) and CASC 2005 (arXiv:0806.0488 [math.AC])
Journal of Algebra, Vol. 320, No. 2, pp. 633-659, 2008
10.1016/j.jalgebra.2007.12.023
null
math.AC cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce concepts of "recursive polynomial remainder sequence (PRS)" and "recursive subresultant," along with investigation of their properties. A recursive PRS is defined as, if there exists the GCD (greatest common divisor) of initial polynomials, a sequence of PRSs calculated "recursively" for the GCD and its derivative until a constant is derived, and recursive subresultants are defined by determinants representing the coefficients in recursive PRS as functions of coefficients of initial polynomials. We give three different constructions of subresultant matrices for recursive subresultants; while the first one is built-up just with previously defined matrices thus the size of the matrix increases fast as the recursion deepens, the last one reduces the size of the matrix drastically by the Gaussian elimination on the second one which has a "nested" expression, i.e. a Sylvester matrix whose elements are themselves determinants.
[ { "version": "v1", "created": "Tue, 3 Jun 2008 10:52:48 GMT" } ]
2010-07-13T00:00:00
[ [ "Terui", "Akira", "" ] ]
[ { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0806.0519
Pradorn Sureephong
Pradorn Sureephong (LIESP, CAMT), Nopasit Chakpitak (CAMT), Laurent Buzon (LIESP), Abdelaziz Bouras (LIESP)
Cluster Development and Knowledge Exchange in Supply Chain
null
The Proceeding of International conference on Software Knowledge Information Management and Applications (SKIMA 2008), Katmandu : N\'epal (2008)
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Industry cluster and supply chain are in focus of every countries which rely on knowledge-based economy. Both focus on improving the competitiveness of firm in the industry in the different aspect. This paper tries to illustrate how the industry cluster can increase the supply chain performance. Then, the proposed methodology concentrates on the collaboration and knowledge exchange in supply chain. For improving the capability of the proposed methodology, information technology is applied to facilitate the communication and the exchange of knowledge between the actors of the supply chain within the cluster. The supply chain of French stool producer was used as a case study to validate the methodology and to demonstrate the result of the study.
[ { "version": "v1", "created": "Tue, 3 Jun 2008 12:24:14 GMT" } ]
2008-12-18T00:00:00
[ [ "Sureephong", "Pradorn", "", "LIESP, CAMT" ], [ "Chakpitak", "Nopasit", "", "CAMT" ], [ "Buzon", "Laurent", "", "LIESP" ], [ "Bouras", "Abdelaziz", "", "LIESP" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0806.0526
Pradorn Sureephong
Pradorn Sureephong (LIESP, CAMT), Nopasit Chakpitak (CAMT), Yacine Ouzrout (LIESP), Abdelaziz Bouras (LIESP)
An Ontology-based Knowledge Management System for Industry Clusters
null
Dans Proceeding of International Conference on Advanced Design and Manufacture - International Conference on Advanced Design and Manufacture (ICADAM 2008), Sanya : Chine (2008)
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Knowledge-based economy forces companies in the nation to group together as a cluster in order to maintain their competitiveness in the world market. The cluster development relies on two key success factors which are knowledge sharing and collaboration between the actors in the cluster. Thus, our study tries to propose knowledge management system to support knowledge management activities within the cluster. To achieve the objectives of this study, ontology takes a very important role in knowledge management process in various ways; such as building reusable and faster knowledge-bases, better way for representing the knowledge explicitly. However, creating and representing ontology create difficulties to organization due to the ambiguity and unstructured of source of knowledge. Therefore, the objectives of this paper are to propose the methodology to create and represent ontology for the organization development by using knowledge engineering approach. The handicraft cluster in Thailand is used as a case study to illustrate our proposed methodology.
[ { "version": "v1", "created": "Tue, 3 Jun 2008 12:38:50 GMT" } ]
2008-12-18T00:00:00
[ [ "Sureephong", "Pradorn", "", "LIESP, CAMT" ], [ "Chakpitak", "Nopasit", "", "CAMT" ], [ "Ouzrout", "Yacine", "", "LIESP" ], [ "Bouras", "Abdelaziz", "", "LIESP" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.0535
Joerg Rothe
Gabor Erdelyi, Markus Nowak, and Joerg Rothe
Sincere-Strategy Preference-Based Approval Voting Fully Resists Constructive Control and Broadly Resists Destructive Control
26 pages
null
null
null
cs.GT cs.CC cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study sincere-strategy preference-based approval voting (SP-AV), a system proposed by Brams and Sanver [Electoral Studies, 25(2):287-305, 2006], and here adjusted so as to coerce admissibility of the votes (rather than excluding inadmissible votes a priori), with respect to procedural control. In such control scenarios, an external agent seeks to change the outcome of an election via actions such as adding/deleting/partitioning either candidates or voters. SP-AV combines the voters' preference rankings with their approvals of candidates, where in elections with at least two candidates the voters' approval strategies are adjusted--if needed--to approve of their most-preferred candidate and to disapprove of their least-preferred candidate. This rule coerces admissibility of the votes even in the presence of control actions, and hybridizes, in effect, approval with pluralitiy voting. We prove that this system is computationally resistant (i.e., the corresponding control problems are NP-hard) to 19 out of 22 types of constructive and destructive control. Thus, SP-AV has more resistances to control than is currently known for any other natural voting system with a polynomial-time winner problem. In particular, SP-AV is (after Copeland voting, see Faliszewski et al. [AAIM-2008, Springer LNCS 5034, pp. 165-176, 2008]) the second natural voting system with an easy winner-determination procedure that is known to have full resistance to constructive control, and unlike Copeland voting it in addition displays broad resistance to destructive control.
[ { "version": "v1", "created": "Tue, 3 Jun 2008 13:27:16 GMT" }, { "version": "v2", "created": "Tue, 3 Jun 2008 22:20:59 GMT" }, { "version": "v3", "created": "Sun, 7 Sep 2008 21:57:12 GMT" }, { "version": "v4", "created": "Fri, 26 Sep 2008 09:35:47 GMT" }, { "version": "v5", "created": "Fri, 12 Jun 2009 15:06:59 GMT" } ]
2009-06-12T00:00:00
[ [ "Erdelyi", "Gabor", "" ], [ "Nowak", "Markus", "" ], [ "Rothe", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0806.0557
Qin Li
Qin Li, Chengqing Li, Chunhui Wu, Dongyang Long, Changji Wang
An efficient and provably secure arbitrated quantum signature scheme
some contents are wrong
null
null
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, an efficient arbitrated quantum signature scheme is proposed by combining quantum cryptographic techniques and some ideas in classical cryptography. In the presented scheme, the signatory and the receiver can share a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the key shared between the signatory and the arbitrator or between the receiver and the arbitrator could be used only once, and thus each time when a signatory needs to sign, the signatory and the receiver have to obtain a new key shared with the arbitrator through a quantum key distribution protocol. Detailed theoretical analysis shows that the proposed scheme is efficient and provably secure.
[ { "version": "v1", "created": "Tue, 3 Jun 2008 14:23:48 GMT" }, { "version": "v2", "created": "Tue, 26 Aug 2008 08:28:11 GMT" }, { "version": "v3", "created": "Tue, 12 Jul 2011 03:55:19 GMT" }, { "version": "v4", "created": "Mon, 15 Jun 2020 02:05:00 GMT" } ]
2020-06-16T00:00:00
[ [ "Li", "Qin", "" ], [ "Li", "Chengqing", "" ], [ "Wu", "Chunhui", "" ], [ "Long", "Dongyang", "" ], [ "Wang", "Changji", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0806.0562
Dominique Bontemps
Dominique Bontemps (LM-Orsay)
Universal Coding on Infinite Alphabets: Exponentially Decreasing Envelopes
null
IEEE Transactions on Information Theory 57, 3 (2011) 1466 - 1478
10.1109/TIT.2010.2103831
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the problem of universal lossless coding on a countable infinite alphabet. It focuses on some classes of sources defined by an envelope condition on the marginal distribution, namely exponentially decreasing envelope classes with exponent $\alpha$. The minimax redundancy of exponentially decreasing envelope classes is proved to be equivalent to $\frac{1}{4 \alpha \log e} \log^2 n$. Then a coding strategy is proposed, with a Bayes redundancy equivalent to the maximin redundancy. At last, an adaptive algorithm is provided, whose redundancy is equivalent to the minimax redundancy
[ { "version": "v1", "created": "Tue, 3 Jun 2008 14:46:29 GMT" }, { "version": "v2", "created": "Mon, 31 May 2010 08:27:58 GMT" } ]
2011-07-07T00:00:00
[ [ "Bontemps", "Dominique", "", "LM-Orsay" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.0576
Wojciech Mazurczyk
Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk
Steganographic Routing in Multi Agent System Environment
9 pages, 10 figures,
"Secured Information Systems" of Journal of Information Assurance and Security (JIAS), Dynamic Publishers Inc., Atlanta, GA 30362, USA, Volume 2, Issue 3, September 2007, pp. 235-243, ISSN 1554-1010
null
null
cs.CR cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an idea of trusted communication platform for Multi-Agent Systems (MAS) called TrustMAS. Based on analysis of routing protocols suitable for MAS we have designed a new proactive hidden routing. Proposed steg-agents discovery procedure, as well as further routes updates and hidden communication, are cryptographically independent. Steganographic exchange can cover heterogeneous and geographically outlying environments using available cross-layer covert channels. Finally we have specified rules that agents have to follow to benefit the TrustMAS distributed router platform.
[ { "version": "v1", "created": "Tue, 3 Jun 2008 16:15:16 GMT" } ]
2008-06-04T00:00:00
[ [ "Szczypiorski", "Krzysztof", "" ], [ "Margasinski", "Igor", "" ], [ "Mazurczyk", "Wojciech", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0806.0579
Michael Fleyer
Michael Fleyer, Amir Rosenthal, Alex Linden, and Moshe Horowitz
Multirate Synchronous Sampling of Sparse Multiband Signals
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advances in optical systems make them ideal for undersampling multiband signals that have high bandwidths. In this paper we propose a new scheme for reconstructing multiband sparse signals using a small number of sampling channels. The scheme, which we call synchronous multirate sampling (SMRS), entails gathering samples synchronously at few different rates whose sum is significantly lower than the Nyquist sampling rate. The signals are reconstructed by solving a system of linear equations. We have demonstrated an accurate and robust reconstruction of signals using a small number of sampling channels that operate at relatively high rates. Sampling at higher rates increases the signal to noise ratio in samples. The SMRS scheme enables a significant reduction in the number of channels required when the sampling rate increases. We have demonstrated, using only three sampling channels, an accurate sampling and reconstruction of 4 real signals (8 bands). The matrices that are used to reconstruct the signals in the SMRS scheme also have low condition numbers. This indicates that the SMRS scheme is robust to noise in signals. The success of the SMRS scheme relies on the assumption that the sampled signals are sparse. As a result most of the sampled spectrum may be unaliased in at least one of the sampling channels. This is in contrast to multicoset sampling schemes in which an alias in one channel is equivalent to an alias in all channels. We have demonstrated that the SMRS scheme obtains similar performance using 3 sampling channels and a total sampling rate 8 times the Landau rate to an implementation of a multicoset sampling scheme that uses 6 sampling channels with a total sampling rate of 13 times the Landau rate.
[ { "version": "v1", "created": "Tue, 3 Jun 2008 16:52:25 GMT" } ]
2008-06-04T00:00:00
[ [ "Fleyer", "Michael", "" ], [ "Rosenthal", "Amir", "" ], [ "Linden", "Alex", "" ], [ "Horowitz", "Moshe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.0604
Wei Wang
Wei Wang, Martin J. Wainwright, Kannan Ramchandran
Information-theoretic limits on sparse signal recovery: Dense versus sparse measurement matrices
Appeared as UC Berkeley, Department of Statistics, Technical Report
null
null
null
math.ST cs.IT math.IT stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the information-theoretic limits of exactly recovering the support of a sparse signal using noisy projections defined by various classes of measurement matrices. Our analysis is high-dimensional in nature, in which the number of observations $n$, the ambient signal dimension $p$, and the signal sparsity $k$ are all allowed to tend to infinity in a general manner. This paper makes two novel contributions. First, we provide sharper necessary conditions for exact support recovery using general (non-Gaussian) dense measurement matrices. Combined with previously known sufficient conditions, this result yields sharp characterizations of when the optimal decoder can recover a signal for various scalings of the sparsity $k$ and sample size $n$, including the important special case of linear sparsity ($k = \Theta(p)$) using a linear scaling of observations ($n = \Theta(p)$). Our second contribution is to prove necessary conditions on the number of observations $n$ required for asymptotically reliable recovery using a class of $\gamma$-sparsified measurement matrices, where the measurement sparsity $\gamma(n, p, k) \in (0,1]$ corresponds to the fraction of non-zero entries per row. Our analysis allows general scaling of the quadruplet $(n, p, k, \gamma)$, and reveals three different regimes, corresponding to whether measurement sparsity has no effect, a minor effect, or a dramatic effect on the information-theoretic limits of the subset recovery problem.
[ { "version": "v1", "created": "Tue, 3 Jun 2008 18:29:00 GMT" } ]
2008-06-04T00:00:00
[ [ "Wang", "Wei", "" ], [ "Wainwright", "Martin J.", "" ], [ "Ramchandran", "Kannan", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0806.0676
Rui Zhang
Rui Zhang
On Peak versus Average Interference Power Constraints for Protecting Primary Users in Cognitive Radio Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers spectrum sharing for wireless communication between a cognitive radio (CR) link and a primary radio (PR) link. It is assumed that the CR protects the PR transmission by applying the so-called interference-temperature constraint, whereby the CR is allowed to transmit regardless of the PR's on/off status provided that the resultant interference power level at the PR receiver is kept below some predefined threshold. For the fading PR and CR channels, the interference-power constraint at the PR receiver is usually one of the following two types: One is to regulate the average interference power (AIP) over all the fading states, while the other is to limit the peak interference power (PIP) at each fading state. From the CR's perspective, given the same average and peak power threshold, the AIP constraint is more favorable than the PIP counterpart because of its more flexibility for dynamically allocating transmit powers over the fading states. On the contrary, from the perspective of protecting the PR, the more restrictive PIP constraint appears at a first glance to be a better option than the AIP. Some surprisingly, this paper shows that in terms of various forms of capacity limits achievable for the PR fading channel, e.g., the ergodic and outage capacities, the AIP constraint is also superior over the PIP. This result is based upon an interesting interference diversity phenomenon, i.e., randomized interference powers over the fading states in the AIP case are more advantageous over deterministic ones in the PIP case for minimizing the resultant PR capacity losses. Therefore, the AIP constraint results in larger fading channel capacities than the PIP for both the CR and PR transmissions.
[ { "version": "v1", "created": "Wed, 4 Jun 2008 01:33:57 GMT" }, { "version": "v2", "created": "Fri, 12 Sep 2008 07:33:08 GMT" } ]
2008-09-12T00:00:00
[ [ "Zhang", "Rui", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.0689
Hongjun Jia
Hongjun Jia, Li Zhang
Directional Cross Diamond Search Algorithm for Fast Block Motion Estimation
23 pages, 9 figures, technical report, related paper under submission
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In block-matching motion estimation (BMME), the search patterns have a significant impact on the algorithm's performance, both the search speed and the search quality. The search pattern should be designed to fit the motion vector probability (MVP) distribution characteristics of the real-world sequences. In this paper, we build a directional model of MVP distribution to describe the directional-center-biased characteristic of the MVP distribution and the directional characteristics of the conditional MVP distribution more exactly based on the detailed statistical data of motion vectors of eighteen popular sequences. Three directional search patterns are firstly designed by utilizing the directional characteristics and they are the smallest search patterns among the popular ones. A new algorithm is proposed using the horizontal cross search pattern as the initial step and the horizontal/vertical diamond search pattern as the subsequent step for the fast BMME, which is called the directional cross diamond search (DCDS) algorithm. The DCDS algorithm can obtain the motion vector with fewer search points than CDS, DS or HEXBS while maintaining the similar or even better search quality. The gain on speedup of DCDS over CDS or DS can be up to 54.9%. The simulation results show that DCDS is efficient, effective and robust, and it can always give the faster search speed on different sequences than other fast block-matching algorithm in common use.
[ { "version": "v1", "created": "Wed, 4 Jun 2008 05:05:19 GMT" } ]
2008-06-05T00:00:00
[ [ "Jia", "Hongjun", "" ], [ "Zhang", "Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0806.0740
Agus Budiyono PhD
J. Muliadi, S.D. Jenie, A. Budiyono
Modeling And Simulation Of Prolate Dual-Spin Satellite Dynamics In An Inclined Elliptical Orbit: Case Study Of Palapa B2R Satellite
13 pages, 22 figures
Symposium on Aerospace Science and Technology, Jakarta, 2005
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In response to the interest to re-use Palapa B2R satellite nearing its End of Life (EOL) time, an idea to incline the satellite orbit in order to cover a new region has emerged in the recent years. As a prolate dual-spin vehicle, Palapa B2R has to be stabilized against its internal energy dissipation effect. This work is focused on analyzing the dynamics of the reusable satellite in its inclined orbit. The study discusses in particular the stability of the prolate dual-spin satellite under the effect of perturbed field of gravitation due to the inclination of its elliptical orbit. Palapa B2R physical data was substituted into the dual-spin's equation of motion. The coefficient of zonal harmonics J2 was induced into the gravity-gradient moment term that affects the satellite attitude. The satellite's motion and attitude were then simulated in the perturbed gravitational field by J2, with the variation of orbit's eccentricity and inclination. The analysis of the satellite dynamics and its stability was conducted for designing a control system for the vehicle in its new inclined orbit.
[ { "version": "v1", "created": "Wed, 4 Jun 2008 10:33:07 GMT" } ]
2008-06-05T00:00:00
[ [ "Muliadi", "J.", "" ], [ "Jenie", "S. D.", "" ], [ "Budiyono", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0806.0743
Agus Budiyono PhD
A. Budiyono
Onboard Multivariable Controller Design for a Small Scale Helicopter Using Coefficient Diagram Method
8 pages, 6 figures
Proceedings of the ICEST, Seoul, Korea, May 2005
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A mini scale helicopter exhibits not only increased sensitivity to control inputs and disturbances, but also higher bandwidth of its dynamics. These properties make model helicopters, as a flying robot, more difficult to control. The dynamics model accuracy will determine the performance of the designed controller. It is attractive in this regards to have a controller that can accommodate the unmodeled dynamics or parameter changes and perform well in such situations. Coefficient Diagram Method (CDM) is chosen as the candidate to synthesize such a controller due to its simplicity and convenience in demonstrating integrated performance measures including equivalent time constant, stability indices and robustness. In this study, CDM is implemented for a design of multivariable controller for a small scale helicopter during hover and cruise flight. In the synthesis of MIMO CDM, good design common sense based on hands-on experience is necessary. The low level controller algorithm is designed as part of hybrid supervisory control architecture to be implemented on an onboard computer system. Its feasibility and performance are evaluated based on its robustness, desired time domain system responses and compliance to hard-real time requirements.
[ { "version": "v1", "created": "Wed, 4 Jun 2008 10:45:49 GMT" } ]
2008-06-05T00:00:00
[ [ "Budiyono", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0806.0784
Sylvie Saget
Sylvie Saget, Francois Legras, Gilles Coppin
Collaborative model of interaction and Unmanned Vehicle Systems' interface
null
Dans HCP workshop on "Supervisory Control in Critical Systems Management" - 3rd International Conference on Human Centered Processes (HCP-2008), Delft : Pays-Bas (2008)
null
null
cs.AI cs.HC cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The interface for the next generation of Unmanned Vehicle Systems should be an interface with multi-modal displays and input controls. Then, the role of the interface will not be restricted to be a support of the interactions between the ground operator and vehicles. Interface must take part in the interaction management too. In this paper, we show that recent works in pragmatics and philosophy provide a suitable theoretical framework for the next generation of UV System's interface. We concentrate on two main aspects of the collaborative model of interaction based on acceptance: multi-strategy approach for communicative act generation and interpretation and communicative alignment.
[ { "version": "v1", "created": "Wed, 4 Jun 2008 14:22:38 GMT" } ]
2008-12-18T00:00:00
[ [ "Saget", "Sylvie", "" ], [ "Legras", "Francois", "" ], [ "Coppin", "Gilles", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0806.0837
Leonid Reyzin
Nenad Dedi\'c, Gene Itkis, Leonid Reyzin, Scott Russell
Upper and Lower Bounds on Black-Box Steganography
27 pages; to be published in Journal of Cryptology
null
10.1007/s00145-008-9020-3
null
cs.CR cs.CC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the limitations of steganography when the sender is not using any properties of the underlying channel beyond its entropy and the ability to sample from it. On the negative side, we show that the number of samples the sender must obtain from the channel is exponential in the rate of the stegosystem. On the positive side, we present the first secret-key stegosystem that essentially matches this lower bound regardless of the entropy of the underlying channel. Furthermore, for high-entropy channels, we present the first secret-key stegosystem that matches this lower bound statelessly (i.e., without requiring synchronized state between sender and receiver).
[ { "version": "v1", "created": "Wed, 4 Jun 2008 19:07:48 GMT" } ]
2008-06-05T00:00:00
[ [ "Dedić", "Nenad", "" ], [ "Itkis", "Gene", "" ], [ "Reyzin", "Leonid", "" ], [ "Russell", "Scott", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.0838
Javad Kazemitabar
Javad Kazemitabar and Hamid Jafarkhani
Performance Analysis of Multiple Antenna Multi-User Detection
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive the diversity order of some multiple antenna multi-user cancellation and detection schemes. The common property of these detection methods is the usage of Alamouti and quasi-orthogonal space-time block codes. For detecting $J$ users each having $N$ transmit antennas, these schemes require only $J$ antennas at the receiver. Our analysis shows that when having $M$ receive antennas, the array-processing schemes provide the diversity order of $N(M-J+1)$. In addition, our results prove that regardless of the number of users or receive antennas, when using maximum-likelihood decoding we get the full transmit and receive diversities, i.e. $NM$, similar to the no-interference scenario.
[ { "version": "v1", "created": "Wed, 4 Jun 2008 19:13:59 GMT" } ]
2008-06-05T00:00:00
[ [ "Kazemitabar", "Javad", "" ], [ "Jafarkhani", "Hamid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.0840
Mugurel Ionut Andreica
Mugurel Ionut Andreica
A Dynamic Programming Framework for Combinatorial Optimization Problems on Graphs with Bounded Pathwidth
Some of the ideas presented in this paper were later used by the author for preparing algorithmic tasks for several contests where the author was a member of the scientific committee (e.g. ACM ICPC Southeastern regional contest 2009 and Balkan olympiad in informatics 2011). Such tasks (including the task statement and solutions) can be found in the attached zip archive; THETA 16 / AQTR, Cluj-Napoca : Romania (2008)
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an algorithmic framework for solving a class of combinatorial optimization problems on graphs with bounded pathwidth. The problems are NP-hard in general, but solvable in linear time on this type of graphs. The problems are relevant for assessing network reliability and improving the network's performance and fault tolerance. The main technique considered in this paper is dynamic programming.
[ { "version": "v1", "created": "Wed, 4 Jun 2008 19:18:45 GMT" }, { "version": "v2", "created": "Mon, 17 Dec 2012 14:03:58 GMT" } ]
2012-12-18T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0806.0860
Amit K Awasthi
Amit K Awasthi
On the Security of Liaw et al.'s Scheme
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, Liaw et al. proposed a remote user authentication scheme using smartcards. They claimed a number of features of their scheme, e.g. a dictionary of verification tables is not required to authenticate users; users can choose their password freely; mutual authentication is provided between the user and the remote system; the communication cost and the computational cost are very low; users can update their password after the registration phase; a session key agreed by the user and the remote system is generated in every session; and the nonce-based scheme which does not require a timestamp (to solve the serious time synchronization problem) etc. In this paper We show that Liaw et al.'s scheme does not stand with various security requirements and is completely insecure. Keywords: Authentication, Smartcards, Remote system, Attack.
[ { "version": "v1", "created": "Wed, 4 Jun 2008 20:44:33 GMT" } ]
2008-06-06T00:00:00
[ [ "Awasthi", "Amit K", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0806.0870
Laurent Younes
Darryl D. Holm, Alain Trouve and Laurent Younes
The Euler-Poincare theory of Metamorphosis
null
null
null
null
cs.CV nlin.CD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the pattern matching approach to imaging science, the process of ``metamorphosis'' is template matching with dynamical templates. Here, we recast the metamorphosis equations of into the Euler-Poincare variational framework of and show that the metamorphosis equations contain the equations for a perfect complex fluid \cite{Ho2002}. This result connects the ideas underlying the process of metamorphosis in image matching to the physical concept of order parameter in the theory of complex fluids. After developing the general theory, we reinterpret various examples, including point set, image and density metamorphosis. We finally discuss the issue of matching measures with metamorphosis, for which we provide existence theorems for the initial and boundary value problems.
[ { "version": "v1", "created": "Wed, 4 Jun 2008 22:58:41 GMT" } ]
2008-06-14T00:00:00
[ [ "Holm", "Darryl D.", "" ], [ "Trouve", "Alain", "" ], [ "Younes", "Laurent", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" } ]
0806.0874
Vassilis Kostakos
Vassilis Kostakos
Towards sustainable transport: wireless detection of passenger trips on public transport buses
13 pages, 4 figures, 1 table
Personal and Ubiquitous Computing, 17(8):1807-1816, 2013
10.1007/s00779-013-0652-4
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important problem in creating efficient public transport is obtaining data about the set of trips that passengers make, usually referred to as an Origin/Destination (OD) matrix. Obtaining this data is problematic and expensive in general, especially in the case of buses because on-board ticketing systems do not record where and when passengers get off a bus. In this paper we describe a novel and inexpensive system that uses off-the-shelf Bluetooth hardware to accurately record passenger journeys. Here we show how our system can be used to derive passenger OD matrices, and additionally we show how our data can be used to further improve public transport services.
[ { "version": "v1", "created": "Wed, 4 Jun 2008 23:40:04 GMT" }, { "version": "v2", "created": "Fri, 6 Jun 2008 11:38:20 GMT" }, { "version": "v3", "created": "Wed, 6 Aug 2008 19:47:19 GMT" }, { "version": "v4", "created": "Fri, 8 Aug 2008 08:17:45 GMT" } ]
2013-12-05T00:00:00
[ [ "Kostakos", "Vassilis", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0806.0899
Victor Patrangenaru
V. Patrangenaru, X. Liu, S. Sugathadasa
A Nonparametric Approach to 3D Shape Analysis from Digital Camera Images - I. in Memory of W.P. Dayawansa
24 pages
null
null
null
stat.ME cs.CV math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, for the first time, one develops a nonparametric methodology for an analysis of shapes of configurations of landmarks on real 3D objects from regular camera photographs, thus making 3D shape analysis very accessible. A fundamental result in computer vision by Faugeras (1992), Hartley, Gupta and Chang (1992) is that generically, a finite 3D configuration of points can be retrieved up to a projective transformation, from corresponding configurations in a pair of camera images. Consequently, the projective shape of a 3D configuration can be retrieved from two of its planar views. Given the inherent registration errors, the 3D projective shape can be estimated from a sample of photos of the scene containing that configuration. Projective shapes are here regarded as points on projective shape manifolds. Using large sample and nonparametric bootstrap methodology for extrinsic means on manifolds, one gives confidence regions and tests for the mean projective shape of a 3D configuration from its 2D camera images.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 04:26:49 GMT" } ]
2008-06-14T00:00:00
[ [ "Patrangenaru", "V.", "" ], [ "Liu", "X.", "" ], [ "Sugathadasa", "S.", "" ] ]
[ { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0806.0903
Ming-Yang Chen
Shao-Lun Huang, Ming-Yang Chen, Kwang-Cheng Chen, John M. Cioffi
On the Capacity of Gaussian Relay Channels
This article has been withdrawn
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn due to that the same conclusion has been proposed before.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 07:39:04 GMT" }, { "version": "v2", "created": "Tue, 10 Jun 2008 22:42:12 GMT" } ]
2008-06-11T00:00:00
[ [ "Huang", "Shao-Lun", "" ], [ "Chen", "Ming-Yang", "" ], [ "Chen", "Kwang-Cheng", "" ], [ "Cioffi", "John M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.0905
Himal Suraweera Dr.
Himal A. Suraweera, Jason Gao, Peter J. Smith, Mansoor Shafi and Michael Faulkner
Channel Capacity Limits of Cognitive Radio in Asymmetric Fading Environments
6 pages, 8 figures, in Proceedings of IEEE International Conference on Communications (ICC 2008), Beijing, China, May 19-23, 2008
null
10.1109/ICC.2008.760
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive radio technology is an innovative radio design concept which aims to increase spectrum utilization by exploiting unused spectrum in dynamically changing environments. By extending previous results, we investigate the capacity gains achievable with this dynamic spectrum approach in asymmetric fading channels. More specifically, we allow the secondary-to-primary and secondary-to-secondary user channels to undergo Rayleigh or Rician fading, with arbitrary link power. In order to compute the capacity, we derive the distributions of ratios of Rayleigh and Rician variables. Compared to the symmetric fading scenario, our results indicate several interesting features of the capacity behaviour under both average and peak received power constraints. Finally, the impact of multiple primary users on the capacity under asymmetric fading has also been studied.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 07:51:07 GMT" } ]
2016-11-18T00:00:00
[ [ "Suraweera", "Himal A.", "" ], [ "Gao", "Jason", "" ], [ "Smith", "Peter J.", "" ], [ "Shafi", "Mansoor", "" ], [ "Faulkner", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.0909
Martin Haenggi
Martin Haenggi
Outage and Local Throughput and Capacity of Random Wireless Networks
22 pages, 6 figures. Submitted to IEEE Trans. Wireless
null
10.1109/TWC.2009.090105
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Outage probabilities and single-hop throughput are two important performance metrics that have been evaluated for certain specific types of wireless networks. However, there is a lack of comprehensive results for larger classes of networks, and there is no systematic approach that permits the convenient comparison of the performance of networks with different geometries and levels of randomness. The uncertainty cube is introduced to categorize the uncertainty present in a network. The three axes of the cube represent the three main potential sources of uncertainty in interference-limited networks: the node distribution, the channel gains (fading), and the channel access (set of transmitting nodes). For the performance analysis, a new parameter, the so-called {\em spatial contention}, is defined. It measures the slope of the outage probability in an ALOHA network as a function of the transmit probability $p$ at $p=0$. Outage is defined as the event that the signal-to-interference ratio (SIR) is below a certain threshold in a given time slot. It is shown that the spatial contention is sufficient to characterize outage and throughput in large classes of wireless networks, corresponding to different positions on the uncertainty cube. Existing results are placed in this framework, and new ones are derived. Further, interpreting the outage probability as the SIR distribution, the ergodic capacity of unit-distance links is determined and compared to the throughput achievable for fixed (yet optimized) transmission rates.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 06:15:38 GMT" } ]
2016-11-18T00:00:00
[ [ "Haenggi", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.0920
Alexander Wolff
Kevin Buchin, Maike Buchin, Jaroslaw Byrka, Martin N\"ollenburg, Yoshio Okamoto, Rodrigo I. Silveira, Alexander Wolff
Drawing (Complete) Binary Tanglegrams: Hardness, Approximation, Fixed-Parameter Tractability
Journal version
null
null
null
cs.CG cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A \emph{binary tanglegram} is a drawing of a pair of rooted binary trees whose leaf sets are in one-to-one correspondence; matching leaves are connected by inter-tree edges. For applications, for example, in phylogenetics, it is essential that both trees are drawn without edge crossings and that the inter-tree edges have as few crossings as possible. It is known that finding a tanglegram with the minimum number of crossings is NP-hard and that the problem is fixed-parameter tractable with respect to that number. We prove that under the Unique Games Conjecture there is no constant-factor approximation for binary trees. We show that the problem is NP-hard even if both trees are complete binary trees. For this case we give an $O(n^3)$-time 2-approximation and a new, simple fixed-parameter algorithm. We show that the maximization version of the dual problem for binary trees can be reduced to a version of MaxCut for which the algorithm of Goemans and Williamson yields a 0.878-approximation.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 09:31:57 GMT" }, { "version": "v2", "created": "Fri, 20 Jun 2008 09:13:11 GMT" }, { "version": "v3", "created": "Thu, 16 Sep 2010 13:34:08 GMT" } ]
2010-09-17T00:00:00
[ [ "Buchin", "Kevin", "" ], [ "Buchin", "Maike", "" ], [ "Byrka", "Jaroslaw", "" ], [ "Nöllenburg", "Martin", "" ], [ "Okamoto", "Yoshio", "" ], [ "Silveira", "Rodrigo I.", "" ], [ "Wolff", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0806.0921
Leslie Ann Goldberg
Leslie Ann Goldberg and Mark Jerrum and Marek Karpinski
The Mixing Time of Glauber Dynamics for Colouring Regular Trees
null
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider Metropolis Glauber dynamics for sampling proper $q$-colourings of the $n$-vertex complete $b$-ary tree when $3\leq q\leq b/2\ln(b)$. We give both upper and lower bounds on the mixing time. For fixed $q$ and $b$, our upper bound is $n^{O(b/\log b)}$ and our lower bound is $n^{\Omega(b/q \log(b))}$, where the constants implicit in the $O()$ and $\Omega()$ notation do not depend upon $n$, $q$ or $b$.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 19:58:32 GMT" } ]
2008-06-06T00:00:00
[ [ "Goldberg", "Leslie Ann", "" ], [ "Jerrum", "Mark", "" ], [ "Karpinski", "Marek", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0806.0928
Martin N\"ollenburg
Martin N\"ollenburg, Danny Holten, Markus V\"olker, Alexander Wolff
Drawing Binary Tanglegrams: An Experimental Evaluation
see http://www.siam.org/proceedings/alenex/2009/alx09_011_nollenburgm.pdf
Proceedings of the 11th Workshop on Algorithm Engineering and Experiments (ALENEX'09), pages 106-119. SIAM, April 2009
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A binary tanglegram is a pair <S,T> of binary trees whose leaf sets are in one-to-one correspondence; matching leaves are connected by inter-tree edges. For applications, for example in phylogenetics or software engineering, it is required that the individual trees are drawn crossing-free. A natural optimization problem, denoted tanglegram layout problem, is thus to minimize the number of crossings between inter-tree edges. The tanglegram layout problem is NP-hard and is currently considered both in application domains and theory. In this paper we present an experimental comparison of a recursive algorithm of Buchin et al., our variant of their algorithm, the algorithm hierarchy sort of Holten and van Wijk, and an integer quadratic program that yields optimal solutions.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 11:00:33 GMT" } ]
2009-05-15T00:00:00
[ [ "Nöllenburg", "Martin", "" ], [ "Holten", "Danny", "" ], [ "Völker", "Markus", "" ], [ "Wolff", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0806.0936
Roberto Amadio
Roberto Amadio (PPS)
On convergence-sensitive bisimulation and the embedding of CCS in timed CCS
null
Proceedings of the 15th Workshop on Expressiveness in Concurrency (EXPRESS 2008), Canada (2008)
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a notion of convergence-sensitive bisimulation that is built just over the notions of (internal) reduction and of (static) context. In the framework of timed CCS, we characterise this notion of `contextual' bisimulation via the usual labelled transition system. We also remark that it provides a suitable semantic framework for a fully abstract embedding of untimed processes into timed ones. Finally, we show that the notion can be refined to include sensitivity to divergence.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 09:32:07 GMT" }, { "version": "v2", "created": "Thu, 18 Sep 2008 14:12:21 GMT" } ]
2010-07-01T00:00:00
[ [ "Amadio", "Roberto", "", "PPS" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.0974
Claudio Castellano
Filippo Radicchi, Santo Fortunato, Claudio Castellano
Universality of citation distributions: towards an objective measure of scientific impact
7 pages, 5 figures. accepted for publication in Proc. Natl Acad. Sci. USA
Proc. Natl. Acad. Sci. USA 105, 17268-17272 (2008)
10.1073/pnas.0806977105
null
physics.soc-ph cond-mat.stat-mech cs.DL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the distributions of citations received by a single publication within several disciplines, spanning broad areas of science. We show that the probability that an article is cited $c$ times has large variations between different disciplines, but all distributions are rescaled on a universal curve when the relative indicator $c_f=c/c_0$ is considered, where $c_0$ is the average number of citations per article for the discipline. In addition we show that the same universal behavior occurs when citation distributions of articles published in the same field, but in different years, are compared. These findings provide a strong validation of $c_f$ as an unbiased indicator for citation performance across disciplines and years. Based on this indicator, we introduce a generalization of the h-index suitable for comparing scientists working in different fields.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 13:55:51 GMT" }, { "version": "v2", "created": "Mon, 27 Oct 2008 15:18:52 GMT" } ]
2008-11-04T00:00:00
[ [ "Radicchi", "Filippo", "" ], [ "Fortunato", "Santo", "" ], [ "Castellano", "Claudio", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0806.0983
Sandy Irani
Joan Boyar, Sandy Irani, Kim S. Larsen
A Comparison of Performance Measures for Online Algorithms
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides a systematic study of several proposed measures for online algorithms in the context of a specific problem, namely, the two server problem on three colinear points. Even though the problem is simple, it encapsulates a core challenge in online algorithms which is to balance greediness and adaptability. We examine Competitive Analysis, the Max/Max Ratio, the Random Order Ratio, Bijective Analysis and Relative Worst Order Analysis, and determine how these measures compare the Greedy Algorithm, Double Coverage, and Lazy Double Coverage, commonly studied algorithms in the context of server problems. We find that by the Max/Max Ratio and Bijective Analysis, Greedy is the best of the three algorithms. Under the other measures, Double Coverage and Lazy Double Coverage are better, though Relative Worst Order Analysis indicates that Greedy is sometimes better. Only Bijective Analysis and Relative Worst Order Analysis indicate that Lazy Double Coverage is better than Double Coverage. Our results also provide the first proof of optimality of an algorithm under Relative Worst Order Analysis.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 14:50:08 GMT" }, { "version": "v2", "created": "Fri, 12 Oct 2012 16:03:13 GMT" } ]
2012-10-15T00:00:00
[ [ "Boyar", "Joan", "" ], [ "Irani", "Sandy", "" ], [ "Larsen", "Kim S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0806.1006
Giuseppe Longo
M. Brescia, S. Cavuoti, G. d'Angelo, R. D'Abrusco, N. Deniskina, M. Garofalo, O. Laurino, G. Longo, A. Nocella, B. Skordovski
The VO-Neural project: recent developments and some applications
Contributed, Data Centre Alliance Workshops: GRID and the Virtual Observatory, April 9-11 Munich, to appear in Mem. SAIt
null
null
null
astro-ph cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
VO-Neural is the natural evolution of the Astroneural project which was started in 1994 with the aim to implement a suite of neural tools for data mining in astronomical massive data sets. At a difference with its ancestor, which was implemented under Matlab, VO-Neural is written in C++, object oriented, and it is specifically tailored to work in distributed computing architectures. We discuss the current status of implementation of VO-Neural, present an application to the classification of Active Galactic Nuclei, and outline the ongoing work to improve the functionalities of the package.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 16:44:23 GMT" } ]
2008-06-14T00:00:00
[ [ "Brescia", "M.", "" ], [ "Cavuoti", "S.", "" ], [ "d'Angelo", "G.", "" ], [ "D'Abrusco", "R.", "" ], [ "Deniskina", "N.", "" ], [ "Garofalo", "M.", "" ], [ "Laurino", "O.", "" ], [ "Longo", "G.", "" ], [ "Nocella", "A.", "" ], [ "Skordovski", "B.", "" ] ]
[ null, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0806.1034
Wojciech Mazurczyk
Wojciech Mazurczyk and Jozef Lubacz
Analysis of a procedure for inserting steganographic data into VoIP calls
9 pages, 4 figures, published in Proceedings of PGTS '08, the Fifth Polish-German Teletraffic Symposium
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper concerns performance analysis of a steganographic method, dedicated primarily for VoIP, which was recently filed for patenting under the name LACK. The performance of the method depends on the procedure of inserting covert data into the stream of audio packets. After a brief presentation of the LACK method, the paper focuses on analysis of the dependence of the insertion procedure on the probability distribution of VoIP call duration.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 19:04:55 GMT" }, { "version": "v2", "created": "Mon, 25 Aug 2008 10:35:55 GMT" } ]
2008-08-25T00:00:00
[ [ "Mazurczyk", "Wojciech", "" ], [ "Lubacz", "Jozef", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0806.1041
Prajakta Nimbhorkar
Samir Datta, Nutan Limaye, Prajakta Nimbhorkar
3-connected Planar Graph Isomorphism is in Log-space
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the isomorphism of 3-connected planar graphs can be decided in deterministic log-space. This improves the previously known bound UL$\cap$coUL of Thierauf and Wagner.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 19:33:29 GMT" } ]
2008-09-16T00:00:00
[ [ "Datta", "Samir", "" ], [ "Limaye", "Nutan", "" ], [ "Nimbhorkar", "Prajakta", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0806.1062
Hamidreza Farmanbar
Hamid Farmanbar and Amir K. Khandani
Capacity of Block-Memoryless Channels with Causal Channel Side Information
8 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity of a time-varying block-memoryless channel in which the transmitter and the receiver have access to (possibly different) noisy causal channel side information (CSI) is obtained. It is shown that the capacity formula obtained in this correspondence reduces to the capacity formula reported in \cite{Gold07} for the special case where the transmitter CSI is a deterministic function of the receiver CSI.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 21:38:56 GMT" } ]
2008-06-09T00:00:00
[ [ "Farmanbar", "Hamid", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.1071
Graham Cormode
Graham Cormode and Minos Garofalakis
Histograms and Wavelets on Probabilistic Data
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is a growing realization that uncertain information is a first-class citizen in modern database management. As such, we need techniques to correctly and efficiently process uncertain data in database systems. In particular, data reduction techniques that can produce concise, accurate synopses of large probabilistic relations are crucial. Similar to their deterministic relation counterparts, such compact probabilistic data synopses can form the foundation for human understanding and interactive data exploration, probabilistic query planning and optimization, and fast approximate query processing in probabilistic database systems. In this paper, we introduce definitions and algorithms for building histogram- and wavelet-based synopses on probabilistic data. The core problem is to choose a set of histogram bucket boundaries or wavelet coefficients to optimize the accuracy of the approximate representation of a collection of probabilistic tuples under a given error metric. For a variety of different error metrics, we devise efficient algorithms that construct optimal or near optimal B-term histogram and wavelet synopses. This requires careful analysis of the structure of the probability distributions, and novel extensions of known dynamic-programming-based techniques for the deterministic domain. Our experiments show that this approach clearly outperforms simple ideas, such as building summaries for samples drawn from the data distribution, while taking equal or less time.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 23:19:56 GMT" } ]
2008-06-09T00:00:00
[ [ "Cormode", "Graham", "" ], [ "Garofalakis", "Minos", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0806.1089
Inanc Inan
Feyza Keceli, Inanc Inan, Ender Ayanoglu
Fair and Efficient TCP Access in the IEEE 802.11 Infrastructure Basic Service Set
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When the stations in an IEEE 802.11 infrastructure Basic Service Set (BSS) employ Transmission Control Protocol (TCP) in the transport layer, this exacerbates per-flow unfair access which is a direct result of uplink/downlink bandwidth asymmetry in the BSS. We propose a novel and simple analytical model to approximately calculate the per-flow TCP congestion window limit that provides fair and efficient TCP access in a heterogeneous wired-wireless scenario. The proposed analysis is unique in that it considers the effects of varying number of uplink and downlink TCP flows, differing Round Trip Times (RTTs) among TCP connections, and the use of delayed TCP Acknowledgment (ACK) mechanism. Motivated by the findings of this analysis, we design a link layer access control block to be employed only at the Access Point (AP) in order to resolve the unfair access problem. The novel and simple idea of the proposed link layer access control block is employing a congestion control and filtering algorithm on TCP ACK packets of uplink flows, thereby prioritizing the access of TCP data packets of downlink flows at the AP. Via simulations, we show that short- and long-term fair access can be provisioned with the introduction of the proposed link layer access control block to the protocol stack of the AP while improving channel utilization and access delay.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 04:29:20 GMT" } ]
2008-06-09T00:00:00
[ [ "Keceli", "Feyza", "" ], [ "Inan", "Inanc", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.1093
Inanc Inan
Feyza Keceli, Inanc Inan, Ender Ayanoglu
Fair Access Provisioning through Contention Parameter Adaptation in the IEEE 802.11e Infrastructure Basic Service Set
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the station-based unfair access problem among the uplink and the downlink stations in the IEEE 802.11e infrastructure Basic Service Set (BSS) when the default settings of the Enhanced Distributed Channel Access (EDCA) parameters are used. We discuss how the transport layer protocol characteristics alleviate the unfairness problem. We design a simple, practical, and standard-compliant framework to be employed at the Access Point (AP) for fair and efficient access provisioning. A dynamic measurement-based EDCA parameter adaptation block lies in the core of this framework. The proposed framework is unique in the sense that it considers the characteristic differences of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) flows and the coexistence of stations with varying bandwidth or Quality-of-Service (QoS) requirements. Via simulations, we show that our solution provides short- and long-term fair access for all stations in the uplink and downlink employing TCP and UDP flows with non-uniform packet rates in a wired-wireless heterogeneous network. In the meantime, the QoS requirements of coexisting real-time flows are also maintained.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 05:04:02 GMT" } ]
2008-06-09T00:00:00
[ [ "Keceli", "Feyza", "" ], [ "Inan", "Inanc", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.1100
Adrian Paschke
Adrian Paschke
Design Patterns for Complex Event Processing
Paschke, A.: Design Patterns for Complex Event Processing, 2nd International Conference on Distributed Event-Based Systems (DEBS'08), Rome, Italy, 2008
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Currently engineering efficient and successful event-driven applications based on the emerging Complex Event Processing (CEP) technology, is a laborious trial and error process. The proposed CEP design pattern approach should support CEP engineers in their design decisions to build robust and efficient CEP solutions with well understood tradeoffs and should enable an interdisciplinary and efficient communication process about successful CEP solutions in different application domains.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 07:39:49 GMT" } ]
2008-06-09T00:00:00
[ [ "Paschke", "Adrian", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0806.1103
Guillaume Fertin
S\'ebastien Angibaud (LINA), Guillaume Fertin (LINA), Irena Rusu (LINA), Annelyse Thevenin (LRI), St\'ephane Vialette (IGM)
On the Approximability of Comparing Genomes with Duplicates
null
null
null
null
q-bio.QM cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A central problem in comparative genomics consists in computing a (dis-)similarity measure between two genomes, e.g. in order to construct a phylogeny. All the existing measures are defined on genomes without duplicates. However, we know that genes can be duplicated within the same genome. One possible approach to overcome this difficulty is to establish a one-to-one correspondence (i.e. a matching) between genes of both genomes, where the correspondence is chosen in order to optimize the studied measure. In this paper, we are interested in three measures (number of breakpoints, number of common intervals and number of conserved intervals) and three models of matching (exemplar, intermediate and maximum matching models). We prove that, for each model and each measure M, computing a matching between two genomes that optimizes M is APX-hard. We also study the complexity of the following problem: is there an exemplarization (resp. an intermediate/maximum matching) that induces no breakpoint? We prove the problem to be NP-Complete in the exemplar model for a new class of instances, and we show that the problem is in P in the maximum matching model. We also focus on a fourth measure: the number of adjacencies, for which we give several approximation algorithms in the maximum matching model, in the case where genomes contain the same number of duplications of each gene.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 08:15:19 GMT" } ]
2008-12-18T00:00:00
[ [ "Angibaud", "Sébastien", "", "LINA" ], [ "Fertin", "Guillaume", "", "LINA" ], [ "Rusu", "Irena", "", "LINA" ], [ "Thevenin", "Annelyse", "", "LRI" ], [ "Vialette", "Stéphane", "", "IGM" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0806.1139
Miguel Andres
Miguel E. Andres, Pedro D'Argenio, Peter van Rossum
Significant Diagnostic Counterexamples in Probabilistic Model Checking
null
null
null
null
cs.LO cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel technique for counterexample generation in probabilistic model checking of Markov Chains and Markov Decision Processes. (Finite) paths in counterexamples are grouped together in witnesses that are likely to provide similar debugging information to the user. We list five properties that witnesses should satisfy in order to be useful as debugging aid: similarity, accuracy, originality, significance, and finiteness. Our witnesses contain paths that behave similar outside strongly connected components. This papers shows how to compute these witnesses by reducing the problem of generating counterexamples for general properties over Markov Decision Processes, in several steps, to the easy problem of generating counterexamples for reachability properties over acyclic Markov Chains.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 13:09:49 GMT" } ]
2008-06-09T00:00:00
[ [ "Andres", "Miguel E.", "" ], [ "D'Argenio", "Pedro", "" ], [ "van Rossum", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0806.1144
Giuseppe Longo
N. Deniskina, M. Brescia, S. Cavuoti, G. d'Angelo, O. Laurino, G. Longo
GRID-Launcher v.1.0
Contributed, Data Centre Alliance Workshops: GRID and the Virtual Observatory, April 9-11 Munich, to appear in Mem. SAIt
null
null
null
astro-ph cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
GRID-launcher-1.0 was built within the VO-Tech framework, as a software interface between the UK-ASTROGRID and a generic GRID infrastructures in order to allow any ASTROGRID user to launch on the GRID computing intensive tasks from the ASTROGRID Workbench or Desktop. Even though of general application, so far the Grid-Launcher has been tested on a few selected softwares (VONeural-MLP, VONeural-SVM, Sextractor and SWARP) and on the SCOPE-GRID.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 12:35:17 GMT" } ]
2008-06-14T00:00:00
[ [ "Deniskina", "N.", "" ], [ "Brescia", "M.", "" ], [ "Cavuoti", "S.", "" ], [ "d'Angelo", "G.", "" ], [ "Laurino", "O.", "" ], [ "Longo", "G.", "" ] ]
[ null, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0806.1148
Dominik Scheder
Dominik Scheder and Philipp Zumstein
Unsatisfiable CNF Formulas need many Conflicts
new version; added an upper bound on the number of conflicts
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A pair of clauses in a CNF formula constitutes a conflict if there is a variable that occurs positively in one clause and negatively in the other. A CNF formula without any conflicts is satisfiable. The Lovasz Local Lemma implies that a k-CNF formula is satisfiable if each clause conflicts with at most 2^k/e-1 clauses. It does not, however, give any good bound on how many conflicts an unsatisfiable formula has globally. We show here that every unsatisfiable k-CNF formula requires 2.69^k conflicts and there exist unsatisfiable k-CNF formulas with 3.51^k conflicts.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 12:48:42 GMT" }, { "version": "v2", "created": "Mon, 6 Sep 2010 13:36:12 GMT" } ]
2010-09-07T00:00:00
[ [ "Scheder", "Dominik", "" ], [ "Zumstein", "Philipp", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0806.1156
Cnrs : Umr 6057 Laboratoire Parole Et Langage
Irina Nesterenko (LPL), St\'ephane Rauzy (LPL)
Utilisation des grammaires probabilistes dans les t\^aches de segmentation et d'annotation prosodique
null
Journ\'ees d'Etudes sur la Parole, Avignon : France (2008)
null
3267
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nous pr\'esentons dans cette contribution une approche \`a la fois symbolique et probabiliste permettant d'extraire l'information sur la segmentation du signal de parole \`a partir d'information prosodique. Nous utilisons pour ce faire des grammaires probabilistes poss\'edant une structure hi\'erarchique minimale. La phase de construction des grammaires ainsi que leur pouvoir de pr\'ediction sont \'evalu\'es qualitativement ainsi que quantitativement. ----- Methodologically oriented, the present work sketches an approach for prosodic information retrieval and speech segmentation, based on both symbolic and probabilistic information. We have recourse to probabilistic grammars, within which we implement a minimal hierarchical structure. Both the stages of probabilistic grammar building and its testing in prediction are explored and quantitatively and qualitatively evaluated.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 13:33:31 GMT" } ]
2008-12-18T00:00:00
[ [ "Nesterenko", "Irina", "", "LPL" ], [ "Rauzy", "Stéphane", "", "LPL" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0806.1199
Lukas Kroc
Michael Chertkov, Lukas Kroc, Massimo Vergassola
Belief Propagation and Beyond for Particle Tracking
8 pages, 2 figures
null
null
LA-UR-08-3645
cs.IT cond-mat.stat-mech cs.AI cs.LG math.IT physics.flu-dyn
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a novel approach to statistical learning from particles tracked while moving in a random environment. The problem consists in inferring properties of the environment from recorded snapshots. We consider here the case of a fluid seeded with identical passive particles that diffuse and are advected by a flow. Our approach rests on efficient algorithms to estimate the weighted number of possible matchings among particles in two consecutive snapshots, the partition function of the underlying graphical model. The partition function is then maximized over the model parameters, namely diffusivity and velocity gradient. A Belief Propagation (BP) scheme is the backbone of our algorithm, providing accurate results for the flow parameters we want to learn. The BP estimate is additionally improved by incorporating Loop Series (LS) contributions. For the weighted matching problem, LS is compactly expressed as a Cauchy integral, accurately estimated by a saddle point approximation. Numerical experiments show that the quality of our improved BP algorithm is comparable to the one of a fully polynomial randomized approximation scheme, based on the Markov Chain Monte Carlo (MCMC) method, while the BP-based scheme is substantially faster than the MCMC scheme.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 16:18:13 GMT" } ]
2008-06-09T00:00:00
[ [ "Chertkov", "Michael", "" ], [ "Kroc", "Lukas", "" ], [ "Vergassola", "Massimo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "physics.flu-dyn", "description": "Turbulence, instabilities, incompressible/compressible flows, reacting flows. Aero/hydrodynamics, fluid-structure interactions, acoustics. Biological fluid dynamics, micro/nanofluidics, interfacial phenomena. Complex fluids, suspensions and granular flows, porous media flows. Geophysical flows, thermoconvective and stratified flows. Mathematical and computational methods for fluid dynamics, fluid flow models, experimental techniques.", "span": "(Fluid Dynamics)" } ]
0806.1215
Lav Varshney
Lav R. Varshney
Performance of LDPC Codes Under Faulty Iterative Decoding
Revised in May 2010 in response to reviewer comments
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Departing from traditional communication theory where decoding algorithms are assumed to perform without error, a system where noise perturbs both computational devices and communication channels is considered here. This paper studies limits in processing noisy signals with noisy circuits by investigating the effect of noise on standard iterative decoders for low-density parity-check codes. Concentration of decoding performance around its average is shown to hold when noise is introduced into message-passing and local computation. Density evolution equations for simple faulty iterative decoders are derived. In one model, computing nonlinear estimation thresholds shows that performance degrades smoothly as decoder noise increases, but arbitrarily small probability of error is not achievable. Probability of error may be driven to zero in another system model; the decoding threshold again decreases smoothly with decoder noise. As an application of the methods developed, an achievability result for reliable memory systems constructed from unreliable components is provided.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 18:32:08 GMT" }, { "version": "v2", "created": "Sun, 23 Aug 2009 15:36:42 GMT" }, { "version": "v3", "created": "Fri, 28 May 2010 18:13:54 GMT" } ]
2010-05-31T00:00:00
[ [ "Varshney", "Lav R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.1231
Francisco Assis
F. M. Assis, P. Mateus, Y. Omar
Improving Classical Authentication with Quantum Communication
New improved version, with several clarifications in the text and new figures
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a quantum-enhanced protocol to authenticate classical messages, with improved security with respect to the classical scheme introduced by Brassard in 1983. In that protocol, the shared key is the seed of a pseudo-random generator (PRG) and a hash function is used to create the authentication tag of a public message. We show that a quantum encoding of secret bits offers more security than the classical XOR function introduced by Brassard. Furthermore, we establish the relationship between the bias of a PRG and the amount of information about the key that the attacker can retrieve from a block of authenticated messages. Finally, we prove that quantum resources can improve both the secrecy of the key generated by the PRG and the secrecy of the tag obtained with a hidden hash function.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 20:37:15 GMT" }, { "version": "v2", "created": "Thu, 11 Feb 2010 23:43:03 GMT" } ]
2010-02-12T00:00:00
[ [ "Assis", "F. M.", "" ], [ "Mateus", "P.", "" ], [ "Omar", "Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.1246
Rodrigo Torrens
Rodrigo Torrens, Luis A. Nunez and Raisa Urribarri
ICT, Community Memory and Technological Appropriation
15 pages, 2 figures
null
null
null
cs.DL cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The core mission of universities and higher education institutions is to make public the results of their work and to preserve the collective memory of the institution. This includes the effective use of information and communication technologies (ICT) to systematically compile academic and research achievements as well as disseminate effectively this accumulated knowledge to society at large. Current efforts in Latin America and Venezuela in particular, are limited but provide some valuable insights to pave the road to this important goal. The institutional repository of Universidad de Los Andes (ULA) in Venezuela (www.saber.ula.ve) is such an example of ICT usage to store, manage and disseminate digital material produced by our University. In this paper we elaborate on the overall process of promoting a culture of content creation, publishing and preservation within ULA.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 22:37:43 GMT" } ]
2008-06-10T00:00:00
[ [ "Torrens", "Rodrigo", "" ], [ "Nunez", "Luis A.", "" ], [ "Urribarri", "Raisa", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0806.1256
Marta Gonzalez
M.C. Gonzalez, C.A. Hidalgo, and A.-L. Barabasi
Understanding individual human mobility patterns
Supporting Webpage: http://www.nd.edu/~mgonza16/Marta'sHomepage_files/nature2008/research.html
Nature 453, 479-482 (2008)
10.1038/nature06958
null
physics.soc-ph cond-mat.stat-mech cs.CY physics.bio-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite their importance for urban planning, traffic forecasting, and the spread of biological and mobile viruses, our understanding of the basic laws governing human motion remains limited thanks to the lack of tools to monitor the time resolved location of individuals. Here we study the trajectory of 100,000 anonymized mobile phone users whose position is tracked for a six month period. We find that in contrast with the random trajectories predicted by the prevailing Levy flight and random walk models, human trajectories show a high degree of temporal and spatial regularity, each individual being characterized by a time independent characteristic length scale and a significant probability to return to a few highly frequented locations. After correcting for differences in travel distances and the inherent anisotropy of each trajectory, the individual travel patterns collapse into a single spatial probability distribution, indicating that despite the diversity of their travel history, humans follow simple reproducible patterns. This inherent similarity in travel patterns could impact all phenomena driven by human mobility, from epidemic prevention to emergency response, urban planning and agent based modeling.
[ { "version": "v1", "created": "Sat, 7 Jun 2008 02:30:28 GMT" } ]
2009-11-13T00:00:00
[ [ "Gonzalez", "M. C.", "" ], [ "Hidalgo", "C. A.", "" ], [ "Barabasi", "A. -L.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.bio-ph", "description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.", "span": "(Biological Physics)" } ]
0806.1271
Andreas Klappenecker
Andreas Klappenecker, Hyunyoung Lee, Jennifer L. Welch (Texas A&M University)
Scheduling Sensors by Tiling Lattices
9 pages, 11 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Suppose that wirelessly communicating sensors are placed in a regular fashion on the points of a lattice. Common communication protocols allow the sensors to broadcast messages at arbitrary times, which can lead to problems should two sensors broadcast at the same time. It is shown that one can exploit a tiling of the lattice to derive a deterministic periodic schedule for the broadcast communication of sensors that is guaranteed to be collision-free. The proposed schedule is shown to be optimal in the number of time slots.
[ { "version": "v1", "created": "Sat, 7 Jun 2008 07:36:34 GMT" } ]
2008-06-10T00:00:00
[ [ "Klappenecker", "Andreas", "", "Texas A&M\n University" ], [ "Lee", "Hyunyoung", "", "Texas A&M\n University" ], [ "Welch", "Jennifer L.", "", "Texas A&M\n University" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.1280
Khaled Khalil
Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy and Abdel-Badeeh M. Salem
The Role of Artificial Intelligence Technologies in Crisis Response
6 pages, 5 figures, 1 table, accepted for MENDEL 2008 14th International Conference on Soft Computing, June 18-20, Brno, Czech Republic
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Crisis response poses many of the most difficult information technology in crisis management. It requires information and communication-intensive efforts, utilized for reducing uncertainty, calculating and comparing costs and benefits, and managing resources in a fashion beyond those regularly available to handle routine problems. In this paper, we explore the benefits of artificial intelligence technologies in crisis response. This paper discusses the role of artificial intelligence technologies; namely, robotics, ontology and semantic web, and multi-agent systems in crisis response.
[ { "version": "v1", "created": "Sat, 7 Jun 2008 12:46:56 GMT" } ]
2008-06-10T00:00:00
[ [ "Khalil", "Khaled M.", "" ], [ "Abdel-Aziz", "M.", "" ], [ "Nazmy", "Taymour T.", "" ], [ "Salem", "Abdel-Badeeh M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.1281
Wojciech Moczydlowski
Robert Constable and Wojciech Moczydlowski
Extracting Programs from Constructive HOL Proofs via IZF Set-Theoretic<br> Semantics
17 pages
Logical Methods in Computer Science, Volume 4, Issue 3 (September 9, 2008) lmcs:1140
10.2168/LMCS-4(3:5)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Church's Higher Order Logic is a basis for influential proof assistants -- HOL and PVS. Church's logic has a simple set-theoretic semantics, making it trustworthy and extensible. We factor HOL into a constructive core plus axioms of excluded middle and choice. We similarly factor standard set theory, ZFC, into a constructive core, IZF, and axioms of excluded middle and choice. Then we provide the standard set-theoretic semantics in such a way that the constructive core of HOL is mapped into IZF. We use the disjunction, numerical existence and term existence properties of IZF to provide a program extraction capability from proofs in the constructive core. We can implement the disjunction and numerical existence properties in two different ways: one using Rathjen's realizability for IZF and the other using a new direct weak normalization result for IZF by Moczydlowski. The latter can also be used for the term existence property.
[ { "version": "v1", "created": "Sat, 7 Jun 2008 13:43:46 GMT" }, { "version": "v2", "created": "Tue, 9 Sep 2008 14:47:24 GMT" } ]
2015-07-01T00:00:00
[ [ "Constable", "Robert", "" ], [ "Moczydlowski", "Wojciech", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.1284
Chenggong Lv
Chenggong Lv, Jun Wang, Lu Liu, and Weijia You
The Separation of Duty with Privilege Calculus
RSKT2008 conference, LNAI 5009, pp.410-417, 2008
null
null
null
cs.CR cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents Privilege Calculus (PC) as a new approach of knowledge representation for Separation of Duty (SD) in the view of process and intents to improve the reconfigurability and traceability of SD. PC presumes that the structure of SD should be reduced to the structure of privilege and then the regulation of system should be analyzed with the help of forms of privilege.
[ { "version": "v1", "created": "Sat, 7 Jun 2008 15:13:45 GMT" } ]
2008-06-10T00:00:00
[ [ "Lv", "Chenggong", "" ], [ "Wang", "Jun", "" ], [ "Liu", "Lu", "" ], [ "You", "Weijia", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.1316
Berry Groisman
Berry Groisman
The end of Sleeping Beauty's nightmare
7 pages, MSWord, to appear in The British Journal for the Philosophy of Science
null
null
null
cs.AI math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The way a rational agent changes her belief in certain propositions/hypotheses in the light of new evidence lies at the heart of Bayesian inference. The basic natural assumption, as summarized in van Fraassen's Reflection Principle ([1984]), would be that in the absence of new evidence the belief should not change. Yet, there are examples that are claimed to violate this assumption. The apparent paradox presented by such examples, if not settled, would demonstrate the inconsistency and/or incompleteness of the Bayesian approach and without eliminating this inconsistency, the approach cannot be regarded as scientific. The Sleeping Beauty Problem is just such an example. The existing attempts to solve the problem fall into three categories. The first two share the view that new evidence is absent, but differ about the conclusion of whether Sleeping Beauty should change her belief or not, and why. The third category is characterized by the view that, after all, new evidence (although hidden from the initial view) is involved. My solution is radically different and does not fall in either of these categories. I deflate the paradox by arguing that the two different degrees of belief presented in the Sleeping Beauty Problem are in fact beliefs in two different propositions, i.e. there is no need to explain the (un)change of belief.
[ { "version": "v1", "created": "Sun, 8 Jun 2008 08:42:00 GMT" } ]
2008-06-10T00:00:00
[ [ "Groisman", "Berry", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0806.1340
Prasun Dutta
Prasun Dutta, S. Pratik Khastgir and Anushree Roy
Steiner trees and spanning trees in six-pin soap films
null
null
null
null
cs.CG cond-mat.other physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have studied the Steiner tree problem using six-pin soap films in detail. We extend the existing method of experimental realisation of Steiner trees in $n$-terminal problem through soap films to observe new non-minimal Steiner trees. We also produced spanning tree configurations for the first time by our method. Experimentally, by varying the pin diameter, we have achieved these new stable soap film configurations. A new algorithm is presented for creating these Steiner trees theoretically. Exact lengths of these Steiner tree configurations are calculated using a geometrical method. An exact two-parameter empirical formula is proposed for estimating the lengths of these soap film configurations in six-pin soap film problem.
[ { "version": "v1", "created": "Sun, 8 Jun 2008 16:58:31 GMT" } ]
2008-06-15T00:00:00
[ [ "Dutta", "Prasun", "" ], [ "Khastgir", "S. Pratik", "" ], [ "Roy", "Anushree", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Physics", "code": "cond-mat.other", "description": "Work in condensed matter that does not fit into the other cond-mat classifications", "span": "(Other Condensed Matter)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0806.1343
Riccardo Alberti
Riccardo Alberti
Temporized Equilibria
This paper has been withdrawn
null
null
null
cs.GT cs.AI
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper has been withdrawn by the author due to a crucial error in the submission action.
[ { "version": "v1", "created": "Sun, 8 Jun 2008 17:39:56 GMT" }, { "version": "v2", "created": "Wed, 11 Jun 2008 23:19:52 GMT" }, { "version": "v3", "created": "Sun, 21 Sep 2008 19:33:56 GMT" }, { "version": "v4", "created": "Wed, 24 Sep 2008 11:28:44 GMT" } ]
2008-09-24T00:00:00
[ [ "Alberti", "Riccardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.1355
Leonid Andreev V
Leonid Andreev
From a set of parts to an indivisible whole. Part III: Holistic space of multi-object relations
16 pages, 16 figures
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The previously described methodology for hierarchical grouping of objects through iterative averaging has been used for simulation of cooperative interactions between objects of a system with the purpose of investigation of the conformational organization of the system. Interactions between objects were analyzed within the space of an isotropic field of one of the objects (drifter). Such an isotropic field of an individual object can be viewed as a prototype of computer ego. It allows visualization of a holistic space of multi-object relations (HSMOR) which has a complex structure depending on the number of objects, their mutual arrangement in space, and the type of metric used for assessment of (dis)similarities between the objects. In the course of computer simulation of cooperative interactions between the objects, only those points of the space were registered which corresponded to transitions in hierarchical grouping. Such points appeared to aggregate into complex spatial structures determining a unique internal organization of a respective HSMOR. We describe some of the peculiarities of such structures, referred to by us as attractor membranes, and discuss their properties. We also demonstrate the peculiarities of the changing of intergroup similarities which occurs when a drifter infinitely moves away from the fixed objects.
[ { "version": "v1", "created": "Sun, 8 Jun 2008 20:50:11 GMT" } ]
2008-06-10T00:00:00
[ [ "Andreev", "Leonid", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0806.1361
Mariano Rico
Mariano Rico, David Camacho, and Oscar Corcho
VPOET: Using a Distributed Collaborative Platform for Semantic Web Applications
accepted for the 2nd International Symposium on Intelligent Distributed Computing - IDC'2008. September 18-20, 2008, Catania, Italy
null
null
null
cs.SE cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a distributed collaborative wiki-based platform that has been designed to facilitate the development of Semantic Web applications. The applications designed using this platform are able to build semantic data through the cooperation of different developers and to exploit that semantic data. The paper shows a practical case study on the application VPOET, and how an application based on Google Gadgets has been designed to test VPOET and let human users exploit the semantic data created. This practical example can be used to show how different Semantic Web technologies can be integrated into a particular Web application, and how the knowledge can be cooperatively improved.
[ { "version": "v1", "created": "Mon, 9 Jun 2008 00:39:08 GMT" } ]
2008-06-10T00:00:00
[ [ "Rico", "Mariano", "" ], [ "Camacho", "David", "" ], [ "Corcho", "Oscar", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.1372
Lan Zhang
Lan Zhang, Ying-Chang Liang, Yan Xin, H. Vincent Poor
Robust Cognitive Beamforming With Partial Channel State Information
30 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers a spectrum sharing based cognitive radio (CR) communication system, which consists of a secondary user (SU) having multiple transmit antennas and a single receive antenna and a primary user (PU) having a single receive antenna. The channel state information (CSI) on the link of the SU is assumed to be perfectly known at the SU transmitter (SU-Tx). However, due to loose cooperation between the SU and the PU, only partial CSI of the link between the SU-Tx and the PU is available at the SU-Tx. With the partial CSI and a prescribed transmit power constraint, our design objective is to determine the transmit signal covariance matrix that maximizes the rate of the SU while keeping the interference power to the PU below a threshold for all the possible channel realization within an uncertainty set. This problem, termed the robust cognitive beamforming problem, can be naturally formulated as a semi-infinite programming (SIP) problem with infinitely many constraints. This problem is first transformed into the second order cone programming (SOCP) problem and then solved via a standard interior point algorithm. Then, an analytical solution with much reduced complexity is developed from a geometric perspective. It is shown that both algorithms obtain the same optimal solution. Simulation examples are presented to validate the effectiveness of the proposed algorithms.
[ { "version": "v1", "created": "Mon, 9 Jun 2008 05:30:09 GMT" }, { "version": "v2", "created": "Sun, 4 Jan 2009 12:06:48 GMT" } ]
2009-01-04T00:00:00
[ [ "Zhang", "Lan", "" ], [ "Liang", "Ying-Chang", "" ], [ "Xin", "Yan", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.1377
Vandani Verma
Sunder Lal and Vandani Verma
An Identity Based Strong Bi-Designated Verifier (t, n) Threshold Proxy Signature Scheme
5 Pages, 0 Figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Proxy signature schemes have been invented to delegate signing rights. The paper proposes a new concept of Identify Based Strong Bi-Designated Verifier threshold proxy signature (ID-SBDVTPS) schemes. Such scheme enables an original signer to delegate the signature authority to a group of 'n' proxy signers with the condition that 't' or more proxy signers can cooperatively sign messages on behalf of the original signer and the signatures can only be verified by any two designated verifiers and that they cannot convince anyone else of this fact.
[ { "version": "v1", "created": "Mon, 9 Jun 2008 06:56:19 GMT" } ]
2008-06-10T00:00:00
[ [ "Lal", "Sunder", "" ], [ "Verma", "Vandani", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0806.1381
Feng Xia
Feng Xia, Guosong Tian, Youxian Sun
Feedback Scheduling: An Event-Driven Paradigm
8 pages, 10 figures
ACM SIGPLAN Notices, vol.42, no.12, pp. 7-14, Dec. 2007
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Embedded computing systems today increasingly feature resource constraints and workload variability, which lead to uncertainty in resource availability. This raises great challenges to software design and programming in multitasking environments. In this paper, the emerging methodology of feedback scheduling is introduced to address these challenges. As a closed-loop approach to resource management, feedback scheduling promises to enhance the flexibility and resource efficiency of various software programs through dynamically distributing available resources among concurrent tasks based on feedback information about the actual usage of the resources. With emphasis on the behavioral design of feedback schedulers, we describe a general framework of feedback scheduling in the context of real-time control applications. A simple yet illustrative feedback scheduling algorithm is given. From a programming perspective, we describe how to modify the implementation of control tasks to facilitate the application of feedback scheduling. An event-driven paradigm that combines time-triggered and event-triggered approaches is proposed for programming of the feedback scheduler. Simulation results argue that the proposed event-driven paradigm yields better performance than time-triggered paradigm in dynamic environments where the workload varies irregularly and unpredictably.
[ { "version": "v1", "created": "Mon, 9 Jun 2008 07:23:28 GMT" } ]
2008-12-18T00:00:00
[ [ "Xia", "Feng", "" ], [ "Tian", "Guosong", "" ], [ "Sun", "Youxian", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0806.1385
Feng Xia
Feng Xia, Youxian Sun
Control-Scheduling Codesign: A Perspective on Integrating Control and Computing
7 pages, 2 figures; A review paper
Dynamics of Continuous, Discrete and Impulsive Systems - Series B, vol. 13, no. S1, pp. 1352-1358, 2006
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite rapid evolution, embedded computing systems increasingly feature resource constraints and workload uncertainties. To achieve much better system performance in unpredictable environments than traditional design approaches, a novel methodology, control-scheduling codesign, is emerging in the context of integrating feedback control and real-time computing. The aim of this work is to provide a better understanding of this emerging methodology and to spark new interests and developments in both the control and computer science communities. The state of the art of control-scheduling codesign is captured. Relevant research efforts in the literature are discussed under two categories, i.e., control of computing systems and codesign for control systems. Critical open research issues on integrating control and computing are also outlined.
[ { "version": "v1", "created": "Mon, 9 Jun 2008 07:48:42 GMT" } ]
2008-12-18T00:00:00
[ [ "Xia", "Feng", "" ], [ "Sun", "Youxian", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0806.1397
Xianmin Feng
Xianmin Ming, Jiansheng Yang
The Improvement of the Bound on Hash Family
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the bound on three kinds of hash family using the Singleton bound. To $\epsilon-U(N; n, m)$ hash family, in the caes of $n>m^2>1$ and $1\geq\epsilon\geq \epsilon_1(n, m)$, we get that the new bound is better. To $\epsilon-\bigtriangleup U(N; n, m)$ hash family, in the case of $n>m>1$ and $1\geq\epsilon\geq\epsilon_3(n,m)$, the new bound is better. To $\epsilon-SU(N; n, m)$ hash family, in the case of $n>2^m>2$ and $1\geq\epsilon\geq \epsilon_4(n, m)$, we get that the new bound is better.
[ { "version": "v1", "created": "Mon, 9 Jun 2008 08:26:01 GMT" } ]
2008-12-18T00:00:00
[ [ "Ming", "Xianmin", "" ], [ "Yang", "Jiansheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.1413
Olivier Finkel
Olivier Finkel (ELM, IMJ, LIP)
Topological Complexity of Context-Free omega-Languages: A Survey
null
null
null
LIP Research Report RR 2008-17
cs.LO cs.CC math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We survey recent results on the topological complexity of context-free omega-languages which form the second level of the Chomsky hierarchy of languages of infinite words. In particular, we consider the Borel hierarchy and the Wadge hierarchy of non-deterministic or deterministic context-free omega-languages. We study also decision problems, the links with the notions of ambiguity and of degrees of ambiguity, and the special case of omega-powers.
[ { "version": "v1", "created": "Mon, 9 Jun 2008 10:03:44 GMT" }, { "version": "v2", "created": "Tue, 12 Mar 2013 21:08:31 GMT" } ]
2013-03-14T00:00:00
[ [ "Finkel", "Olivier", "", "ELM, IMJ, LIP" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0806.1416
Sebastien Collette
Greg Aloupis and Jean Cardinal and Sebastien Collette and Ferran Hurtado and Stefan Langerman and Joseph O'Rourke and Belen Palop
Highway Hull Revisited
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A highway H is a line in the plane on which one can travel at a greater speed than in the remaining plane. One can choose to enter and exit H at any point. The highway time distance between a pair of points is the minimum time required to move from one point to the other, with optional use of H. The highway hull HH(S,H) of a point set S is the minimal set containing S as well as the shortest paths between all pairs of points in HH(S,H), using the highway time distance. We provide a Theta(n log n) worst-case time algorithm to find the highway hull under the L_1 metric, as well as an O(n log^2 n) time algorithm for the L_2 metric which improves the best known result of O(n^2). We also define and construct the useful region of the plane: the region that a highway must intersect in order that the shortest path between at least one pair of points uses the highway.
[ { "version": "v1", "created": "Mon, 9 Jun 2008 10:22:38 GMT" }, { "version": "v2", "created": "Mon, 23 Jun 2008 14:46:29 GMT" }, { "version": "v3", "created": "Wed, 22 Apr 2009 07:46:26 GMT" } ]
2009-04-22T00:00:00
[ [ "Aloupis", "Greg", "" ], [ "Cardinal", "Jean", "" ], [ "Collette", "Sebastien", "" ], [ "Hurtado", "Ferran", "" ], [ "Langerman", "Stefan", "" ], [ "O'Rourke", "Joseph", "" ], [ "Palop", "Belen", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0806.1438
Siham Bekkai
Siham Bekkai and Mekkia Kouider
On Mean Distance and Girth
this paper has been withdrawn because it has been published
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We bound the mean distance in a connected graph which is not a tree in function of its order $n$ and its girth $g$. On one hand, we show that mean distance is at most $\frac{n+1}{3}-\frac{g(g^2-4)}{12n(n-1)}$ if $g$ is even and at most $\frac{n+1}{3}-\frac{g(g^2-1)}{12n(n-1)}$ if $g$ is odd. On the other hand, we prove that mean distance is at least $\frac{ng}{4(n-1)}$ unless $G$ is an odd cycle.
[ { "version": "v1", "created": "Mon, 9 Jun 2008 12:15:28 GMT" }, { "version": "v2", "created": "Fri, 4 Jan 2013 19:49:24 GMT" } ]
2013-01-07T00:00:00
[ [ "Bekkai", "Siham", "" ], [ "Kouider", "Mekkia", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0806.1439
Dmitry Lande
D. V. Lande, A. A. Snarskii
Dynamic Network of Concepts from Web-Publications
7 pages, 8 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The network, the nodes of which are concepts (people's names, companies' names, etc.), extracted from web-publications, is considered. A working algorithm of extracting such concepts is presented. Edges of the network under consideration refer to the reference frequency which depends on the fact how many times the concepts, which correspond to the nodes, are mentioned in the same documents. Web-documents being published within a period of time together form an information flow, which defines the dynamics of the network studied. The phenomenon of its structure stability, when the number of web-publications, constituting its formation bases, increases, is discussed
[ { "version": "v1", "created": "Mon, 9 Jun 2008 12:16:55 GMT" } ]
2008-12-18T00:00:00
[ [ "Lande", "D. V.", "" ], [ "Snarskii", "A. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.1446
Guoshen Yu
Guoshen Yu and Jean-Jacques Slotine
Fast Wavelet-Based Visual Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate a biologically motivated approach to fast visual classification, directly inspired by the recent work of Serre et al. Specifically, trading-off biological accuracy for computational efficiency, we explore using wavelet and grouplet-like transforms to parallel the tuning of visual cortex V1 and V2 cells, alternated with max operations to achieve scale and translation invariance. A feature selection procedure is applied during learning to accelerate recognition. We introduce a simple attention-like feedback mechanism, significantly improving recognition and robustness in multiple-object scenes. In experiments, the proposed algorithm achieves or exceeds state-of-the-art success rate on object recognition, texture and satellite image classification, language identification and sound classification.
[ { "version": "v1", "created": "Sun, 8 Jun 2008 10:15:04 GMT" } ]
2008-06-10T00:00:00
[ [ "Yu", "Guoshen", "" ], [ "Slotine", "Jean-Jacques", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0806.1494
Mathilde Bouvel
Mathilde Bouvel (LIAFA), Elisa Pergola (DSI)
Posets and Permutations in the Duplication-Loss Model: Minimal Permutations with d Descents
25 pages 20 figures Soumis a TCS
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we are interested in the combinatorial analysis of the whole genome duplication - random loss model of genome rearrangement initiated in a paper of Chaudhuri, Chen, Mihaescu, and Rao in SODA 2006 and continued by Bouvel and Rossin in 2007. In this model, genomes composed of n genes are modeled by permutations of the set of integers [1..n], that can evolve through duplication-loss steps. It was previously shown that the class of permutations obtained in this model after a given number p of steps is a class of pattern-avoiding permutations of finite basis. The excluded patterns were described as the minimal permutations with d=2^p descents, minimal being intended in the sense of the pattern-involvement relation on permutations. Here, we give a local and simpler characterization of the set B_d of minimal permutations with d descents. We also provide a more detailed analysis - characterization, bijection and enumeration - of two particular subsets of B_d, namely the patterns in B_d of size d+2 and 2d.
[ { "version": "v1", "created": "Mon, 9 Jun 2008 17:04:40 GMT" } ]
2008-12-18T00:00:00
[ [ "Bouvel", "Mathilde", "", "LIAFA" ], [ "Pergola", "Elisa", "", "DSI" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0806.1543
Andreas U. Schmidt
Andreas U. Schmidt
On the Superdistribution of Digital Goods
Invited paper at the Wokshop 2008 International Workshop on Multimedia Security in Communication (MUSIC'08) To appear in: Proceedings of 2008 Third International Conference on Communications and Networking in China (CHINACOM'08), August 25-27, 2008, Hangzhou, China
null
null
null
cs.MM cs.CR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Business models involving buyers of digital goods in the distribution process are called superdistribution schemes. We review the state-of-the art of research and application of superdistribution and propose systematic approach to market mechanisms using super-distribution and technical system architectures supporting it. The limiting conditions on such markets are of economic, legal, technical, and psychological nature.
[ { "version": "v1", "created": "Mon, 9 Jun 2008 22:03:40 GMT" } ]
2008-06-11T00:00:00
[ [ "Schmidt", "Andreas U.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0806.1549
Krishnan Eswaran
Krishnan Eswaran, Michael Gastpar, Kannan Ramchandran
Bits through ARQs
submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A fundamental problem in dynamic frequency reuse is that the cognitive radio is ignorant of the amount of interference it inflicts on the primary license holder. A model for such a situation is proposed and analyzed. The primary sends packets across an erasure channel and employs simple ACK/NAK feedback (ARQs) to retransmit erased packets. Furthermore, its erasure probabilities are influenced by the cognitive radio's activity. While the cognitive radio does not know these interference characteristics, it can eavesdrop on the primary's ARQs. The model leads to strategies in which the cognitive radio adaptively adjusts its input based on the primary's ARQs thereby guaranteeing the primary exceeds a target packet rate. A relatively simple strategy whereby the cognitive radio transmits only when the primary's empirical packet rate exceeds a threshold is shown to have interesting universal properties in the sense that for unknown time-varying interference characteristics, the primary is guaranteed to meet its target rate. Furthermore, a more intricate version of this strategy is shown to be capacity-achieving for the cognitive radio when the interference characteristics are time-invariant.
[ { "version": "v1", "created": "Mon, 9 Jun 2008 23:31:11 GMT" } ]
2008-06-11T00:00:00
[ [ "Eswaran", "Krishnan", "" ], [ "Gastpar", "Michael", "" ], [ "Ramchandran", "Kannan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.1565
Gesualdo Scutari
Gesualdo Scutari, Daniel P. Palomar, Sergio Barbarossa
Competitive Design of Multiuser MIMO Systems based on Game Theory: A Unified View
To appear on IEEE Journal on Selected Areas in Communications (JSAC), September 2008
null
10.1109/JSAC.2008.080907
null
cs.IT cs.GT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the noncooperative maximization of mutual information in the Gaussian interference channel in a fully distributed fashion via game theory. This problem has been studied in a number of papers during the past decade for the case of frequency-selective channels. A variety of conditions guaranteeing the uniqueness of the Nash Equilibrium (NE) and convergence of many different distributed algorithms have been derived. In this paper we provide a unified view of the state-of-the-art results, showing that most of the techniques proposed in the literature to study the game, even though apparently different, can be unified using our recent interpretation of the waterfilling operator as a projection onto a proper polyhedral set. Based on this interpretation, we then provide a mathematical framework, useful to derive a unified set of sufficient conditions guaranteeing the uniqueness of the NE and the global convergence of waterfilling based asynchronous distributed algorithms. The proposed mathematical framework is also instrumental to study the extension of the game to the more general MIMO case, for which only few results are available in the current literature. The resulting algorithm is, similarly to the frequency-selective case, an iterative asynchronous MIMO waterfilling algorithm. The proof of convergence hinges again on the interpretation of the MIMO waterfilling as a matrix projection, which is the natural generalization of our results obtained for the waterfilling mapping in the frequency-selective case.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 03:52:00 GMT" } ]
2016-11-17T00:00:00
[ [ "Scutari", "Gesualdo", "" ], [ "Palomar", "Daniel P.", "" ], [ "Barbarossa", "Sergio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0806.1567
Feng Xia
Feng Xia, Wenhong Zhao
Flexible Time-Triggered Sampling in Smart Sensor-Based Wireless Control Systems
17 pages, 10 figures; Open Access at http://www.mdpi.org/sensors/papers/s7112548.pdf
Sensors, vol.7, no.11, pp. 2548-2564, 2007
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless control systems (WCSs) often have to operate in dynamic environments where the network traffic load may vary unpredictably over time. The sampling in sensors is conventionally time triggered with fixed periods. In this context, only worse-than-possible quality of control (QoC) can be achieved when the network is underloaded, while overloaded conditions may significantly degrade the QoC, even causing system instability. This is particularly true when the bandwidth of the wireless network is limited and shared by multiple control loops. To address these problems, a flexible time-triggered sampling scheme is presented in this work. Smart sensors are used to facilitate dynamic adjustment of sampling periods, which enhances the flexibility and resource efficiency of the system based on time-triggered sampling. Feedback control technology is exploited for adapting sampling periods in a periodic manner. The deadline miss ratio in each control loop is maintained at/around a desired level, regardless of workload variations. Simulation results show that the proposed sampling scheme is able to deal with dynamic and unpredictable variations in network traffic load. Compared to conventional time-triggered sampling, it leads to much better QoC in WCSs operating in dynamic environments.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 04:10:05 GMT" } ]
2008-12-18T00:00:00
[ [ "Xia", "Feng", "" ], [ "Zhao", "Wenhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.1569
Feng Xia
Feng Xia, Yu-Chu Tian, Yanjun Li, Youxian Sun
Wireless Sensor/Actuator Network Design for Mobile Control Applications
17 pages, 8 figures; Open Access at http://www.mdpi.org/sensors/papers/s7102157.pdf
Sensors, vol.7, no.10, pp.2157-2173, 2007
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless sensor/actuator networks (WSANs) are emerging as a new generation of sensor networks. Serving as the backbone of control applications, WSANs will enable an unprecedented degree of distributed and mobile control. However, the unreliability of wireless communications and the real-time requirements of control applications raise great challenges for WSAN design. With emphasis on the reliability issue, this paper presents an application-level design methodology for WSANs in mobile control applications. The solution is generic in that it is independent of the underlying platforms, environment, control system models, and controller design. To capture the link quality characteristics in terms of packet loss rate, experiments are conducted on a real WSAN system. From the experimental observations, a simple yet efficient method is proposed to deal with unpredictable packet loss on actuator nodes. Trace-based simulations give promising results, which demonstrate the effectiveness of the proposed approach.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 04:20:01 GMT" } ]
2008-12-18T00:00:00
[ [ "Xia", "Feng", "" ], [ "Tian", "Yu-Chu", "" ], [ "Li", "Yanjun", "" ], [ "Sun", "Youxian", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.1577
Harshan Jagadeesh
J. Harshan, B. Sundar Rajan
Co-ordinate Interleaved Distributed Space-Time Coding for Two-Antenna-Relays Networks
To appear in IEEE Transactions on Wireless Communications. 09 pages, 06 figures
null
10.1109/TWC.2009.071303
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed space time coding for wireless relay networks when the source, the destination and the relays have multiple antennas have been studied by Jing and Hassibi. In this set-up, the transmit and the receive signals at different antennas of the same relay are processed and designed independently, even though the antennas are colocated. In this paper, a wireless relay network with single antenna at the source and the destination and two antennas at each of the R relays is considered. A new class of distributed space time block codes called Co-ordinate Interleaved Distributed Space-Time Codes (CIDSTC) are introduced where, in the first phase, the source transmits a T-length complex vector to all the relays and in the second phase, at each relay, the in-phase and quadrature component vectors of the received complex vectors at the two antennas are interleaved and processed before forwarding them to the destination. Compared to the scheme proposed by Jing-Hassibi, for $T \geq 4R$, while providing the same asymptotic diversity order of 2R, CIDSTC scheme is shown to provide asymptotic coding gain with the cost of negligible increase in the processing complexity at the relays. However, for moderate and large values of P, CIDSTC scheme is shown to provide more diversity than that of the scheme proposed by Jing-Hassibi. CIDSTCs are shown to be fully diverse provided the information symbols take value from an appropriate multi-dimensional signal set.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 05:45:23 GMT" }, { "version": "v2", "created": "Tue, 5 Aug 2008 11:29:09 GMT" } ]
2016-11-17T00:00:00
[ [ "Harshan", "J.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.1602
Maurice Margenstern
Margenstern Maurice
The injectivity of the global function of a cellular automaton in the hyperbolic plane is undecidable
9 figures this paper completely solves the problem tackled in arXiv:0712.2577v2. This version is simply an improvement of the proof of the result deposited in 0806.1602
The Injectivity of the Global Function of a Cellular Automaton in the Hyperbolic Plane is Undecidable, Fundamenta Informaticae, 94(1), (2009), 63-99
null
null
cs.CG cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we look at the following question. We consider cellular automata in the hyperbolic plane and we consider the global function defined on all possible configurations. Is the injectivity of this function undecidable? The problem was answered positively in the case of the Euclidean plane by Jarkko Kari, in 1994. In the present paper, we show that the answer is also positive for the hyperbolic plane: the problem is undecidable.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 10:58:30 GMT" }, { "version": "v2", "created": "Mon, 16 Jun 2008 15:14:03 GMT" } ]
2009-07-07T00:00:00
[ [ "Maurice", "Margenstern", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.1610
Andreas U. Schmidt
Andreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari
SPAM over Internet Telephony and how to deal with it
7th annual Conference Information Security South Africa (ISSA 2008) University of Johannesburg, South Africa, 7 -9 July 2008
null
null
null
cs.CR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In our modern society telephony has developed to an omnipresent service. People are available at anytime and anywhere. Furthermore the Internet has emerged to an important communication medium. These facts and the raising availability of broadband internet access has led to the fusion of these two services. Voice over IP or short VoIP is the keyword, that describes this combination. The advantages of VoIP in comparison to classic telephony are location independence, simplification of transport networks, ability to establish multimedia communications and the low costs. Nevertheless one can easily see, that combining two technologies, always brings up new challenges and problems that have to be solved. It is undeniable that one of the most annoying facet of the Internet nowadays is email spam. According to different sources email spam is considered to be 80 to 90 percent of the email traffic produced. The threat of so called voice spam or Spam over Internet Telephony (SPIT) is even more fatal, for the annoyance and disturbance factor is much higher. As instance an email that hits the inbox at 4 p.m. is useless but will not disturb the user much. In contrast a ringing phone at 4 p.m. will lead to a much higher disturbance. From the providers point of view both email spam and voice spam produce unwanted traffic and loss of trust of customers into the service. In order to mitigate this threat different approaches from different parties have been developed. This paper focuses on state of the art anti voice spam solutions, analyses them and reveals their weak points. In the end a SPIT producing benchmark tool will be introduced, that attacks the presented anti voice spam solutions. With this tool it is possible for an administrator of a VoIP network to test how vulnerable his system is.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 09:34:30 GMT" } ]
2008-06-11T00:00:00
[ [ "Schmidt", "Andreas U.", "" ], [ "Kuntze", "Nicolai", "" ], [ "Khayari", "Rachid El", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0806.1636
Ian Pratt-Hartmann
Ian Pratt-Hartmann
Data-Complexity of the Two-Variable Fragment with Counting Quantifiers
null
null
null
null
cs.LO cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The data-complexity of both satisfiability and finite satisfiability for the two-variable fragment with counting is NP-complete; the data-complexity of both query-answering and finite query-answering for the two-variable guarded fragment with counting is co-NP-complete.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 11:08:07 GMT" } ]
2008-06-11T00:00:00
[ [ "Pratt-Hartmann", "Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0806.1640
Arnaud Martin
Arnaud Martin (E3I2), Christophe Osswald (E3I2)
Toward a combination rule to deal with partial conflict and specificity in belief functions theory
International Conference on Information Fusion, Qu\'ebec : Canada (2007)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present and discuss a mixed conjunctive and disjunctive rule, a generalization of conflict repartition rules, and a combination of these two rules. In the belief functions theory one of the major problem is the conflict repartition enlightened by the famous Zadeh's example. To date, many combination rules have been proposed in order to solve a solution to this problem. Moreover, it can be important to consider the specificity of the responses of the experts. Since few year some unification rules are proposed. We have shown in our previous works the interest of the proportional conflict redistribution rule. We propose here a mixed combination rule following the proportional conflict redistribution rule modified by a discounting procedure. This rule generalizes many combination rules.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 12:03:43 GMT" } ]
2008-12-18T00:00:00
[ [ "Martin", "Arnaud", "", "E3I2" ], [ "Osswald", "Christophe", "", "E3I2" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.1649
Carlos Roca P.
Carlos P. Roca, Jos\'e A. Cuesta, and Angel S\'anchez
Effect of spatial structure on the evolution of cooperation
Final version, 20 pages, 14 figures
Phys. Rev. E 80, 046106 (2009)
10.1103/PhysRevE.80.046106
null
q-bio.PE cs.GT physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spatial structure is known to have an impact on the evolution of cooperation, and so it has been intensively studied during recent years. Previous work has shown the relevance of some features, such as the synchronicity of the updating, the clustering of the network or the influence of the update rule. This has been done, however, for concrete settings with particular games, networks and update rules, with the consequence that some contradictions have arisen and a general understanding of these topics is missing in the broader context of the space of 2x2 games. To address this issue, we have performed a systematic and exhaustive simulation in the different degrees of freedom of the problem. In some cases, we generalize previous knowledge to the broader context of our study and explain the apparent contradictions. In other cases, however, our conclusions refute what seems to be established opinions in the field, as for example the robustness of the effect of spatial structure against changes in the update rule, or offer new insights into the subject, e.g. the relation between the intensity of selection and the asymmetry between the effects on games with mixed equilibria.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 15:01:55 GMT" }, { "version": "v2", "created": "Fri, 4 Jul 2008 19:29:19 GMT" }, { "version": "v3", "created": "Thu, 30 Apr 2009 11:36:19 GMT" }, { "version": "v4", "created": "Sat, 7 Nov 2009 18:57:01 GMT" } ]
2009-11-07T00:00:00
[ [ "Roca", "Carlos P.", "" ], [ "Cuesta", "José A.", "" ], [ "Sánchez", "Angel", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]