id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0806.0081 | Anna Zamansky | Arnon Avron and Anna Zamansky | Canonical calculi with (n,k)-ary quantifiers | Special Issue of IJCAR2006, edited by Prof. Natarajan Shankar, paper
LMCS-2007-204 | Logical Methods in Computer Science, Volume 4, Issue 3 (August 6,
2008) lmcs:1139 | 10.2168/LMCS-4(3:2)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Propositional canonical Gentzen-type systems, introduced in 2001 by Avron and
Lev, are systems which in addition to the standard axioms and structural rules
have only logical rules in which exactly one occurrence of a connective is
introduced and no other connective is mentioned. A constructive coherence
criterion for the non-triviality of such systems was defined and it was shown
that a system of this kind admits cut-elimination iff it is coherent. The
semantics of such systems is provided using two-valued non-deterministic
matrices (2Nmatrices). In 2005 Zamansky and Avron extended these results to
systems with unary quantifiers of a very restricted form. In this paper we
substantially extend the characterization of canonical systems to (n,k)-ary
quantifiers, which bind k distinct variables and connect n formulas, and show
that the coherence criterion remains constructive for such systems. Then we
focus on the case of k∈{0,1} and for a canonical calculus G show that it
is coherent precisely when it has a strongly characteristic 2Nmatrix, which in
turn is equivalent to admitting strong cut-elimination.
| [
{
"version": "v1",
"created": "Sat, 31 May 2008 15:35:40 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jun 2008 20:04:14 GMT"
},
{
"version": "v3",
"created": "Wed, 6 Aug 2008 15:34:52 GMT"
},
{
"version": "v4",
"created": "Thu, 7 Aug 2008 17:23:35 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Avron",
"Arnon",
""
],
[
"Zamansky",
"Anna",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0806.0103 | Hans Adler | Hans Adler and Isolde Adler | A note on clique-width and tree-width for structures | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a simple proof that the straightforward generalisation of
clique-width to arbitrary structures can be unbounded on structures of bounded
tree-width. This can be corrected by allowing fusion of elements.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2008 10:41:48 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Jun 2008 21:35:39 GMT"
}
] | 2008-06-03T00:00:00 | [
[
"Adler",
"Hans",
""
],
[
"Adler",
"Isolde",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0806.0128 | Feng Xia | Feng Xia | QoS Challenges and Opportunities in Wireless Sensor/Actuator Networks | 12 pages, 1 figure; review | Sensors 2008, 8(2), 1099-1110 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A wireless sensor/actuator network (WSAN) is a group of sensors and actuators
that are geographically distributed and interconnected by wireless networks.
Sensors gather information about the state of physical world. Actuators react
to this information by performing appropriate actions. WSANs thus enable cyber
systems to monitor and manipulate the behavior of the physical world. WSANs are
growing at a tremendous pace, just like the exploding evolution of Internet.
Supporting quality of service (QoS) will be of critical importance for
pervasive WSANs that serve as the network infrastructure of diverse
applications. To spark new research and development interests in this field,
this paper examines and discusses the requirements, critical challenges, and
open research issues on QoS management in WSANs. A brief overview of recent
progress is given.
| [
{
"version": "v1",
"created": "Sun, 1 Jun 2008 07:27:05 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Xia",
"Feng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0806.0130 | Feng Xia | Feng Xia, Youxian Sun, Yu-Chu Tian | Feedback Scheduling of Priority-Driven Control Networks | To appear in Computer Standards and Interfaces;
doi:10.1016/j.csi.2008.03.020 | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With traditional open-loop scheduling of network resources, the
quality-of-control (QoC) of networked control systems (NCSs) may degrade
significantly in the presence of limited bandwidth and variable workload. The
goal of this work is to maximize the overall QoC of NCSs through dynamically
allocating available network bandwidth. Based on codesign of control and
scheduling, an integrated feedback scheduler is developed to enable flexible
QoC management in dynamic environments. It encompasses a cascaded feedback
scheduling module for sampling period adjustment and a direct feedback
scheduling module for priority modification. The inherent characteristics of
priority-driven control networks make it feasible to implement the proposed
feedback scheduler in real-world systems. Extensive simulations show that the
proposed approach leads to significant QoC improvement over the traditional
open-loop scheduling scheme under both underloaded and overloaded network
conditions.
| [
{
"version": "v1",
"created": "Sun, 1 Jun 2008 08:03:02 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Sun",
"Youxian",
""
],
[
"Tian",
"Yu-Chu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0806.0132 | Feng Xia | Feng Xia, Yu-Chu Tian, Youxian Sun, Jinxiang Dong | Control-theoretic dynamic voltage scaling for embedded controllers | Accepted for publication in IET Computers and Digital Techniques.
doi:10.1049/iet-cdt:20070112 | null | null | null | cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For microprocessors used in real-time embedded systems, minimizing power
consumption is difficult due to the timing constraints. Dynamic voltage scaling
(DVS) has been incorporated into modern microprocessors as a promising
technique for exploring the trade-off between energy consumption and system
performance. However, it remains a challenge to realize the potential of DVS in
unpredictable environments where the system workload cannot be accurately
known. Addressing system-level power-aware design for DVS-enabled embedded
controllers, this paper establishes an analytical model for the DVS system that
encompasses multiple real-time control tasks. From this model, a feedback
control based approach to power management is developed to reduce dynamic power
consumption while achieving good application performance. With this approach,
the unpredictability and variability of task execution times can be attacked.
Thanks to the use of feedback control theory, predictable performance of the
DVS system is achieved, which is favorable to real-time applications. Extensive
simulations are conducted to evaluate the performance of the proposed approach.
| [
{
"version": "v1",
"created": "Sun, 1 Jun 2008 08:30:10 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Tian",
"Yu-Chu",
""
],
[
"Sun",
"Youxian",
""
],
[
"Dong",
"Jinxiang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0806.0134 | Feng Xia | Feng Xia, Wenhong Zhao, Youxian Sun and Yu-Chu Tian | Fuzzy Logic Control Based QoS Management in Wireless Sensor/Actuator
Networks | 13 pages, 8 figures; Open Access at http://www.mdpi.org/sensors | Sensors 2007, 7(12), 3179-3191 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless sensor/actuator networks (WSANs) are emerging rapidly as a new
generation of sensor networks. Despite intensive research in wireless sensor
networks (WSNs), limited work has been found in the open literature in the
field of WSANs. In particular, quality-of-service (QoS) management in WSANs
remains an important issue yet to be investigated. As an attempt in this
direction, this paper develops a fuzzy logic control based QoS management
(FLC-QM) scheme for WSANs with constrained resources and in dynamic and
unpredictable environments. Taking advantage of the feedback control
technology, this scheme deals with the impact of unpredictable changes in
traffic load on the QoS of WSANs. It utilizes a fuzzy logic controller inside
each source sensor node to adapt sampling period to the deadline miss ratio
associated with data transmission from the sensor to the actuator. The deadline
miss ratio is maintained at a pre-determined desired level so that the required
QoS can be achieved. The FLC-QM has the advantages of generality, scalability,
and simplicity. Simulation results show that the FLC-QM can provide WSANs with
QoS support.
| [
{
"version": "v1",
"created": "Sun, 1 Jun 2008 08:39:23 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Zhao",
"Wenhong",
""
],
[
"Sun",
"Youxian",
""
],
[
"Tian",
"Yu-Chu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0806.0142 | Nina Filimonova | N. A. Filimonova | Regularization of Invers Problem for M-Ary Channel | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of computation of parameters of m-ary channel is considered. It
is demonstrated that although the problem is ill-posed, it is possible turning
of the parameters of the system and transform the problem to well-posed one.
| [
{
"version": "v1",
"created": "Sun, 1 Jun 2008 11:42:20 GMT"
}
] | 2008-06-03T00:00:00 | [
[
"Filimonova",
"N. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.0172 | Grenville Croll | David Chadwick | EuSpRIG TEAM work:Tools, Education, Audit, Management | 7 Pages, 1 Figure | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2003 1-6 ISBN
1 86166 199 1 | null | null | cs.HC cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Research on spreadsheet errors began over fifteen years ago. During that
time, there has been ample evidence demonstrating that spreadsheet errors are
common and nontrivial. Quite simply, spreadsheet error rates are comparable to
error rates in other human cognitive activities and are caused by fundamental
limitations in human cognition, not mere sloppiness. Nor does ordinary "being
careful" eliminate errors or reduce them to acceptable levels.
| [
{
"version": "v1",
"created": "Sun, 1 Jun 2008 21:01:15 GMT"
}
] | 2008-06-03T00:00:00 | [
[
"Chadwick",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0806.0182 | Grenville Croll | David R. Chadwick | Training Gamble leads to Corporate Grumble? | 8 Pages, 4 Figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2002 1-11
ISBN 1 86166 182 | null | null | cs.HC cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fifteen years of research studies have concluded unanimously that spreadsheet
errors are both common and non-trivial. Now we must seek ways to reduce
spreadsheet errors. Several approaches have been suggested, some of which are
promising and others, while appealing because they are easy to do, are not
likely to be effective. To date, only one technique, cell-by-cell code
inspection, has been demonstrated to be effective. We need to conduct further
research to determine the degree to which other techniques can reduce
spreadsheet errors.
| [
{
"version": "v1",
"created": "Sun, 1 Jun 2008 23:14:22 GMT"
}
] | 2008-06-03T00:00:00 | [
[
"Chadwick",
"David R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0806.0189 | Grenville Croll | Pat Cleary, Dr David Ball, Mukul Madahar, Simon Thorne, Christopher
Gosling, Karen Fernandez | Investigating the use of Software Agents to Reduce The Risk of
Undetected Errors in Strategic Spreadsheet Applications | 12 Pages, 3 Tables, 3 Figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2003 147-159
ISBN 1 86166 199 1 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is an overlooked iceberg of problems in end user computing.
Spreadsheets are developed by people who are very skilled in their main job
function, be it finance, procurement, or production planning, but often have
had no formal training in spreadsheet use. IT auditors focus on mainstream
information systems but regard spreadsheets as user problems, outside their
concerns. Internal auditors review processes, but not the tools that support
decision making in these processes.
This paper highlights the gaps between risk management and end user awareness
in spreadsheet research. In addition the potential benefits of software agent
technologies to the management of risk in spreadsheets are explored. This paper
discusses the current research into end user computing and spreadsheet use
awareness.
| [
{
"version": "v1",
"created": "Sun, 1 Jun 2008 23:51:12 GMT"
}
] | 2008-06-03T00:00:00 | [
[
"Cleary",
"Pat",
""
],
[
"Ball",
"Dr David",
""
],
[
"Madahar",
"Mukul",
""
],
[
"Thorne",
"Simon",
""
],
[
"Gosling",
"Christopher",
""
],
[
"Fernandez",
"Karen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0806.0250 | Arjen Hommersom | Arjen Hommersom, Peter J.F. Lucas, and Patrick van Bommel | Checking the Quality of Clinical Guidelines using Automated Reasoning
Tools | To appear in Theory and Practice of Logic Programming | null | null | null | cs.AI cs.LO cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Requirements about the quality of clinical guidelines can be represented by
schemata borrowed from the theory of abductive diagnosis, using temporal logic
to model the time-oriented aspects expressed in a guideline. Previously, we
have shown that these requirements can be verified using interactive theorem
proving techniques. In this paper, we investigate how this approach can be
mapped to the facilities of a resolution-based theorem prover, Otter, and a
complementary program that searches for finite models of first-order
statements, Mace. It is shown that the reasoning required for checking the
quality of a guideline can be mapped to such fully automated theorem-proving
facilities. The medical quality of an actual guideline concerning diabetes
mellitus 2 is investigated in this way.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2008 11:02:40 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Hommersom",
"Arjen",
""
],
[
"Lucas",
"Peter J. F.",
""
],
[
"van Bommel",
"Patrick",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0806.0253 | Oleg Verbitsky | Alexander Ravsky and Oleg Verbitsky | On collinear sets in straight line drawings | Several small amendments; 21 pages, 11 figures | null | null | null | cs.CG cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider straight line drawings of a planar graph $G$ with possible edge
crossings. The \emph{untangling problem} is to eliminate all edge crossings by
moving as few vertices as possible to new positions. Let $fix(G)$ denote the
maximum number of vertices that can be left fixed in the worst case. In the
\emph{allocation problem}, we are given a planar graph $G$ on $n$ vertices
together with an $n$-point set $X$ in the plane and have to draw $G$ without
edge crossings so that as many vertices as possible are located in $X$. Let
$fit(G)$ denote the maximum number of points fitting this purpose in the worst
case. As $fix(G)\le fit(G)$, we are interested in upper bounds for the latter
and lower bounds for the former parameter.
For each $\epsilon>0$, we construct an infinite sequence of graphs with
$fit(G)=O(n^{\sigma+\epsilon})$, where $\sigma<0.99$ is a known graph-theoretic
constant, namely the shortness exponent for the class of cubic polyhedral
graphs. To the best of our knowledge, this is the first example of graphs with
$fit(G)=o(n)$. On the other hand, we prove that $fix(G)\ge\sqrt{n/30}$ for all
$G$ with tree-width at most 2. This extends the lower bound obtained by Goaoc
et al. [Discrete and Computational Geometry 42:542-569 (2009)] for outerplanar
graphs.
Our upper bound for $fit(G)$ is based on the fact that the constructed graphs
can have only few collinear vertices in any crossing-free drawing. To prove the
lower bound for $fix(G)$, we show that graphs of tree-width 2 admit drawings
that have large sets of collinear vertices with some additional special
properties.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2008 18:01:35 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jul 2008 12:17:43 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Mar 2011 09:43:57 GMT"
},
{
"version": "v4",
"created": "Tue, 8 Nov 2011 15:18:17 GMT"
},
{
"version": "v5",
"created": "Fri, 11 Nov 2011 12:09:51 GMT"
}
] | 2011-11-14T00:00:00 | [
[
"Ravsky",
"Alexander",
""
],
[
"Verbitsky",
"Oleg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0806.0282 | Jukka Suomela | Patrik Flor\'een, Marja Hassinen, Petteri Kaski, Jukka Suomela | Local approximation algorithms for a class of 0/1 max-min linear
programs | 7 pages, 3 figures | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the applicability of distributed, local algorithms to 0/1 max-min
LPs where the objective is to maximise ${\min_k \sum_v c_{kv} x_v}$ subject to
${\sum_v a_{iv} x_v \le 1}$ for each $i$ and ${x_v \ge 0}$ for each $v$. Here
$c_{kv} \in \{0,1\}$, $a_{iv} \in \{0,1\}$, and the support sets ${V_i = \{v :
a_{iv} > 0 \}}$ and ${V_k = \{v : c_{kv}>0 \}}$ have bounded size; in
particular, we study the case $|V_k| \le 2$. Each agent $v$ is responsible for
choosing the value of $x_v$ based on information within its constant-size
neighbourhood; the communication network is the hypergraph where the sets $V_k$
and $V_i$ constitute the hyperedges. We present a local approximation algorithm
which achieves an approximation ratio arbitrarily close to the theoretical
lower bound presented in prior work.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2008 14:27:46 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Floréen",
"Patrik",
""
],
[
"Hassinen",
"Marja",
""
],
[
"Kaski",
"Petteri",
""
],
[
"Suomela",
"Jukka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0806.0283 | Dmitry Lande | D.V. Lande | Model of information diffusion | 5 pages, 5 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The system of cellular automata, which expresses the process of dissemination
and publication of the news among separate information resources, has been
described. A bell-shaped dependence of news diffusion on internet-sources
(web-sites) coheres well with a real behavior of thematic data flows, and at
local time spans - with noted models, e.g., exponential and logistic ones.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2008 14:22:41 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Lande",
"D. V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.0311 | Dieter Mitsche | J. Diaz, D. Mitsche, X. Perez | On the Probability of the Existence of Fixed-Size Components in Random
Geometric Graphs | 14 pages, 5 figures | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we give precise asymptotic expressions on the probability of the
existence of fixed-size components at the threshold of connectivity for random
geometric graphs.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2008 15:44:38 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Jun 2008 09:49:01 GMT"
},
{
"version": "v3",
"created": "Wed, 23 Jul 2008 13:13:26 GMT"
}
] | 2008-07-23T00:00:00 | [
[
"Diaz",
"J.",
""
],
[
"Mitsche",
"D.",
""
],
[
"Perez",
"X.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0806.0314 | Nicholas Manoukis | N. C. Manoukis and E. C. Anderson | GuiLiner: A Configurable and Extensible Graphical User Interface for
Scientific Analysis and Simulation Software | 4 pages; for the current version of this software, please visit
http://guiliner.sourceforge.net/ | null | null | null | cs.HC cs.SE | http://creativecommons.org/licenses/publicdomain/ | The computer programs most users interact with daily are driven by a
graphical user interface (GUI). However, many scientific applications are used
with a command line interface (CLI) for the ease of development and increased
flexibility this mode provides. Scientific application developers would benefit
from being able to provide a GUI easily for their CLI programs, thus retaining
the advantages of both modes of interaction. GuiLiner is a generic, extensible
and flexible front-end designed to ``host'' a wide variety of data analysis or
simulation programs. Scientific application developers who produce a correctly
formatted XML file describing their program's options and some of its
documentation can immediately use GuiLiner to produce a carefully implemented
GUI for their analysis or simulation programs.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2008 15:57:55 GMT"
}
] | 2008-06-03T00:00:00 | [
[
"Manoukis",
"N. C.",
""
],
[
"Anderson",
"E. C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0806.0341 | David Eppstein | David Eppstein and Michael T. Goodrich | Succinct Greedy Graph Drawing in the Hyperbolic Plane | 12 pages, 8 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe an efficient method for drawing any n-vertex simple graph G in
the hyperbolic plane. Our algorithm produces greedy drawings, which support
greedy geometric routing, so that a message M between any pair of vertices may
be routed geometrically, simply by having each vertex that receives M pass it
along to any neighbor that is closer in the hyperbolic metric to the message's
eventual destination. More importantly, for networking applications, our
algorithm produces succinct drawings, in that each of the vertex positions in
one of our embeddings can be represented using O(log n) bits and the
calculation of which neighbor to send a message to may be performed efficiently
using these representations. These properties are useful, for example, for
routing in sensor networks, where storage and bandwidth are limited.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2008 17:35:58 GMT"
}
] | 2008-06-03T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0806.0398 | Wesley Calvert | Wesley Calvert | Metric Structures and Probabilistic Computation | null | null | null | null | math.LO cs.LO math.FA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Continuous first-order logic is used to apply model-theoretic analysis to
analytic structures (e.g. Hilbert spaces, Banach spaces, probability spaces,
etc.). Classical computable model theory is used to examine the algorithmic
structure of mathematical objects that can be described in classical
first-order logic. The present paper shows that probabilistic computation
(sometimes called randomized computation) can play an analogous role for
structures described in continuous first-order logic. The main result of this
paper is an effective completeness theorem, showing that every decidable
continuous first-order theory has a probabilistically decidable model. Later
sections give examples of the application of this framework to various classes
of structures, and to some problems of computational complexity theory.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2008 21:15:00 GMT"
}
] | 2008-06-04T00:00:00 | [
[
"Calvert",
"Wesley",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
}
] |
0806.0473 | Damien Chablat | Damien Chablat (IRCCyN) | Kinematic Analysis of the vertebra of an eel like robot | null | Dans ASME Design Engineering Technical Conferences - 32nd Annual
Mechanisms and Robotics Conference (MR), New-York : \'Etats-Unis d'Am\'erique
(2008) | null | null | cs.RO physics.class-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The kinematic analysis of a spherical wrist with parallel architecture is the
object of this article. This study is part of a larger French project, which
aims to design and to build an eel like robot to imitate the eel swimming. To
implement direct and inverse kinematics on the control law of the prototype, we
need to evaluate the workspace without any collisions between the different
bodies. The tilt and torsion parameters are used to represent the workspace.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2008 09:33:53 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
] |
0806.0478 | Akira Terui | Akira Terui | Subresultants in Recursive Polynomial Remainder Sequence | 13 pages. Presented at CASC 2003 (Passau, Germany, September 20-26,
2003) | Proceedings of The 6th International Workshop on Computer Algebra
in Scientific Computing: CASC 2003, Institute for Informatics, Technische
Universitat Munchen, Garching, Germanay, 2003, 363-375 | null | null | math.AC cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce concepts of "recursive polynomial remainder sequence (PRS)" and
"recursive subresultant," and investigate their properties. In calculating PRS,
if there exists the GCD (greatest common divisor) of initial polynomials, we
calculate "recursively" with new PRS for the GCD and its derivative, until a
constant is derived. We call such a PRS a recursive PRS. We define recursive
subresultants to be determinants representing the coefficients in recursive PRS
by coefficients of initial polynomials. Finally, we discuss usage of recursive
subresultants in approximate algebraic computation, which motivates the present
work.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2008 10:09:36 GMT"
}
] | 2010-07-13T00:00:00 | [
[
"Terui",
"Akira",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0806.0488 | Akira Terui | Akira Terui | Recursive Polynomial Remainder Sequence and the Nested Subresultants | 12 pages. Presented at CASC 2005 (Kalamata, Greece, Septermber 12-16,
2005) | Computer Algebra in Scientific Computing (Proc. CASC 2005),
Lecture Notes in Computer Science 3718, Springer, 2005, 445-456 | 10.1007/11555964_38 | null | math.AC cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give two new expressions of subresultants, nested subresultant and reduced
nested subresultant, for the recursive polynomial remainder sequence (PRS)
which has been introduced by the author. The reduced nested subresultant
reduces the size of the subresultant matrix drastically compared with the
recursive subresultant proposed by the authors before, hence it is much more
useful for investigation of the recursive PRS. Finally, we discuss usage of the
reduced nested subresultant in approximate algebraic computation, which
motivates the present work.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2008 10:24:55 GMT"
}
] | 2010-07-13T00:00:00 | [
[
"Terui",
"Akira",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0806.0495 | Akira Terui | Akira Terui | Recursive Polynomial Remainder Sequence and its Subresultants | 30 pages. Preliminary versions of this paper have been presented at
CASC 2003 (arXiv:0806.0478 [math.AC]) and CASC 2005 (arXiv:0806.0488
[math.AC]) | Journal of Algebra, Vol. 320, No. 2, pp. 633-659, 2008 | 10.1016/j.jalgebra.2007.12.023 | null | math.AC cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce concepts of "recursive polynomial remainder sequence (PRS)" and
"recursive subresultant," along with investigation of their properties. A
recursive PRS is defined as, if there exists the GCD (greatest common divisor)
of initial polynomials, a sequence of PRSs calculated "recursively" for the GCD
and its derivative until a constant is derived, and recursive subresultants are
defined by determinants representing the coefficients in recursive PRS as
functions of coefficients of initial polynomials. We give three different
constructions of subresultant matrices for recursive subresultants; while the
first one is built-up just with previously defined matrices thus the size of
the matrix increases fast as the recursion deepens, the last one reduces the
size of the matrix drastically by the Gaussian elimination on the second one
which has a "nested" expression, i.e. a Sylvester matrix whose elements are
themselves determinants.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2008 10:52:48 GMT"
}
] | 2010-07-13T00:00:00 | [
[
"Terui",
"Akira",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0806.0519 | Pradorn Sureephong | Pradorn Sureephong (LIESP, CAMT), Nopasit Chakpitak (CAMT), Laurent
Buzon (LIESP), Abdelaziz Bouras (LIESP) | Cluster Development and Knowledge Exchange in Supply Chain | null | The Proceeding of International conference on Software Knowledge
Information Management and Applications (SKIMA 2008), Katmandu : N\'epal
(2008) | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Industry cluster and supply chain are in focus of every countries which rely
on knowledge-based economy. Both focus on improving the competitiveness of firm
in the industry in the different aspect. This paper tries to illustrate how the
industry cluster can increase the supply chain performance. Then, the proposed
methodology concentrates on the collaboration and knowledge exchange in supply
chain. For improving the capability of the proposed methodology, information
technology is applied to facilitate the communication and the exchange of
knowledge between the actors of the supply chain within the cluster. The supply
chain of French stool producer was used as a case study to validate the
methodology and to demonstrate the result of the study.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2008 12:24:14 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Sureephong",
"Pradorn",
"",
"LIESP, CAMT"
],
[
"Chakpitak",
"Nopasit",
"",
"CAMT"
],
[
"Buzon",
"Laurent",
"",
"LIESP"
],
[
"Bouras",
"Abdelaziz",
"",
"LIESP"
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0806.0526 | Pradorn Sureephong | Pradorn Sureephong (LIESP, CAMT), Nopasit Chakpitak (CAMT), Yacine
Ouzrout (LIESP), Abdelaziz Bouras (LIESP) | An Ontology-based Knowledge Management System for Industry Clusters | null | Dans Proceeding of International Conference on Advanced Design and
Manufacture - International Conference on Advanced Design and Manufacture
(ICADAM 2008), Sanya : Chine (2008) | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowledge-based economy forces companies in the nation to group together as a
cluster in order to maintain their competitiveness in the world market. The
cluster development relies on two key success factors which are knowledge
sharing and collaboration between the actors in the cluster. Thus, our study
tries to propose knowledge management system to support knowledge management
activities within the cluster. To achieve the objectives of this study,
ontology takes a very important role in knowledge management process in various
ways; such as building reusable and faster knowledge-bases, better way for
representing the knowledge explicitly. However, creating and representing
ontology create difficulties to organization due to the ambiguity and
unstructured of source of knowledge. Therefore, the objectives of this paper
are to propose the methodology to create and represent ontology for the
organization development by using knowledge engineering approach. The
handicraft cluster in Thailand is used as a case study to illustrate our
proposed methodology.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2008 12:38:50 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Sureephong",
"Pradorn",
"",
"LIESP, CAMT"
],
[
"Chakpitak",
"Nopasit",
"",
"CAMT"
],
[
"Ouzrout",
"Yacine",
"",
"LIESP"
],
[
"Bouras",
"Abdelaziz",
"",
"LIESP"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0806.0535 | Joerg Rothe | Gabor Erdelyi, Markus Nowak, and Joerg Rothe | Sincere-Strategy Preference-Based Approval Voting Fully Resists
Constructive Control and Broadly Resists Destructive Control | 26 pages | null | null | null | cs.GT cs.CC cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study sincere-strategy preference-based approval voting (SP-AV), a system
proposed by Brams and Sanver [Electoral Studies, 25(2):287-305, 2006], and here
adjusted so as to coerce admissibility of the votes (rather than excluding
inadmissible votes a priori), with respect to procedural control. In such
control scenarios, an external agent seeks to change the outcome of an election
via actions such as adding/deleting/partitioning either candidates or voters.
SP-AV combines the voters' preference rankings with their approvals of
candidates, where in elections with at least two candidates the voters'
approval strategies are adjusted--if needed--to approve of their most-preferred
candidate and to disapprove of their least-preferred candidate. This rule
coerces admissibility of the votes even in the presence of control actions, and
hybridizes, in effect, approval with pluralitiy voting.
We prove that this system is computationally resistant (i.e., the
corresponding control problems are NP-hard) to 19 out of 22 types of
constructive and destructive control. Thus, SP-AV has more resistances to
control than is currently known for any other natural voting system with a
polynomial-time winner problem. In particular, SP-AV is (after Copeland voting,
see Faliszewski et al. [AAIM-2008, Springer LNCS 5034, pp. 165-176, 2008]) the
second natural voting system with an easy winner-determination procedure that
is known to have full resistance to constructive control, and unlike Copeland
voting it in addition displays broad resistance to destructive control.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2008 13:27:16 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Jun 2008 22:20:59 GMT"
},
{
"version": "v3",
"created": "Sun, 7 Sep 2008 21:57:12 GMT"
},
{
"version": "v4",
"created": "Fri, 26 Sep 2008 09:35:47 GMT"
},
{
"version": "v5",
"created": "Fri, 12 Jun 2009 15:06:59 GMT"
}
] | 2009-06-12T00:00:00 | [
[
"Erdelyi",
"Gabor",
""
],
[
"Nowak",
"Markus",
""
],
[
"Rothe",
"Joerg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0806.0557 | Qin Li | Qin Li, Chengqing Li, Chunhui Wu, Dongyang Long, Changji Wang | An efficient and provably secure arbitrated quantum signature scheme | some contents are wrong | null | null | null | quant-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, an efficient arbitrated quantum signature scheme is proposed
by combining quantum cryptographic techniques and some ideas in classical
cryptography. In the presented scheme, the signatory and the receiver can share
a long-term secret key with the arbitrator by utilizing the key together with a
random number. While in previous quantum signature schemes, the key shared
between the signatory and the arbitrator or between the receiver and the
arbitrator could be used only once, and thus each time when a signatory needs
to sign, the signatory and the receiver have to obtain a new key shared with
the arbitrator through a quantum key distribution protocol. Detailed
theoretical analysis shows that the proposed scheme is efficient and provably
secure.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2008 14:23:48 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Aug 2008 08:28:11 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Jul 2011 03:55:19 GMT"
},
{
"version": "v4",
"created": "Mon, 15 Jun 2020 02:05:00 GMT"
}
] | 2020-06-16T00:00:00 | [
[
"Li",
"Qin",
""
],
[
"Li",
"Chengqing",
""
],
[
"Wu",
"Chunhui",
""
],
[
"Long",
"Dongyang",
""
],
[
"Wang",
"Changji",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0806.0562 | Dominique Bontemps | Dominique Bontemps (LM-Orsay) | Universal Coding on Infinite Alphabets: Exponentially Decreasing
Envelopes | null | IEEE Transactions on Information Theory 57, 3 (2011) 1466 - 1478 | 10.1109/TIT.2010.2103831 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with the problem of universal lossless coding on a countable
infinite alphabet. It focuses on some classes of sources defined by an envelope
condition on the marginal distribution, namely exponentially decreasing
envelope classes with exponent $\alpha$. The minimax redundancy of
exponentially decreasing envelope classes is proved to be equivalent to
$\frac{1}{4 \alpha \log e} \log^2 n$. Then a coding strategy is proposed, with
a Bayes redundancy equivalent to the maximin redundancy. At last, an adaptive
algorithm is provided, whose redundancy is equivalent to the minimax redundancy
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2008 14:46:29 GMT"
},
{
"version": "v2",
"created": "Mon, 31 May 2010 08:27:58 GMT"
}
] | 2011-07-07T00:00:00 | [
[
"Bontemps",
"Dominique",
"",
"LM-Orsay"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.0576 | Wojciech Mazurczyk | Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk | Steganographic Routing in Multi Agent System Environment | 9 pages, 10 figures, | "Secured Information Systems" of Journal of Information Assurance
and Security (JIAS), Dynamic Publishers Inc., Atlanta, GA 30362, USA, Volume
2, Issue 3, September 2007, pp. 235-243, ISSN 1554-1010 | null | null | cs.CR cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present an idea of trusted communication platform for
Multi-Agent Systems (MAS) called TrustMAS. Based on analysis of routing
protocols suitable for MAS we have designed a new proactive hidden routing.
Proposed steg-agents discovery procedure, as well as further routes updates and
hidden communication, are cryptographically independent. Steganographic
exchange can cover heterogeneous and geographically outlying environments using
available cross-layer covert channels. Finally we have specified rules that
agents have to follow to benefit the TrustMAS distributed router platform.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2008 16:15:16 GMT"
}
] | 2008-06-04T00:00:00 | [
[
"Szczypiorski",
"Krzysztof",
""
],
[
"Margasinski",
"Igor",
""
],
[
"Mazurczyk",
"Wojciech",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0806.0579 | Michael Fleyer | Michael Fleyer, Amir Rosenthal, Alex Linden, and Moshe Horowitz | Multirate Synchronous Sampling of Sparse Multiband Signals | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent advances in optical systems make them ideal for undersampling
multiband signals that have high bandwidths. In this paper we propose a new
scheme for reconstructing multiband sparse signals using a small number of
sampling channels. The scheme, which we call synchronous multirate sampling
(SMRS), entails gathering samples synchronously at few different rates whose
sum is significantly lower than the Nyquist sampling rate. The signals are
reconstructed by solving a system of linear equations. We have demonstrated an
accurate and robust reconstruction of signals using a small number of sampling
channels that operate at relatively high rates. Sampling at higher rates
increases the signal to noise ratio in samples. The SMRS scheme enables a
significant reduction in the number of channels required when the sampling rate
increases. We have demonstrated, using only three sampling channels, an
accurate sampling and reconstruction of 4 real signals (8 bands). The matrices
that are used to reconstruct the signals in the SMRS scheme also have low
condition numbers. This indicates that the SMRS scheme is robust to noise in
signals. The success of the SMRS scheme relies on the assumption that the
sampled signals are sparse. As a result most of the sampled spectrum may be
unaliased in at least one of the sampling channels. This is in contrast to
multicoset sampling schemes in which an alias in one channel is equivalent to
an alias in all channels. We have demonstrated that the SMRS scheme obtains
similar performance using 3 sampling channels and a total sampling rate 8 times
the Landau rate to an implementation of a multicoset sampling scheme that uses
6 sampling channels with a total sampling rate of 13 times the Landau rate.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2008 16:52:25 GMT"
}
] | 2008-06-04T00:00:00 | [
[
"Fleyer",
"Michael",
""
],
[
"Rosenthal",
"Amir",
""
],
[
"Linden",
"Alex",
""
],
[
"Horowitz",
"Moshe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.0604 | Wei Wang | Wei Wang, Martin J. Wainwright, Kannan Ramchandran | Information-theoretic limits on sparse signal recovery: Dense versus
sparse measurement matrices | Appeared as UC Berkeley, Department of Statistics, Technical Report | null | null | null | math.ST cs.IT math.IT stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the information-theoretic limits of exactly recovering the support
of a sparse signal using noisy projections defined by various classes of
measurement matrices. Our analysis is high-dimensional in nature, in which the
number of observations $n$, the ambient signal dimension $p$, and the signal
sparsity $k$ are all allowed to tend to infinity in a general manner. This
paper makes two novel contributions. First, we provide sharper necessary
conditions for exact support recovery using general (non-Gaussian) dense
measurement matrices. Combined with previously known sufficient conditions,
this result yields sharp characterizations of when the optimal decoder can
recover a signal for various scalings of the sparsity $k$ and sample size $n$,
including the important special case of linear sparsity ($k = \Theta(p)$) using
a linear scaling of observations ($n = \Theta(p)$). Our second contribution is
to prove necessary conditions on the number of observations $n$ required for
asymptotically reliable recovery using a class of $\gamma$-sparsified
measurement matrices, where the measurement sparsity $\gamma(n, p, k) \in
(0,1]$ corresponds to the fraction of non-zero entries per row. Our analysis
allows general scaling of the quadruplet $(n, p, k, \gamma)$, and reveals three
different regimes, corresponding to whether measurement sparsity has no effect,
a minor effect, or a dramatic effect on the information-theoretic limits of the
subset recovery problem.
| [
{
"version": "v1",
"created": "Tue, 3 Jun 2008 18:29:00 GMT"
}
] | 2008-06-04T00:00:00 | [
[
"Wang",
"Wei",
""
],
[
"Wainwright",
"Martin J.",
""
],
[
"Ramchandran",
"Kannan",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0806.0676 | Rui Zhang | Rui Zhang | On Peak versus Average Interference Power Constraints for Protecting
Primary Users in Cognitive Radio Networks | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers spectrum sharing for wireless communication between a
cognitive radio (CR) link and a primary radio (PR) link. It is assumed that the
CR protects the PR transmission by applying the so-called
interference-temperature constraint, whereby the CR is allowed to transmit
regardless of the PR's on/off status provided that the resultant interference
power level at the PR receiver is kept below some predefined threshold. For the
fading PR and CR channels, the interference-power constraint at the PR receiver
is usually one of the following two types: One is to regulate the average
interference power (AIP) over all the fading states, while the other is to
limit the peak interference power (PIP) at each fading state. From the CR's
perspective, given the same average and peak power threshold, the AIP
constraint is more favorable than the PIP counterpart because of its more
flexibility for dynamically allocating transmit powers over the fading states.
On the contrary, from the perspective of protecting the PR, the more
restrictive PIP constraint appears at a first glance to be a better option than
the AIP. Some surprisingly, this paper shows that in terms of various forms of
capacity limits achievable for the PR fading channel, e.g., the ergodic and
outage capacities, the AIP constraint is also superior over the PIP. This
result is based upon an interesting interference diversity phenomenon, i.e.,
randomized interference powers over the fading states in the AIP case are more
advantageous over deterministic ones in the PIP case for minimizing the
resultant PR capacity losses. Therefore, the AIP constraint results in larger
fading channel capacities than the PIP for both the CR and PR transmissions.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2008 01:33:57 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Sep 2008 07:33:08 GMT"
}
] | 2008-09-12T00:00:00 | [
[
"Zhang",
"Rui",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.0689 | Hongjun Jia | Hongjun Jia, Li Zhang | Directional Cross Diamond Search Algorithm for Fast Block Motion
Estimation | 23 pages, 9 figures, technical report, related paper under submission | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In block-matching motion estimation (BMME), the search patterns have a
significant impact on the algorithm's performance, both the search speed and
the search quality. The search pattern should be designed to fit the motion
vector probability (MVP) distribution characteristics of the real-world
sequences. In this paper, we build a directional model of MVP distribution to
describe the directional-center-biased characteristic of the MVP distribution
and the directional characteristics of the conditional MVP distribution more
exactly based on the detailed statistical data of motion vectors of eighteen
popular sequences. Three directional search patterns are firstly designed by
utilizing the directional characteristics and they are the smallest search
patterns among the popular ones. A new algorithm is proposed using the
horizontal cross search pattern as the initial step and the horizontal/vertical
diamond search pattern as the subsequent step for the fast BMME, which is
called the directional cross diamond search (DCDS) algorithm. The DCDS
algorithm can obtain the motion vector with fewer search points than CDS, DS or
HEXBS while maintaining the similar or even better search quality. The gain on
speedup of DCDS over CDS or DS can be up to 54.9%. The simulation results show
that DCDS is efficient, effective and robust, and it can always give the faster
search speed on different sequences than other fast block-matching algorithm in
common use.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2008 05:05:19 GMT"
}
] | 2008-06-05T00:00:00 | [
[
"Jia",
"Hongjun",
""
],
[
"Zhang",
"Li",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0806.0740 | Agus Budiyono PhD | J. Muliadi, S.D. Jenie, A. Budiyono | Modeling And Simulation Of Prolate Dual-Spin Satellite Dynamics In An
Inclined Elliptical Orbit: Case Study Of Palapa B2R Satellite | 13 pages, 22 figures | Symposium on Aerospace Science and Technology, Jakarta, 2005 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In response to the interest to re-use Palapa B2R satellite nearing its End of
Life (EOL) time, an idea to incline the satellite orbit in order to cover a new
region has emerged in the recent years. As a prolate dual-spin vehicle, Palapa
B2R has to be stabilized against its internal energy dissipation effect. This
work is focused on analyzing the dynamics of the reusable satellite in its
inclined orbit. The study discusses in particular the stability of the prolate
dual-spin satellite under the effect of perturbed field of gravitation due to
the inclination of its elliptical orbit. Palapa B2R physical data was
substituted into the dual-spin's equation of motion. The coefficient of zonal
harmonics J2 was induced into the gravity-gradient moment term that affects the
satellite attitude. The satellite's motion and attitude were then simulated in
the perturbed gravitational field by J2, with the variation of orbit's
eccentricity and inclination. The analysis of the satellite dynamics and its
stability was conducted for designing a control system for the vehicle in its
new inclined orbit.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2008 10:33:07 GMT"
}
] | 2008-06-05T00:00:00 | [
[
"Muliadi",
"J.",
""
],
[
"Jenie",
"S. D.",
""
],
[
"Budiyono",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0806.0743 | Agus Budiyono PhD | A. Budiyono | Onboard Multivariable Controller Design for a Small Scale Helicopter
Using Coefficient Diagram Method | 8 pages, 6 figures | Proceedings of the ICEST, Seoul, Korea, May 2005 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A mini scale helicopter exhibits not only increased sensitivity to control
inputs and disturbances, but also higher bandwidth of its dynamics. These
properties make model helicopters, as a flying robot, more difficult to
control. The dynamics model accuracy will determine the performance of the
designed controller. It is attractive in this regards to have a controller that
can accommodate the unmodeled dynamics or parameter changes and perform well in
such situations. Coefficient Diagram Method (CDM) is chosen as the candidate to
synthesize such a controller due to its simplicity and convenience in
demonstrating integrated performance measures including equivalent time
constant, stability indices and robustness. In this study, CDM is implemented
for a design of multivariable controller for a small scale helicopter during
hover and cruise flight. In the synthesis of MIMO CDM, good design common sense
based on hands-on experience is necessary. The low level controller algorithm
is designed as part of hybrid supervisory control architecture to be
implemented on an onboard computer system. Its feasibility and performance are
evaluated based on its robustness, desired time domain system responses and
compliance to hard-real time requirements.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2008 10:45:49 GMT"
}
] | 2008-06-05T00:00:00 | [
[
"Budiyono",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0806.0784 | Sylvie Saget | Sylvie Saget, Francois Legras, Gilles Coppin | Collaborative model of interaction and Unmanned Vehicle Systems'
interface | null | Dans HCP workshop on "Supervisory Control in Critical Systems
Management" - 3rd International Conference on Human Centered Processes
(HCP-2008), Delft : Pays-Bas (2008) | null | null | cs.AI cs.HC cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The interface for the next generation of Unmanned Vehicle Systems should be
an interface with multi-modal displays and input controls. Then, the role of
the interface will not be restricted to be a support of the interactions
between the ground operator and vehicles. Interface must take part in the
interaction management too. In this paper, we show that recent works in
pragmatics and philosophy provide a suitable theoretical framework for the next
generation of UV System's interface. We concentrate on two main aspects of the
collaborative model of interaction based on acceptance: multi-strategy approach
for communicative act generation and interpretation and communicative
alignment.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2008 14:22:38 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Saget",
"Sylvie",
""
],
[
"Legras",
"Francois",
""
],
[
"Coppin",
"Gilles",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0806.0837 | Leonid Reyzin | Nenad Dedi\'c, Gene Itkis, Leonid Reyzin, Scott Russell | Upper and Lower Bounds on Black-Box Steganography | 27 pages; to be published in Journal of Cryptology | null | 10.1007/s00145-008-9020-3 | null | cs.CR cs.CC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the limitations of steganography when the sender is not using any
properties of the underlying channel beyond its entropy and the ability to
sample from it. On the negative side, we show that the number of samples the
sender must obtain from the channel is exponential in the rate of the
stegosystem. On the positive side, we present the first secret-key stegosystem
that essentially matches this lower bound regardless of the entropy of the
underlying channel. Furthermore, for high-entropy channels, we present the
first secret-key stegosystem that matches this lower bound statelessly (i.e.,
without requiring synchronized state between sender and receiver).
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2008 19:07:48 GMT"
}
] | 2008-06-05T00:00:00 | [
[
"Dedić",
"Nenad",
""
],
[
"Itkis",
"Gene",
""
],
[
"Reyzin",
"Leonid",
""
],
[
"Russell",
"Scott",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.0838 | Javad Kazemitabar | Javad Kazemitabar and Hamid Jafarkhani | Performance Analysis of Multiple Antenna Multi-User Detection | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We derive the diversity order of some multiple antenna multi-user
cancellation and detection schemes. The common property of these detection
methods is the usage of Alamouti and quasi-orthogonal space-time block codes.
For detecting $J$ users each having $N$ transmit antennas, these schemes
require only $J$ antennas at the receiver. Our analysis shows that when having
$M$ receive antennas, the array-processing schemes provide the diversity order
of $N(M-J+1)$. In addition, our results prove that regardless of the number of
users or receive antennas, when using maximum-likelihood decoding we get the
full transmit and receive diversities, i.e. $NM$, similar to the
no-interference scenario.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2008 19:13:59 GMT"
}
] | 2008-06-05T00:00:00 | [
[
"Kazemitabar",
"Javad",
""
],
[
"Jafarkhani",
"Hamid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.0840 | Mugurel Ionut Andreica | Mugurel Ionut Andreica | A Dynamic Programming Framework for Combinatorial Optimization Problems
on Graphs with Bounded Pathwidth | Some of the ideas presented in this paper were later used by the
author for preparing algorithmic tasks for several contests where the author
was a member of the scientific committee (e.g. ACM ICPC Southeastern regional
contest 2009 and Balkan olympiad in informatics 2011). Such tasks (including
the task statement and solutions) can be found in the attached zip archive;
THETA 16 / AQTR, Cluj-Napoca : Romania (2008) | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present an algorithmic framework for solving a class of
combinatorial optimization problems on graphs with bounded pathwidth. The
problems are NP-hard in general, but solvable in linear time on this type of
graphs. The problems are relevant for assessing network reliability and
improving the network's performance and fault tolerance. The main technique
considered in this paper is dynamic programming.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2008 19:18:45 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Dec 2012 14:03:58 GMT"
}
] | 2012-12-18T00:00:00 | [
[
"Andreica",
"Mugurel Ionut",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0806.0860 | Amit K Awasthi | Amit K Awasthi | On the Security of Liaw et al.'s Scheme | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, Liaw et al. proposed a remote user authentication scheme using
smartcards. They claimed a number of features of their scheme, e.g. a
dictionary of verification tables is not required to authenticate users; users
can choose their password freely; mutual authentication is provided between the
user and the remote system; the communication cost and the computational cost
are very low; users can update their password after the registration phase; a
session key agreed by the user and the remote system is generated in every
session; and the nonce-based scheme which does not require a timestamp (to
solve the serious time synchronization problem) etc.
In this paper We show that Liaw et al.'s scheme does not stand with various
security requirements and is completely insecure.
Keywords: Authentication, Smartcards, Remote system, Attack.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2008 20:44:33 GMT"
}
] | 2008-06-06T00:00:00 | [
[
"Awasthi",
"Amit K",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0806.0870 | Laurent Younes | Darryl D. Holm, Alain Trouve and Laurent Younes | The Euler-Poincare theory of Metamorphosis | null | null | null | null | cs.CV nlin.CD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the pattern matching approach to imaging science, the process of
``metamorphosis'' is template matching with dynamical templates. Here, we
recast the metamorphosis equations of into the Euler-Poincare variational
framework of and show that the metamorphosis equations contain the equations
for a perfect complex fluid \cite{Ho2002}. This result connects the ideas
underlying the process of metamorphosis in image matching to the physical
concept of order parameter in the theory of complex fluids. After developing
the general theory, we reinterpret various examples, including point set, image
and density metamorphosis. We finally discuss the issue of matching measures
with metamorphosis, for which we provide existence theorems for the initial and
boundary value problems.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2008 22:58:41 GMT"
}
] | 2008-06-14T00:00:00 | [
[
"Holm",
"Darryl D.",
""
],
[
"Trouve",
"Alain",
""
],
[
"Younes",
"Laurent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
}
] |
0806.0874 | Vassilis Kostakos | Vassilis Kostakos | Towards sustainable transport: wireless detection of passenger trips on
public transport buses | 13 pages, 4 figures, 1 table | Personal and Ubiquitous Computing, 17(8):1807-1816, 2013 | 10.1007/s00779-013-0652-4 | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important problem in creating efficient public transport is obtaining data
about the set of trips that passengers make, usually referred to as an
Origin/Destination (OD) matrix. Obtaining this data is problematic and
expensive in general, especially in the case of buses because on-board
ticketing systems do not record where and when passengers get off a bus. In
this paper we describe a novel and inexpensive system that uses off-the-shelf
Bluetooth hardware to accurately record passenger journeys. Here we show how
our system can be used to derive passenger OD matrices, and additionally we
show how our data can be used to further improve public transport services.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2008 23:40:04 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Jun 2008 11:38:20 GMT"
},
{
"version": "v3",
"created": "Wed, 6 Aug 2008 19:47:19 GMT"
},
{
"version": "v4",
"created": "Fri, 8 Aug 2008 08:17:45 GMT"
}
] | 2013-12-05T00:00:00 | [
[
"Kostakos",
"Vassilis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0806.0899 | Victor Patrangenaru | V. Patrangenaru, X. Liu, S. Sugathadasa | A Nonparametric Approach to 3D Shape Analysis from Digital Camera Images
- I. in Memory of W.P. Dayawansa | 24 pages | null | null | null | stat.ME cs.CV math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, for the first time, one develops a nonparametric methodology
for an analysis of shapes of configurations of landmarks on real 3D objects
from regular camera photographs, thus making 3D shape analysis very accessible.
A fundamental result in computer vision by Faugeras (1992), Hartley, Gupta and
Chang (1992) is that generically, a finite 3D configuration of points can be
retrieved up to a projective transformation, from corresponding configurations
in a pair of camera images. Consequently, the projective shape of a 3D
configuration can be retrieved from two of its planar views. Given the inherent
registration errors, the 3D projective shape can be estimated from a sample of
photos of the scene containing that configuration. Projective shapes are here
regarded as points on projective shape manifolds. Using large sample and
nonparametric bootstrap methodology for extrinsic means on manifolds, one gives
confidence regions and tests for the mean projective shape of a 3D
configuration from its 2D camera images.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 04:26:49 GMT"
}
] | 2008-06-14T00:00:00 | [
[
"Patrangenaru",
"V.",
""
],
[
"Liu",
"X.",
""
],
[
"Sugathadasa",
"S.",
""
]
] | [
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0806.0903 | Ming-Yang Chen | Shao-Lun Huang, Ming-Yang Chen, Kwang-Cheng Chen, John M. Cioffi | On the Capacity of Gaussian Relay Channels | This article has been withdrawn | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn due to that the same conclusion has been
proposed before.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 07:39:04 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Jun 2008 22:42:12 GMT"
}
] | 2008-06-11T00:00:00 | [
[
"Huang",
"Shao-Lun",
""
],
[
"Chen",
"Ming-Yang",
""
],
[
"Chen",
"Kwang-Cheng",
""
],
[
"Cioffi",
"John M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.0905 | Himal Suraweera Dr. | Himal A. Suraweera, Jason Gao, Peter J. Smith, Mansoor Shafi and
Michael Faulkner | Channel Capacity Limits of Cognitive Radio in Asymmetric Fading
Environments | 6 pages, 8 figures, in Proceedings of IEEE International Conference
on Communications (ICC 2008), Beijing, China, May 19-23, 2008 | null | 10.1109/ICC.2008.760 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cognitive radio technology is an innovative radio design concept which aims
to increase spectrum utilization by exploiting unused spectrum in dynamically
changing environments. By extending previous results, we investigate the
capacity gains achievable with this dynamic spectrum approach in asymmetric
fading channels. More specifically, we allow the secondary-to-primary and
secondary-to-secondary user channels to undergo Rayleigh or Rician fading, with
arbitrary link power. In order to compute the capacity, we derive the
distributions of ratios of Rayleigh and Rician variables. Compared to the
symmetric fading scenario, our results indicate several interesting features of
the capacity behaviour under both average and peak received power constraints.
Finally, the impact of multiple primary users on the capacity under asymmetric
fading has also been studied.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 07:51:07 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Suraweera",
"Himal A.",
""
],
[
"Gao",
"Jason",
""
],
[
"Smith",
"Peter J.",
""
],
[
"Shafi",
"Mansoor",
""
],
[
"Faulkner",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.0909 | Martin Haenggi | Martin Haenggi | Outage and Local Throughput and Capacity of Random Wireless Networks | 22 pages, 6 figures. Submitted to IEEE Trans. Wireless | null | 10.1109/TWC.2009.090105 | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Outage probabilities and single-hop throughput are two important performance
metrics that have been evaluated for certain specific types of wireless
networks. However, there is a lack of comprehensive results for larger classes
of networks, and there is no systematic approach that permits the convenient
comparison of the performance of networks with different geometries and levels
of randomness.
The uncertainty cube is introduced to categorize the uncertainty present in a
network. The three axes of the cube represent the three main potential sources
of uncertainty in interference-limited networks: the node distribution, the
channel gains (fading), and the channel access (set of transmitting nodes). For
the performance analysis, a new parameter, the so-called {\em spatial
contention}, is defined. It measures the slope of the outage probability in an
ALOHA network as a function of the transmit probability $p$ at $p=0$. Outage is
defined as the event that the signal-to-interference ratio (SIR) is below a
certain threshold in a given time slot. It is shown that the spatial contention
is sufficient to characterize outage and throughput in large classes of
wireless networks, corresponding to different positions on the uncertainty
cube. Existing results are placed in this framework, and new ones are derived.
Further, interpreting the outage probability as the SIR distribution, the
ergodic capacity of unit-distance links is determined and compared to the
throughput achievable for fixed (yet optimized) transmission rates.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 06:15:38 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Haenggi",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.0920 | Alexander Wolff | Kevin Buchin, Maike Buchin, Jaroslaw Byrka, Martin N\"ollenburg,
Yoshio Okamoto, Rodrigo I. Silveira, Alexander Wolff | Drawing (Complete) Binary Tanglegrams: Hardness, Approximation,
Fixed-Parameter Tractability | Journal version | null | null | null | cs.CG cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A \emph{binary tanglegram} is a drawing of a pair of rooted binary trees
whose leaf sets are in one-to-one correspondence; matching leaves are connected
by inter-tree edges. For applications, for example, in phylogenetics, it is
essential that both trees are drawn without edge crossings and that the
inter-tree edges have as few crossings as possible. It is known that finding a
tanglegram with the minimum number of crossings is NP-hard and that the problem
is fixed-parameter tractable with respect to that number.
We prove that under the Unique Games Conjecture there is no constant-factor
approximation for binary trees. We show that the problem is NP-hard even if
both trees are complete binary trees. For this case we give an $O(n^3)$-time
2-approximation and a new, simple fixed-parameter algorithm. We show that the
maximization version of the dual problem for binary trees can be reduced to a
version of MaxCut for which the algorithm of Goemans and Williamson yields a
0.878-approximation.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 09:31:57 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Jun 2008 09:13:11 GMT"
},
{
"version": "v3",
"created": "Thu, 16 Sep 2010 13:34:08 GMT"
}
] | 2010-09-17T00:00:00 | [
[
"Buchin",
"Kevin",
""
],
[
"Buchin",
"Maike",
""
],
[
"Byrka",
"Jaroslaw",
""
],
[
"Nöllenburg",
"Martin",
""
],
[
"Okamoto",
"Yoshio",
""
],
[
"Silveira",
"Rodrigo I.",
""
],
[
"Wolff",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0806.0921 | Leslie Ann Goldberg | Leslie Ann Goldberg and Mark Jerrum and Marek Karpinski | The Mixing Time of Glauber Dynamics for Colouring Regular Trees | null | null | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider Metropolis Glauber dynamics for sampling proper $q$-colourings of
the $n$-vertex complete $b$-ary tree when $3\leq q\leq b/2\ln(b)$. We give both
upper and lower bounds on the mixing time. For fixed $q$ and $b$, our upper
bound is $n^{O(b/\log b)}$ and our lower bound is $n^{\Omega(b/q \log(b))}$,
where the constants implicit in the $O()$ and $\Omega()$ notation do not depend
upon $n$, $q$ or $b$.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 19:58:32 GMT"
}
] | 2008-06-06T00:00:00 | [
[
"Goldberg",
"Leslie Ann",
""
],
[
"Jerrum",
"Mark",
""
],
[
"Karpinski",
"Marek",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0806.0928 | Martin N\"ollenburg | Martin N\"ollenburg, Danny Holten, Markus V\"olker, Alexander Wolff | Drawing Binary Tanglegrams: An Experimental Evaluation | see
http://www.siam.org/proceedings/alenex/2009/alx09_011_nollenburgm.pdf | Proceedings of the 11th Workshop on Algorithm Engineering and
Experiments (ALENEX'09), pages 106-119. SIAM, April 2009 | null | null | cs.DS cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A binary tanglegram is a pair <S,T> of binary trees whose leaf sets are in
one-to-one correspondence; matching leaves are connected by inter-tree edges.
For applications, for example in phylogenetics or software engineering, it is
required that the individual trees are drawn crossing-free. A natural
optimization problem, denoted tanglegram layout problem, is thus to minimize
the number of crossings between inter-tree edges.
The tanglegram layout problem is NP-hard and is currently considered both in
application domains and theory. In this paper we present an experimental
comparison of a recursive algorithm of Buchin et al., our variant of their
algorithm, the algorithm hierarchy sort of Holten and van Wijk, and an integer
quadratic program that yields optimal solutions.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 11:00:33 GMT"
}
] | 2009-05-15T00:00:00 | [
[
"Nöllenburg",
"Martin",
""
],
[
"Holten",
"Danny",
""
],
[
"Völker",
"Markus",
""
],
[
"Wolff",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0806.0936 | Roberto Amadio | Roberto Amadio (PPS) | On convergence-sensitive bisimulation and the embedding of CCS in timed
CCS | null | Proceedings of the 15th Workshop on Expressiveness in Concurrency
(EXPRESS 2008), Canada (2008) | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a notion of convergence-sensitive bisimulation that is built just
over the notions of (internal) reduction and of (static) context. In the
framework of timed CCS, we characterise this notion of `contextual'
bisimulation via the usual labelled transition system. We also remark that it
provides a suitable semantic framework for a fully abstract embedding of
untimed processes into timed ones. Finally, we show that the notion can be
refined to include sensitivity to divergence.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 09:32:07 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Sep 2008 14:12:21 GMT"
}
] | 2010-07-01T00:00:00 | [
[
"Amadio",
"Roberto",
"",
"PPS"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0806.0974 | Claudio Castellano | Filippo Radicchi, Santo Fortunato, Claudio Castellano | Universality of citation distributions: towards an objective measure of
scientific impact | 7 pages, 5 figures. accepted for publication in Proc. Natl Acad. Sci.
USA | Proc. Natl. Acad. Sci. USA 105, 17268-17272 (2008) | 10.1073/pnas.0806977105 | null | physics.soc-ph cond-mat.stat-mech cs.DL physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the distributions of citations received by a single publication
within several disciplines, spanning broad areas of science. We show that the
probability that an article is cited $c$ times has large variations between
different disciplines, but all distributions are rescaled on a universal curve
when the relative indicator $c_f=c/c_0$ is considered, where $c_0$ is the
average number of citations per article for the discipline. In addition we show
that the same universal behavior occurs when citation distributions of articles
published in the same field, but in different years, are compared. These
findings provide a strong validation of $c_f$ as an unbiased indicator for
citation performance across disciplines and years. Based on this indicator, we
introduce a generalization of the h-index suitable for comparing scientists
working in different fields.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 13:55:51 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Oct 2008 15:18:52 GMT"
}
] | 2008-11-04T00:00:00 | [
[
"Radicchi",
"Filippo",
""
],
[
"Fortunato",
"Santo",
""
],
[
"Castellano",
"Claudio",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0806.0983 | Sandy Irani | Joan Boyar, Sandy Irani, Kim S. Larsen | A Comparison of Performance Measures for Online Algorithms | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper provides a systematic study of several proposed measures for
online algorithms in the context of a specific problem, namely, the two server
problem on three colinear points. Even though the problem is simple, it
encapsulates a core challenge in online algorithms which is to balance
greediness and adaptability. We examine Competitive Analysis, the Max/Max
Ratio, the Random Order Ratio, Bijective Analysis and Relative Worst Order
Analysis, and determine how these measures compare the Greedy Algorithm, Double
Coverage, and Lazy Double Coverage, commonly studied algorithms in the context
of server problems. We find that by the Max/Max Ratio and Bijective Analysis,
Greedy is the best of the three algorithms. Under the other measures, Double
Coverage and Lazy Double Coverage are better, though Relative Worst Order
Analysis indicates that Greedy is sometimes better. Only Bijective Analysis and
Relative Worst Order Analysis indicate that Lazy Double Coverage is better than
Double Coverage. Our results also provide the first proof of optimality of an
algorithm under Relative Worst Order Analysis.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 14:50:08 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Oct 2012 16:03:13 GMT"
}
] | 2012-10-15T00:00:00 | [
[
"Boyar",
"Joan",
""
],
[
"Irani",
"Sandy",
""
],
[
"Larsen",
"Kim S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0806.1006 | Giuseppe Longo | M. Brescia, S. Cavuoti, G. d'Angelo, R. D'Abrusco, N. Deniskina, M.
Garofalo, O. Laurino, G. Longo, A. Nocella, B. Skordovski | The VO-Neural project: recent developments and some applications | Contributed, Data Centre Alliance Workshops: GRID and the Virtual
Observatory, April 9-11 Munich, to appear in Mem. SAIt | null | null | null | astro-ph cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | VO-Neural is the natural evolution of the Astroneural project which was
started in 1994 with the aim to implement a suite of neural tools for data
mining in astronomical massive data sets. At a difference with its ancestor,
which was implemented under Matlab, VO-Neural is written in C++, object
oriented, and it is specifically tailored to work in distributed computing
architectures. We discuss the current status of implementation of VO-Neural,
present an application to the classification of Active Galactic Nuclei, and
outline the ongoing work to improve the functionalities of the package.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 16:44:23 GMT"
}
] | 2008-06-14T00:00:00 | [
[
"Brescia",
"M.",
""
],
[
"Cavuoti",
"S.",
""
],
[
"d'Angelo",
"G.",
""
],
[
"D'Abrusco",
"R.",
""
],
[
"Deniskina",
"N.",
""
],
[
"Garofalo",
"M.",
""
],
[
"Laurino",
"O.",
""
],
[
"Longo",
"G.",
""
],
[
"Nocella",
"A.",
""
],
[
"Skordovski",
"B.",
""
]
] | [
null,
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0806.1034 | Wojciech Mazurczyk | Wojciech Mazurczyk and Jozef Lubacz | Analysis of a procedure for inserting steganographic data into VoIP
calls | 9 pages, 4 figures, published in Proceedings of PGTS '08, the Fifth
Polish-German Teletraffic Symposium | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper concerns performance analysis of a steganographic method, dedicated
primarily for VoIP, which was recently filed for patenting under the name LACK.
The performance of the method depends on the procedure of inserting covert data
into the stream of audio packets. After a brief presentation of the LACK
method, the paper focuses on analysis of the dependence of the insertion
procedure on the probability distribution of VoIP call duration.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 19:04:55 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Aug 2008 10:35:55 GMT"
}
] | 2008-08-25T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Lubacz",
"Jozef",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0806.1041 | Prajakta Nimbhorkar | Samir Datta, Nutan Limaye, Prajakta Nimbhorkar | 3-connected Planar Graph Isomorphism is in Log-space | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that the isomorphism of 3-connected planar graphs can be decided in
deterministic log-space. This improves the previously known bound UL$\cap$coUL
of Thierauf and Wagner.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 19:33:29 GMT"
}
] | 2008-09-16T00:00:00 | [
[
"Datta",
"Samir",
""
],
[
"Limaye",
"Nutan",
""
],
[
"Nimbhorkar",
"Prajakta",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0806.1062 | Hamidreza Farmanbar | Hamid Farmanbar and Amir K. Khandani | Capacity of Block-Memoryless Channels with Causal Channel Side
Information | 8 pages, submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The capacity of a time-varying block-memoryless channel in which the
transmitter and the receiver have access to (possibly different) noisy causal
channel side information (CSI) is obtained. It is shown that the capacity
formula obtained in this correspondence reduces to the capacity formula
reported in \cite{Gold07} for the special case where the transmitter CSI is a
deterministic function of the receiver CSI.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 21:38:56 GMT"
}
] | 2008-06-09T00:00:00 | [
[
"Farmanbar",
"Hamid",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.1071 | Graham Cormode | Graham Cormode and Minos Garofalakis | Histograms and Wavelets on Probabilistic Data | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is a growing realization that uncertain information is a first-class
citizen in modern database management. As such, we need techniques to correctly
and efficiently process uncertain data in database systems. In particular, data
reduction techniques that can produce concise, accurate synopses of large
probabilistic relations are crucial. Similar to their deterministic relation
counterparts, such compact probabilistic data synopses can form the foundation
for human understanding and interactive data exploration, probabilistic query
planning and optimization, and fast approximate query processing in
probabilistic database systems.
In this paper, we introduce definitions and algorithms for building
histogram- and wavelet-based synopses on probabilistic data. The core problem
is to choose a set of histogram bucket boundaries or wavelet coefficients to
optimize the accuracy of the approximate representation of a collection of
probabilistic tuples under a given error metric. For a variety of different
error metrics, we devise efficient algorithms that construct optimal or near
optimal B-term histogram and wavelet synopses. This requires careful analysis
of the structure of the probability distributions, and novel extensions of
known dynamic-programming-based techniques for the deterministic domain. Our
experiments show that this approach clearly outperforms simple ideas, such as
building summaries for samples drawn from the data distribution, while taking
equal or less time.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2008 23:19:56 GMT"
}
] | 2008-06-09T00:00:00 | [
[
"Cormode",
"Graham",
""
],
[
"Garofalakis",
"Minos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0806.1089 | Inanc Inan | Feyza Keceli, Inanc Inan, Ender Ayanoglu | Fair and Efficient TCP Access in the IEEE 802.11 Infrastructure Basic
Service Set | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When the stations in an IEEE 802.11 infrastructure Basic Service Set (BSS)
employ Transmission Control Protocol (TCP) in the transport layer, this
exacerbates per-flow unfair access which is a direct result of uplink/downlink
bandwidth asymmetry in the BSS. We propose a novel and simple analytical model
to approximately calculate the per-flow TCP congestion window limit that
provides fair and efficient TCP access in a heterogeneous wired-wireless
scenario. The proposed analysis is unique in that it considers the effects of
varying number of uplink and downlink TCP flows, differing Round Trip Times
(RTTs) among TCP connections, and the use of delayed TCP Acknowledgment (ACK)
mechanism. Motivated by the findings of this analysis, we design a link layer
access control block to be employed only at the Access Point (AP) in order to
resolve the unfair access problem. The novel and simple idea of the proposed
link layer access control block is employing a congestion control and filtering
algorithm on TCP ACK packets of uplink flows, thereby prioritizing the access
of TCP data packets of downlink flows at the AP. Via simulations, we show that
short- and long-term fair access can be provisioned with the introduction of
the proposed link layer access control block to the protocol stack of the AP
while improving channel utilization and access delay.
| [
{
"version": "v1",
"created": "Fri, 6 Jun 2008 04:29:20 GMT"
}
] | 2008-06-09T00:00:00 | [
[
"Keceli",
"Feyza",
""
],
[
"Inan",
"Inanc",
""
],
[
"Ayanoglu",
"Ender",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0806.1093 | Inanc Inan | Feyza Keceli, Inanc Inan, Ender Ayanoglu | Fair Access Provisioning through Contention Parameter Adaptation in the
IEEE 802.11e Infrastructure Basic Service Set | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the station-based unfair access problem among the uplink and the
downlink stations in the IEEE 802.11e infrastructure Basic Service Set (BSS)
when the default settings of the Enhanced Distributed Channel Access (EDCA)
parameters are used. We discuss how the transport layer protocol
characteristics alleviate the unfairness problem. We design a simple,
practical, and standard-compliant framework to be employed at the Access Point
(AP) for fair and efficient access provisioning. A dynamic measurement-based
EDCA parameter adaptation block lies in the core of this framework. The
proposed framework is unique in the sense that it considers the characteristic
differences of Transmission Control Protocol (TCP) and User Datagram Protocol
(UDP) flows and the coexistence of stations with varying bandwidth or
Quality-of-Service (QoS) requirements. Via simulations, we show that our
solution provides short- and long-term fair access for all stations in the
uplink and downlink employing TCP and UDP flows with non-uniform packet rates
in a wired-wireless heterogeneous network. In the meantime, the QoS
requirements of coexisting real-time flows are also maintained.
| [
{
"version": "v1",
"created": "Fri, 6 Jun 2008 05:04:02 GMT"
}
] | 2008-06-09T00:00:00 | [
[
"Keceli",
"Feyza",
""
],
[
"Inan",
"Inanc",
""
],
[
"Ayanoglu",
"Ender",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0806.1100 | Adrian Paschke | Adrian Paschke | Design Patterns for Complex Event Processing | Paschke, A.: Design Patterns for Complex Event Processing, 2nd
International Conference on Distributed Event-Based Systems (DEBS'08), Rome,
Italy, 2008 | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Currently engineering efficient and successful event-driven applications
based on the emerging Complex Event Processing (CEP) technology, is a laborious
trial and error process. The proposed CEP design pattern approach should
support CEP engineers in their design decisions to build robust and efficient
CEP solutions with well understood tradeoffs and should enable an
interdisciplinary and efficient communication process about successful CEP
solutions in different application domains.
| [
{
"version": "v1",
"created": "Fri, 6 Jun 2008 07:39:49 GMT"
}
] | 2008-06-09T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0806.1103 | Guillaume Fertin | S\'ebastien Angibaud (LINA), Guillaume Fertin (LINA), Irena Rusu
(LINA), Annelyse Thevenin (LRI), St\'ephane Vialette (IGM) | On the Approximability of Comparing Genomes with Duplicates | null | null | null | null | q-bio.QM cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A central problem in comparative genomics consists in computing a
(dis-)similarity measure between two genomes, e.g. in order to construct a
phylogeny. All the existing measures are defined on genomes without duplicates.
However, we know that genes can be duplicated within the same genome. One
possible approach to overcome this difficulty is to establish a one-to-one
correspondence (i.e. a matching) between genes of both genomes, where the
correspondence is chosen in order to optimize the studied measure. In this
paper, we are interested in three measures (number of breakpoints, number of
common intervals and number of conserved intervals) and three models of
matching (exemplar, intermediate and maximum matching models). We prove that,
for each model and each measure M, computing a matching between two genomes
that optimizes M is APX-hard. We also study the complexity of the following
problem: is there an exemplarization (resp. an intermediate/maximum matching)
that induces no breakpoint? We prove the problem to be NP-Complete in the
exemplar model for a new class of instances, and we show that the problem is in
P in the maximum matching model. We also focus on a fourth measure: the number
of adjacencies, for which we give several approximation algorithms in the
maximum matching model, in the case where genomes contain the same number of
duplications of each gene.
| [
{
"version": "v1",
"created": "Fri, 6 Jun 2008 08:15:19 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Angibaud",
"Sébastien",
"",
"LINA"
],
[
"Fertin",
"Guillaume",
"",
"LINA"
],
[
"Rusu",
"Irena",
"",
"LINA"
],
[
"Thevenin",
"Annelyse",
"",
"LRI"
],
[
"Vialette",
"Stéphane",
"",
"IGM"
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0806.1139 | Miguel Andres | Miguel E. Andres, Pedro D'Argenio, Peter van Rossum | Significant Diagnostic Counterexamples in Probabilistic Model Checking | null | null | null | null | cs.LO cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel technique for counterexample generation in
probabilistic model checking of Markov Chains and Markov Decision Processes.
(Finite) paths in counterexamples are grouped together in witnesses that are
likely to provide similar debugging information to the user. We list five
properties that witnesses should satisfy in order to be useful as debugging
aid: similarity, accuracy, originality, significance, and finiteness. Our
witnesses contain paths that behave similar outside strongly connected
components.
This papers shows how to compute these witnesses by reducing the problem of
generating counterexamples for general properties over Markov Decision
Processes, in several steps, to the easy problem of generating counterexamples
for reachability properties over acyclic Markov Chains.
| [
{
"version": "v1",
"created": "Fri, 6 Jun 2008 13:09:49 GMT"
}
] | 2008-06-09T00:00:00 | [
[
"Andres",
"Miguel E.",
""
],
[
"D'Argenio",
"Pedro",
""
],
[
"van Rossum",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0806.1144 | Giuseppe Longo | N. Deniskina, M. Brescia, S. Cavuoti, G. d'Angelo, O. Laurino, G.
Longo | GRID-Launcher v.1.0 | Contributed, Data Centre Alliance Workshops: GRID and the Virtual
Observatory, April 9-11 Munich, to appear in Mem. SAIt | null | null | null | astro-ph cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | GRID-launcher-1.0 was built within the VO-Tech framework, as a software
interface between the UK-ASTROGRID and a generic GRID infrastructures in order
to allow any ASTROGRID user to launch on the GRID computing intensive tasks
from the ASTROGRID Workbench or Desktop. Even though of general application, so
far the Grid-Launcher has been tested on a few selected softwares
(VONeural-MLP, VONeural-SVM, Sextractor and SWARP) and on the SCOPE-GRID.
| [
{
"version": "v1",
"created": "Fri, 6 Jun 2008 12:35:17 GMT"
}
] | 2008-06-14T00:00:00 | [
[
"Deniskina",
"N.",
""
],
[
"Brescia",
"M.",
""
],
[
"Cavuoti",
"S.",
""
],
[
"d'Angelo",
"G.",
""
],
[
"Laurino",
"O.",
""
],
[
"Longo",
"G.",
""
]
] | [
null,
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0806.1148 | Dominik Scheder | Dominik Scheder and Philipp Zumstein | Unsatisfiable CNF Formulas need many Conflicts | new version; added an upper bound on the number of conflicts | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A pair of clauses in a CNF formula constitutes a conflict if there is a
variable that occurs positively in one clause and negatively in the other. A
CNF formula without any conflicts is satisfiable. The Lovasz Local Lemma
implies that a k-CNF formula is satisfiable if each clause conflicts with at
most 2^k/e-1 clauses. It does not, however, give any good bound on how many
conflicts an unsatisfiable formula has globally. We show here that every
unsatisfiable k-CNF formula requires 2.69^k conflicts and there exist
unsatisfiable k-CNF formulas with 3.51^k conflicts.
| [
{
"version": "v1",
"created": "Fri, 6 Jun 2008 12:48:42 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Sep 2010 13:36:12 GMT"
}
] | 2010-09-07T00:00:00 | [
[
"Scheder",
"Dominik",
""
],
[
"Zumstein",
"Philipp",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0806.1156 | Cnrs : Umr 6057 Laboratoire Parole Et Langage | Irina Nesterenko (LPL), St\'ephane Rauzy (LPL) | Utilisation des grammaires probabilistes dans les t\^aches de
segmentation et d'annotation prosodique | null | Journ\'ees d'Etudes sur la Parole, Avignon : France (2008) | null | 3267 | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nous pr\'esentons dans cette contribution une approche \`a la fois symbolique
et probabiliste permettant d'extraire l'information sur la segmentation du
signal de parole \`a partir d'information prosodique. Nous utilisons pour ce
faire des grammaires probabilistes poss\'edant une structure hi\'erarchique
minimale. La phase de construction des grammaires ainsi que leur pouvoir de
pr\'ediction sont \'evalu\'es qualitativement ainsi que quantitativement.
-----
Methodologically oriented, the present work sketches an approach for prosodic
information retrieval and speech segmentation, based on both symbolic and
probabilistic information. We have recourse to probabilistic grammars, within
which we implement a minimal hierarchical structure. Both the stages of
probabilistic grammar building and its testing in prediction are explored and
quantitatively and qualitatively evaluated.
| [
{
"version": "v1",
"created": "Fri, 6 Jun 2008 13:33:31 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Nesterenko",
"Irina",
"",
"LPL"
],
[
"Rauzy",
"Stéphane",
"",
"LPL"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0806.1199 | Lukas Kroc | Michael Chertkov, Lukas Kroc, Massimo Vergassola | Belief Propagation and Beyond for Particle Tracking | 8 pages, 2 figures | null | null | LA-UR-08-3645 | cs.IT cond-mat.stat-mech cs.AI cs.LG math.IT physics.flu-dyn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a novel approach to statistical learning from particles tracked
while moving in a random environment. The problem consists in inferring
properties of the environment from recorded snapshots. We consider here the
case of a fluid seeded with identical passive particles that diffuse and are
advected by a flow. Our approach rests on efficient algorithms to estimate the
weighted number of possible matchings among particles in two consecutive
snapshots, the partition function of the underlying graphical model. The
partition function is then maximized over the model parameters, namely
diffusivity and velocity gradient. A Belief Propagation (BP) scheme is the
backbone of our algorithm, providing accurate results for the flow parameters
we want to learn. The BP estimate is additionally improved by incorporating
Loop Series (LS) contributions. For the weighted matching problem, LS is
compactly expressed as a Cauchy integral, accurately estimated by a saddle
point approximation. Numerical experiments show that the quality of our
improved BP algorithm is comparable to the one of a fully polynomial randomized
approximation scheme, based on the Markov Chain Monte Carlo (MCMC) method,
while the BP-based scheme is substantially faster than the MCMC scheme.
| [
{
"version": "v1",
"created": "Fri, 6 Jun 2008 16:18:13 GMT"
}
] | 2008-06-09T00:00:00 | [
[
"Chertkov",
"Michael",
""
],
[
"Kroc",
"Lukas",
""
],
[
"Vergassola",
"Massimo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.flu-dyn",
"description": "Turbulence, instabilities, incompressible/compressible flows, reacting flows. Aero/hydrodynamics, fluid-structure interactions, acoustics. Biological fluid dynamics, micro/nanofluidics, interfacial phenomena. Complex fluids, suspensions and granular flows, porous media flows. Geophysical flows, thermoconvective and stratified flows. Mathematical and computational methods for fluid dynamics, fluid flow models, experimental techniques.",
"span": "(Fluid Dynamics)"
}
] |
0806.1215 | Lav Varshney | Lav R. Varshney | Performance of LDPC Codes Under Faulty Iterative Decoding | Revised in May 2010 in response to reviewer comments | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Departing from traditional communication theory where decoding algorithms are
assumed to perform without error, a system where noise perturbs both
computational devices and communication channels is considered here. This paper
studies limits in processing noisy signals with noisy circuits by investigating
the effect of noise on standard iterative decoders for low-density parity-check
codes. Concentration of decoding performance around its average is shown to
hold when noise is introduced into message-passing and local computation.
Density evolution equations for simple faulty iterative decoders are derived.
In one model, computing nonlinear estimation thresholds shows that performance
degrades smoothly as decoder noise increases, but arbitrarily small probability
of error is not achievable. Probability of error may be driven to zero in
another system model; the decoding threshold again decreases smoothly with
decoder noise. As an application of the methods developed, an achievability
result for reliable memory systems constructed from unreliable components is
provided.
| [
{
"version": "v1",
"created": "Fri, 6 Jun 2008 18:32:08 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Aug 2009 15:36:42 GMT"
},
{
"version": "v3",
"created": "Fri, 28 May 2010 18:13:54 GMT"
}
] | 2010-05-31T00:00:00 | [
[
"Varshney",
"Lav R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.1231 | Francisco Assis | F. M. Assis, P. Mateus, Y. Omar | Improving Classical Authentication with Quantum Communication | New improved version, with several clarifications in the text and new
figures | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a quantum-enhanced protocol to authenticate classical messages,
with improved security with respect to the classical scheme introduced by
Brassard in 1983. In that protocol, the shared key is the seed of a
pseudo-random generator (PRG) and a hash function is used to create the
authentication tag of a public message. We show that a quantum encoding of
secret bits offers more security than the classical XOR function introduced by
Brassard. Furthermore, we establish the relationship between the bias of a PRG
and the amount of information about the key that the attacker can retrieve from
a block of authenticated messages. Finally, we prove that quantum resources can
improve both the secrecy of the key generated by the PRG and the secrecy of the
tag obtained with a hidden hash function.
| [
{
"version": "v1",
"created": "Fri, 6 Jun 2008 20:37:15 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Feb 2010 23:43:03 GMT"
}
] | 2010-02-12T00:00:00 | [
[
"Assis",
"F. M.",
""
],
[
"Mateus",
"P.",
""
],
[
"Omar",
"Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.1246 | Rodrigo Torrens | Rodrigo Torrens, Luis A. Nunez and Raisa Urribarri | ICT, Community Memory and Technological Appropriation | 15 pages, 2 figures | null | null | null | cs.DL cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The core mission of universities and higher education institutions is to make
public the results of their work and to preserve the collective memory of the
institution. This includes the effective use of information and communication
technologies (ICT) to systematically compile academic and research achievements
as well as disseminate effectively this accumulated knowledge to society at
large. Current efforts in Latin America and Venezuela in particular, are
limited but provide some valuable insights to pave the road to this important
goal. The institutional repository of Universidad de Los Andes (ULA) in
Venezuela (www.saber.ula.ve) is such an example of ICT usage to store, manage
and disseminate digital material produced by our University. In this paper we
elaborate on the overall process of promoting a culture of content creation,
publishing and preservation within ULA.
| [
{
"version": "v1",
"created": "Fri, 6 Jun 2008 22:37:43 GMT"
}
] | 2008-06-10T00:00:00 | [
[
"Torrens",
"Rodrigo",
""
],
[
"Nunez",
"Luis A.",
""
],
[
"Urribarri",
"Raisa",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0806.1256 | Marta Gonzalez | M.C. Gonzalez, C.A. Hidalgo, and A.-L. Barabasi | Understanding individual human mobility patterns | Supporting Webpage:
http://www.nd.edu/~mgonza16/Marta'sHomepage_files/nature2008/research.html | Nature 453, 479-482 (2008) | 10.1038/nature06958 | null | physics.soc-ph cond-mat.stat-mech cs.CY physics.bio-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite their importance for urban planning, traffic forecasting, and the
spread of biological and mobile viruses, our understanding of the basic laws
governing human motion remains limited thanks to the lack of tools to monitor
the time resolved location of individuals. Here we study the trajectory of
100,000 anonymized mobile phone users whose position is tracked for a six month
period. We find that in contrast with the random trajectories predicted by the
prevailing Levy flight and random walk models, human trajectories show a high
degree of temporal and spatial regularity, each individual being characterized
by a time independent characteristic length scale and a significant probability
to return to a few highly frequented locations. After correcting for
differences in travel distances and the inherent anisotropy of each trajectory,
the individual travel patterns collapse into a single spatial probability
distribution, indicating that despite the diversity of their travel history,
humans follow simple reproducible patterns. This inherent similarity in travel
patterns could impact all phenomena driven by human mobility, from epidemic
prevention to emergency response, urban planning and agent based modeling.
| [
{
"version": "v1",
"created": "Sat, 7 Jun 2008 02:30:28 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Gonzalez",
"M. C.",
""
],
[
"Hidalgo",
"C. A.",
""
],
[
"Barabasi",
"A. -L.",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.bio-ph",
"description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.",
"span": "(Biological Physics)"
}
] |
0806.1271 | Andreas Klappenecker | Andreas Klappenecker, Hyunyoung Lee, Jennifer L. Welch (Texas A&M
University) | Scheduling Sensors by Tiling Lattices | 9 pages, 11 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Suppose that wirelessly communicating sensors are placed in a regular fashion
on the points of a lattice. Common communication protocols allow the sensors to
broadcast messages at arbitrary times, which can lead to problems should two
sensors broadcast at the same time. It is shown that one can exploit a tiling
of the lattice to derive a deterministic periodic schedule for the broadcast
communication of sensors that is guaranteed to be collision-free. The proposed
schedule is shown to be optimal in the number of time slots.
| [
{
"version": "v1",
"created": "Sat, 7 Jun 2008 07:36:34 GMT"
}
] | 2008-06-10T00:00:00 | [
[
"Klappenecker",
"Andreas",
"",
"Texas A&M\n University"
],
[
"Lee",
"Hyunyoung",
"",
"Texas A&M\n University"
],
[
"Welch",
"Jennifer L.",
"",
"Texas A&M\n University"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0806.1280 | Khaled Khalil | Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy and Abdel-Badeeh M.
Salem | The Role of Artificial Intelligence Technologies in Crisis Response | 6 pages, 5 figures, 1 table, accepted for MENDEL 2008 14th
International Conference on Soft Computing, June 18-20, Brno, Czech Republic | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Crisis response poses many of the most difficult information technology in
crisis management. It requires information and communication-intensive efforts,
utilized for reducing uncertainty, calculating and comparing costs and
benefits, and managing resources in a fashion beyond those regularly available
to handle routine problems. In this paper, we explore the benefits of
artificial intelligence technologies in crisis response. This paper discusses
the role of artificial intelligence technologies; namely, robotics, ontology
and semantic web, and multi-agent systems in crisis response.
| [
{
"version": "v1",
"created": "Sat, 7 Jun 2008 12:46:56 GMT"
}
] | 2008-06-10T00:00:00 | [
[
"Khalil",
"Khaled M.",
""
],
[
"Abdel-Aziz",
"M.",
""
],
[
"Nazmy",
"Taymour T.",
""
],
[
"Salem",
"Abdel-Badeeh M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0806.1281 | Wojciech Moczydlowski | Robert Constable and Wojciech Moczydlowski | Extracting Programs from Constructive HOL Proofs via IZF
Set-Theoretic<br> Semantics | 17 pages | Logical Methods in Computer Science, Volume 4, Issue 3 (September
9, 2008) lmcs:1140 | 10.2168/LMCS-4(3:5)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Church's Higher Order Logic is a basis for influential proof assistants --
HOL and PVS. Church's logic has a simple set-theoretic semantics, making it
trustworthy and extensible. We factor HOL into a constructive core plus axioms
of excluded middle and choice. We similarly factor standard set theory, ZFC,
into a constructive core, IZF, and axioms of excluded middle and choice. Then
we provide the standard set-theoretic semantics in such a way that the
constructive core of HOL is mapped into IZF. We use the disjunction, numerical
existence and term existence properties of IZF to provide a program extraction
capability from proofs in the constructive core.
We can implement the disjunction and numerical existence properties in two
different ways: one using Rathjen's realizability for IZF and the other using a
new direct weak normalization result for IZF by Moczydlowski. The latter can
also be used for the term existence property.
| [
{
"version": "v1",
"created": "Sat, 7 Jun 2008 13:43:46 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Sep 2008 14:47:24 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Constable",
"Robert",
""
],
[
"Moczydlowski",
"Wojciech",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0806.1284 | Chenggong Lv | Chenggong Lv, Jun Wang, Lu Liu, and Weijia You | The Separation of Duty with Privilege Calculus | RSKT2008 conference, LNAI 5009, pp.410-417, 2008 | null | null | null | cs.CR cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents Privilege Calculus (PC) as a new approach of knowledge
representation for Separation of Duty (SD) in the view of process and intents
to improve the reconfigurability and traceability of SD. PC presumes that the
structure of SD should be reduced to the structure of privilege and then the
regulation of system should be analyzed with the help of forms of privilege.
| [
{
"version": "v1",
"created": "Sat, 7 Jun 2008 15:13:45 GMT"
}
] | 2008-06-10T00:00:00 | [
[
"Lv",
"Chenggong",
""
],
[
"Wang",
"Jun",
""
],
[
"Liu",
"Lu",
""
],
[
"You",
"Weijia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0806.1316 | Berry Groisman | Berry Groisman | The end of Sleeping Beauty's nightmare | 7 pages, MSWord, to appear in The British Journal for the Philosophy
of Science | null | null | null | cs.AI math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The way a rational agent changes her belief in certain
propositions/hypotheses in the light of new evidence lies at the heart of
Bayesian inference. The basic natural assumption, as summarized in van
Fraassen's Reflection Principle ([1984]), would be that in the absence of new
evidence the belief should not change. Yet, there are examples that are claimed
to violate this assumption. The apparent paradox presented by such examples, if
not settled, would demonstrate the inconsistency and/or incompleteness of the
Bayesian approach and without eliminating this inconsistency, the approach
cannot be regarded as scientific.
The Sleeping Beauty Problem is just such an example. The existing attempts to
solve the problem fall into three categories. The first two share the view that
new evidence is absent, but differ about the conclusion of whether Sleeping
Beauty should change her belief or not, and why. The third category is
characterized by the view that, after all, new evidence (although hidden from
the initial view) is involved.
My solution is radically different and does not fall in either of these
categories. I deflate the paradox by arguing that the two different degrees of
belief presented in the Sleeping Beauty Problem are in fact beliefs in two
different propositions, i.e. there is no need to explain the (un)change of
belief.
| [
{
"version": "v1",
"created": "Sun, 8 Jun 2008 08:42:00 GMT"
}
] | 2008-06-10T00:00:00 | [
[
"Groisman",
"Berry",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0806.1340 | Prasun Dutta | Prasun Dutta, S. Pratik Khastgir and Anushree Roy | Steiner trees and spanning trees in six-pin soap films | null | null | null | null | cs.CG cond-mat.other physics.class-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have studied the Steiner tree problem using six-pin soap films in detail.
We extend the existing method of experimental realisation of Steiner trees in
$n$-terminal problem through soap films to observe new non-minimal Steiner
trees. We also produced spanning tree configurations for the first time by our
method. Experimentally, by varying the pin diameter, we have achieved these new
stable soap film configurations. A new algorithm is presented for creating
these Steiner trees theoretically.
Exact lengths of these Steiner tree configurations are calculated using a
geometrical method. An exact two-parameter empirical formula is proposed for
estimating the lengths of these soap film configurations in six-pin soap film
problem.
| [
{
"version": "v1",
"created": "Sun, 8 Jun 2008 16:58:31 GMT"
}
] | 2008-06-15T00:00:00 | [
[
"Dutta",
"Prasun",
""
],
[
"Khastgir",
"S. Pratik",
""
],
[
"Roy",
"Anushree",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Physics",
"code": "cond-mat.other",
"description": "Work in condensed matter that does not fit into the other cond-mat classifications",
"span": "(Other Condensed Matter)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
] |
0806.1343 | Riccardo Alberti | Riccardo Alberti | Temporized Equilibria | This paper has been withdrawn | null | null | null | cs.GT cs.AI | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper has been withdrawn by the author due to a crucial error in the
submission action.
| [
{
"version": "v1",
"created": "Sun, 8 Jun 2008 17:39:56 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Jun 2008 23:19:52 GMT"
},
{
"version": "v3",
"created": "Sun, 21 Sep 2008 19:33:56 GMT"
},
{
"version": "v4",
"created": "Wed, 24 Sep 2008 11:28:44 GMT"
}
] | 2008-09-24T00:00:00 | [
[
"Alberti",
"Riccardo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0806.1355 | Leonid Andreev V | Leonid Andreev | From a set of parts to an indivisible whole. Part III: Holistic space of
multi-object relations | 16 pages, 16 figures | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The previously described methodology for hierarchical grouping of objects
through iterative averaging has been used for simulation of cooperative
interactions between objects of a system with the purpose of investigation of
the conformational organization of the system. Interactions between objects
were analyzed within the space of an isotropic field of one of the objects
(drifter). Such an isotropic field of an individual object can be viewed as a
prototype of computer ego. It allows visualization of a holistic space of
multi-object relations (HSMOR) which has a complex structure depending on the
number of objects, their mutual arrangement in space, and the type of metric
used for assessment of (dis)similarities between the objects. In the course of
computer simulation of cooperative interactions between the objects, only those
points of the space were registered which corresponded to transitions in
hierarchical grouping. Such points appeared to aggregate into complex spatial
structures determining a unique internal organization of a respective HSMOR. We
describe some of the peculiarities of such structures, referred to by us as
attractor membranes, and discuss their properties. We also demonstrate the
peculiarities of the changing of intergroup similarities which occurs when a
drifter infinitely moves away from the fixed objects.
| [
{
"version": "v1",
"created": "Sun, 8 Jun 2008 20:50:11 GMT"
}
] | 2008-06-10T00:00:00 | [
[
"Andreev",
"Leonid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0806.1361 | Mariano Rico | Mariano Rico, David Camacho, and Oscar Corcho | VPOET: Using a Distributed Collaborative Platform for Semantic Web
Applications | accepted for the 2nd International Symposium on Intelligent
Distributed Computing - IDC'2008. September 18-20, 2008, Catania, Italy | null | null | null | cs.SE cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a distributed collaborative wiki-based platform that has
been designed to facilitate the development of Semantic Web applications. The
applications designed using this platform are able to build semantic data
through the cooperation of different developers and to exploit that semantic
data. The paper shows a practical case study on the application VPOET, and how
an application based on Google Gadgets has been designed to test VPOET and let
human users exploit the semantic data created. This practical example can be
used to show how different Semantic Web technologies can be integrated into a
particular Web application, and how the knowledge can be cooperatively
improved.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 00:39:08 GMT"
}
] | 2008-06-10T00:00:00 | [
[
"Rico",
"Mariano",
""
],
[
"Camacho",
"David",
""
],
[
"Corcho",
"Oscar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0806.1372 | Lan Zhang | Lan Zhang, Ying-Chang Liang, Yan Xin, H. Vincent Poor | Robust Cognitive Beamforming With Partial Channel State Information | 30 pages, 7 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers a spectrum sharing based cognitive radio (CR)
communication system, which consists of a secondary user (SU) having multiple
transmit antennas and a single receive antenna and a primary user (PU) having a
single receive antenna. The channel state information (CSI) on the link of the
SU is assumed to be perfectly known at the SU transmitter (SU-Tx). However, due
to loose cooperation between the SU and the PU, only partial CSI of the link
between the SU-Tx and the PU is available at the SU-Tx. With the partial CSI
and a prescribed transmit power constraint, our design objective is to
determine the transmit signal covariance matrix that maximizes the rate of the
SU while keeping the interference power to the PU below a threshold for all the
possible channel realization within an uncertainty set. This problem, termed
the robust cognitive beamforming problem, can be naturally formulated as a
semi-infinite programming (SIP) problem with infinitely many constraints. This
problem is first transformed into the second order cone programming (SOCP)
problem and then solved via a standard interior point algorithm. Then, an
analytical solution with much reduced complexity is developed from a geometric
perspective. It is shown that both algorithms obtain the same optimal solution.
Simulation examples are presented to validate the effectiveness of the proposed
algorithms.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 05:30:09 GMT"
},
{
"version": "v2",
"created": "Sun, 4 Jan 2009 12:06:48 GMT"
}
] | 2009-01-04T00:00:00 | [
[
"Zhang",
"Lan",
""
],
[
"Liang",
"Ying-Chang",
""
],
[
"Xin",
"Yan",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.1377 | Vandani Verma | Sunder Lal and Vandani Verma | An Identity Based Strong Bi-Designated Verifier (t, n) Threshold Proxy
Signature Scheme | 5 Pages, 0 Figures | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Proxy signature schemes have been invented to delegate signing rights. The
paper proposes a new concept of Identify Based Strong Bi-Designated Verifier
threshold proxy signature (ID-SBDVTPS) schemes. Such scheme enables an original
signer to delegate the signature authority to a group of 'n' proxy signers with
the condition that 't' or more proxy signers can cooperatively sign messages on
behalf of the original signer and the signatures can only be verified by any
two designated verifiers and that they cannot convince anyone else of this
fact.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 06:56:19 GMT"
}
] | 2008-06-10T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Verma",
"Vandani",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0806.1381 | Feng Xia | Feng Xia, Guosong Tian, Youxian Sun | Feedback Scheduling: An Event-Driven Paradigm | 8 pages, 10 figures | ACM SIGPLAN Notices, vol.42, no.12, pp. 7-14, Dec. 2007 | null | null | cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Embedded computing systems today increasingly feature resource constraints
and workload variability, which lead to uncertainty in resource availability.
This raises great challenges to software design and programming in multitasking
environments. In this paper, the emerging methodology of feedback scheduling is
introduced to address these challenges. As a closed-loop approach to resource
management, feedback scheduling promises to enhance the flexibility and
resource efficiency of various software programs through dynamically
distributing available resources among concurrent tasks based on feedback
information about the actual usage of the resources. With emphasis on the
behavioral design of feedback schedulers, we describe a general framework of
feedback scheduling in the context of real-time control applications. A simple
yet illustrative feedback scheduling algorithm is given. From a programming
perspective, we describe how to modify the implementation of control tasks to
facilitate the application of feedback scheduling. An event-driven paradigm
that combines time-triggered and event-triggered approaches is proposed for
programming of the feedback scheduler. Simulation results argue that the
proposed event-driven paradigm yields better performance than time-triggered
paradigm in dynamic environments where the workload varies irregularly and
unpredictably.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 07:23:28 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Tian",
"Guosong",
""
],
[
"Sun",
"Youxian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0806.1385 | Feng Xia | Feng Xia, Youxian Sun | Control-Scheduling Codesign: A Perspective on Integrating Control and
Computing | 7 pages, 2 figures; A review paper | Dynamics of Continuous, Discrete and Impulsive Systems - Series B,
vol. 13, no. S1, pp. 1352-1358, 2006 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite rapid evolution, embedded computing systems increasingly feature
resource constraints and workload uncertainties. To achieve much better system
performance in unpredictable environments than traditional design approaches, a
novel methodology, control-scheduling codesign, is emerging in the context of
integrating feedback control and real-time computing. The aim of this work is
to provide a better understanding of this emerging methodology and to spark new
interests and developments in both the control and computer science
communities. The state of the art of control-scheduling codesign is captured.
Relevant research efforts in the literature are discussed under two categories,
i.e., control of computing systems and codesign for control systems. Critical
open research issues on integrating control and computing are also outlined.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 07:48:42 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Sun",
"Youxian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0806.1397 | Xianmin Feng | Xianmin Ming, Jiansheng Yang | The Improvement of the Bound on Hash Family | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the bound on three kinds of hash family using the
Singleton bound. To $\epsilon-U(N; n, m)$ hash family, in the caes of $n>m^2>1$
and $1\geq\epsilon\geq \epsilon_1(n, m)$, we get that the new bound is better.
To $\epsilon-\bigtriangleup U(N; n, m)$ hash family, in the case of $n>m>1$ and
$1\geq\epsilon\geq\epsilon_3(n,m)$, the new bound is better. To $\epsilon-SU(N;
n, m)$ hash family, in the case of $n>2^m>2$ and $1\geq\epsilon\geq
\epsilon_4(n, m)$, we get that the new bound is better.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 08:26:01 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Ming",
"Xianmin",
""
],
[
"Yang",
"Jiansheng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.1413 | Olivier Finkel | Olivier Finkel (ELM, IMJ, LIP) | Topological Complexity of Context-Free omega-Languages: A Survey | null | null | null | LIP Research Report RR 2008-17 | cs.LO cs.CC math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We survey recent results on the topological complexity of context-free
omega-languages which form the second level of the Chomsky hierarchy of
languages of infinite words. In particular, we consider the Borel hierarchy and
the Wadge hierarchy of non-deterministic or deterministic context-free
omega-languages. We study also decision problems, the links with the notions of
ambiguity and of degrees of ambiguity, and the special case of omega-powers.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 10:03:44 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Mar 2013 21:08:31 GMT"
}
] | 2013-03-14T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"ELM, IMJ, LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0806.1416 | Sebastien Collette | Greg Aloupis and Jean Cardinal and Sebastien Collette and Ferran
Hurtado and Stefan Langerman and Joseph O'Rourke and Belen Palop | Highway Hull Revisited | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A highway H is a line in the plane on which one can travel at a greater speed
than in the remaining plane. One can choose to enter and exit H at any point.
The highway time distance between a pair of points is the minimum time required
to move from one point to the other, with optional use of H.
The highway hull HH(S,H) of a point set S is the minimal set containing S as
well as the shortest paths between all pairs of points in HH(S,H), using the
highway time distance.
We provide a Theta(n log n) worst-case time algorithm to find the highway
hull under the L_1 metric, as well as an O(n log^2 n) time algorithm for the
L_2 metric which improves the best known result of O(n^2).
We also define and construct the useful region of the plane: the region that
a highway must intersect in order that the shortest path between at least one
pair of points uses the highway.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 10:22:38 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Jun 2008 14:46:29 GMT"
},
{
"version": "v3",
"created": "Wed, 22 Apr 2009 07:46:26 GMT"
}
] | 2009-04-22T00:00:00 | [
[
"Aloupis",
"Greg",
""
],
[
"Cardinal",
"Jean",
""
],
[
"Collette",
"Sebastien",
""
],
[
"Hurtado",
"Ferran",
""
],
[
"Langerman",
"Stefan",
""
],
[
"O'Rourke",
"Joseph",
""
],
[
"Palop",
"Belen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0806.1438 | Siham Bekkai | Siham Bekkai and Mekkia Kouider | On Mean Distance and Girth | this paper has been withdrawn because it has been published | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We bound the mean distance in a connected graph which is not a tree in
function of its order $n$ and its girth $g$. On one hand, we show that mean
distance is at most $\frac{n+1}{3}-\frac{g(g^2-4)}{12n(n-1)}$ if $g$ is even
and at most $\frac{n+1}{3}-\frac{g(g^2-1)}{12n(n-1)}$ if $g$ is odd. On the
other hand, we prove that mean distance is at least $\frac{ng}{4(n-1)}$ unless
$G$ is an odd cycle.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 12:15:28 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jan 2013 19:49:24 GMT"
}
] | 2013-01-07T00:00:00 | [
[
"Bekkai",
"Siham",
""
],
[
"Kouider",
"Mekkia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0806.1439 | Dmitry Lande | D. V. Lande, A. A. Snarskii | Dynamic Network of Concepts from Web-Publications | 7 pages, 8 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The network, the nodes of which are concepts (people's names, companies'
names, etc.), extracted from web-publications, is considered. A working
algorithm of extracting such concepts is presented. Edges of the network under
consideration refer to the reference frequency which depends on the fact how
many times the concepts, which correspond to the nodes, are mentioned in the
same documents. Web-documents being published within a period of time together
form an information flow, which defines the dynamics of the network studied.
The phenomenon of its structure stability, when the number of web-publications,
constituting its formation bases, increases, is discussed
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 12:16:55 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Lande",
"D. V.",
""
],
[
"Snarskii",
"A. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.1446 | Guoshen Yu | Guoshen Yu and Jean-Jacques Slotine | Fast Wavelet-Based Visual Classification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate a biologically motivated approach to fast visual
classification, directly inspired by the recent work of Serre et al.
Specifically, trading-off biological accuracy for computational efficiency, we
explore using wavelet and grouplet-like transforms to parallel the tuning of
visual cortex V1 and V2 cells, alternated with max operations to achieve scale
and translation invariance. A feature selection procedure is applied during
learning to accelerate recognition. We introduce a simple attention-like
feedback mechanism, significantly improving recognition and robustness in
multiple-object scenes. In experiments, the proposed algorithm achieves or
exceeds state-of-the-art success rate on object recognition, texture and
satellite image classification, language identification and sound
classification.
| [
{
"version": "v1",
"created": "Sun, 8 Jun 2008 10:15:04 GMT"
}
] | 2008-06-10T00:00:00 | [
[
"Yu",
"Guoshen",
""
],
[
"Slotine",
"Jean-Jacques",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0806.1494 | Mathilde Bouvel | Mathilde Bouvel (LIAFA), Elisa Pergola (DSI) | Posets and Permutations in the Duplication-Loss Model: Minimal
Permutations with d Descents | 25 pages 20 figures Soumis a TCS | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we are interested in the combinatorial analysis of the whole
genome duplication - random loss model of genome rearrangement initiated in a
paper of Chaudhuri, Chen, Mihaescu, and Rao in SODA 2006 and continued by
Bouvel and Rossin in 2007. In this model, genomes composed of n genes are
modeled by permutations of the set of integers [1..n], that can evolve through
duplication-loss steps. It was previously shown that the class of permutations
obtained in this model after a given number p of steps is a class of
pattern-avoiding permutations of finite basis. The excluded patterns were
described as the minimal permutations with d=2^p descents, minimal being
intended in the sense of the pattern-involvement relation on permutations.
Here, we give a local and simpler characterization of the set B_d of minimal
permutations with d descents. We also provide a more detailed analysis -
characterization, bijection and enumeration - of two particular subsets of B_d,
namely the patterns in B_d of size d+2 and 2d.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 17:04:40 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Bouvel",
"Mathilde",
"",
"LIAFA"
],
[
"Pergola",
"Elisa",
"",
"DSI"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0806.1543 | Andreas U. Schmidt | Andreas U. Schmidt | On the Superdistribution of Digital Goods | Invited paper at the Wokshop 2008 International Workshop on
Multimedia Security in Communication (MUSIC'08) To appear in: Proceedings of
2008 Third International Conference on Communications and Networking in China
(CHINACOM'08), August 25-27, 2008, Hangzhou, China | null | null | null | cs.MM cs.CR cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Business models involving buyers of digital goods in the distribution process
are called superdistribution schemes. We review the state-of-the art of
research and application of superdistribution and propose systematic approach
to market mechanisms using super-distribution and technical system
architectures supporting it. The limiting conditions on such markets are of
economic, legal, technical, and psychological nature.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 22:03:40 GMT"
}
] | 2008-06-11T00:00:00 | [
[
"Schmidt",
"Andreas U.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0806.1549 | Krishnan Eswaran | Krishnan Eswaran, Michael Gastpar, Kannan Ramchandran | Bits through ARQs | submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A fundamental problem in dynamic frequency reuse is that the cognitive radio
is ignorant of the amount of interference it inflicts on the primary license
holder. A model for such a situation is proposed and analyzed. The primary
sends packets across an erasure channel and employs simple ACK/NAK feedback
(ARQs) to retransmit erased packets. Furthermore, its erasure probabilities are
influenced by the cognitive radio's activity. While the cognitive radio does
not know these interference characteristics, it can eavesdrop on the primary's
ARQs. The model leads to strategies in which the cognitive radio adaptively
adjusts its input based on the primary's ARQs thereby guaranteeing the primary
exceeds a target packet rate. A relatively simple strategy whereby the
cognitive radio transmits only when the primary's empirical packet rate exceeds
a threshold is shown to have interesting universal properties in the sense that
for unknown time-varying interference characteristics, the primary is
guaranteed to meet its target rate. Furthermore, a more intricate version of
this strategy is shown to be capacity-achieving for the cognitive radio when
the interference characteristics are time-invariant.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2008 23:31:11 GMT"
}
] | 2008-06-11T00:00:00 | [
[
"Eswaran",
"Krishnan",
""
],
[
"Gastpar",
"Michael",
""
],
[
"Ramchandran",
"Kannan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.1565 | Gesualdo Scutari | Gesualdo Scutari, Daniel P. Palomar, Sergio Barbarossa | Competitive Design of Multiuser MIMO Systems based on Game Theory: A
Unified View | To appear on IEEE Journal on Selected Areas in Communications (JSAC),
September 2008 | null | 10.1109/JSAC.2008.080907 | null | cs.IT cs.GT math.IT math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the noncooperative maximization of mutual information in
the Gaussian interference channel in a fully distributed fashion via game
theory. This problem has been studied in a number of papers during the past
decade for the case of frequency-selective channels. A variety of conditions
guaranteeing the uniqueness of the Nash Equilibrium (NE) and convergence of
many different distributed algorithms have been derived. In this paper we
provide a unified view of the state-of-the-art results, showing that most of
the techniques proposed in the literature to study the game, even though
apparently different, can be unified using our recent interpretation of the
waterfilling operator as a projection onto a proper polyhedral set. Based on
this interpretation, we then provide a mathematical framework, useful to derive
a unified set of sufficient conditions guaranteeing the uniqueness of the NE
and the global convergence of waterfilling based asynchronous distributed
algorithms.
The proposed mathematical framework is also instrumental to study the
extension of the game to the more general MIMO case, for which only few results
are available in the current literature. The resulting algorithm is, similarly
to the frequency-selective case, an iterative asynchronous MIMO waterfilling
algorithm. The proof of convergence hinges again on the interpretation of the
MIMO waterfilling as a matrix projection, which is the natural generalization
of our results obtained for the waterfilling mapping in the frequency-selective
case.
| [
{
"version": "v1",
"created": "Tue, 10 Jun 2008 03:52:00 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Scutari",
"Gesualdo",
""
],
[
"Palomar",
"Daniel P.",
""
],
[
"Barbarossa",
"Sergio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0806.1567 | Feng Xia | Feng Xia, Wenhong Zhao | Flexible Time-Triggered Sampling in Smart Sensor-Based Wireless Control
Systems | 17 pages, 10 figures; Open Access at
http://www.mdpi.org/sensors/papers/s7112548.pdf | Sensors, vol.7, no.11, pp. 2548-2564, 2007 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless control systems (WCSs) often have to operate in dynamic environments
where the network traffic load may vary unpredictably over time. The sampling
in sensors is conventionally time triggered with fixed periods. In this
context, only worse-than-possible quality of control (QoC) can be achieved when
the network is underloaded, while overloaded conditions may significantly
degrade the QoC, even causing system instability. This is particularly true
when the bandwidth of the wireless network is limited and shared by multiple
control loops. To address these problems, a flexible time-triggered sampling
scheme is presented in this work. Smart sensors are used to facilitate dynamic
adjustment of sampling periods, which enhances the flexibility and resource
efficiency of the system based on time-triggered sampling. Feedback control
technology is exploited for adapting sampling periods in a periodic manner. The
deadline miss ratio in each control loop is maintained at/around a desired
level, regardless of workload variations. Simulation results show that the
proposed sampling scheme is able to deal with dynamic and unpredictable
variations in network traffic load. Compared to conventional time-triggered
sampling, it leads to much better QoC in WCSs operating in dynamic
environments.
| [
{
"version": "v1",
"created": "Tue, 10 Jun 2008 04:10:05 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Zhao",
"Wenhong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0806.1569 | Feng Xia | Feng Xia, Yu-Chu Tian, Yanjun Li, Youxian Sun | Wireless Sensor/Actuator Network Design for Mobile Control Applications | 17 pages, 8 figures; Open Access at
http://www.mdpi.org/sensors/papers/s7102157.pdf | Sensors, vol.7, no.10, pp.2157-2173, 2007 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless sensor/actuator networks (WSANs) are emerging as a new generation of
sensor networks. Serving as the backbone of control applications, WSANs will
enable an unprecedented degree of distributed and mobile control. However, the
unreliability of wireless communications and the real-time requirements of
control applications raise great challenges for WSAN design. With emphasis on
the reliability issue, this paper presents an application-level design
methodology for WSANs in mobile control applications. The solution is generic
in that it is independent of the underlying platforms, environment, control
system models, and controller design. To capture the link quality
characteristics in terms of packet loss rate, experiments are conducted on a
real WSAN system. From the experimental observations, a simple yet efficient
method is proposed to deal with unpredictable packet loss on actuator nodes.
Trace-based simulations give promising results, which demonstrate the
effectiveness of the proposed approach.
| [
{
"version": "v1",
"created": "Tue, 10 Jun 2008 04:20:01 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Tian",
"Yu-Chu",
""
],
[
"Li",
"Yanjun",
""
],
[
"Sun",
"Youxian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0806.1577 | Harshan Jagadeesh | J. Harshan, B. Sundar Rajan | Co-ordinate Interleaved Distributed Space-Time Coding for
Two-Antenna-Relays Networks | To appear in IEEE Transactions on Wireless Communications. 09 pages,
06 figures | null | 10.1109/TWC.2009.071303 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distributed space time coding for wireless relay networks when the source,
the destination and the relays have multiple antennas have been studied by Jing
and Hassibi. In this set-up, the transmit and the receive signals at different
antennas of the same relay are processed and designed independently, even
though the antennas are colocated. In this paper, a wireless relay network with
single antenna at the source and the destination and two antennas at each of
the R relays is considered. A new class of distributed space time block codes
called Co-ordinate Interleaved Distributed Space-Time Codes (CIDSTC) are
introduced where, in the first phase, the source transmits a T-length complex
vector to all the relays and in the second phase, at each relay, the in-phase
and quadrature component vectors of the received complex vectors at the two
antennas are interleaved and processed before forwarding them to the
destination. Compared to the scheme proposed by Jing-Hassibi, for $T \geq 4R$,
while providing the same asymptotic diversity order of 2R, CIDSTC scheme is
shown to provide asymptotic coding gain with the cost of negligible increase in
the processing complexity at the relays. However, for moderate and large values
of P, CIDSTC scheme is shown to provide more diversity than that of the scheme
proposed by Jing-Hassibi. CIDSTCs are shown to be fully diverse provided the
information symbols take value from an appropriate multi-dimensional signal
set.
| [
{
"version": "v1",
"created": "Tue, 10 Jun 2008 05:45:23 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Aug 2008 11:29:09 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Harshan",
"J.",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0806.1602 | Maurice Margenstern | Margenstern Maurice | The injectivity of the global function of a cellular automaton in the
hyperbolic plane is undecidable | 9 figures this paper completely solves the problem tackled in
arXiv:0712.2577v2. This version is simply an improvement of the proof of the
result deposited in 0806.1602 | The Injectivity of the Global Function of a Cellular Automaton in
the Hyperbolic Plane is Undecidable, Fundamenta Informaticae, 94(1), (2009),
63-99 | null | null | cs.CG cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we look at the following question. We consider cellular
automata in the hyperbolic plane and we consider the global function defined on
all possible configurations. Is the injectivity of this function undecidable?
The problem was answered positively in the case of the Euclidean plane by
Jarkko Kari, in 1994. In the present paper, we show that the answer is also
positive for the hyperbolic plane: the problem is undecidable.
| [
{
"version": "v1",
"created": "Tue, 10 Jun 2008 10:58:30 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jun 2008 15:14:03 GMT"
}
] | 2009-07-07T00:00:00 | [
[
"Maurice",
"Margenstern",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0806.1610 | Andreas U. Schmidt | Andreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari | SPAM over Internet Telephony and how to deal with it | 7th annual Conference Information Security South Africa (ISSA 2008)
University of Johannesburg, South Africa, 7 -9 July 2008 | null | null | null | cs.CR cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In our modern society telephony has developed to an omnipresent service.
People are available at anytime and anywhere. Furthermore the Internet has
emerged to an important communication medium. These facts and the raising
availability of broadband internet access has led to the fusion of these two
services. Voice over IP or short VoIP is the keyword, that describes this
combination. The advantages of VoIP in comparison to classic telephony are
location independence, simplification of transport networks, ability to
establish multimedia communications and the low costs. Nevertheless one can
easily see, that combining two technologies, always brings up new challenges
and problems that have to be solved. It is undeniable that one of the most
annoying facet of the Internet nowadays is email spam. According to different
sources email spam is considered to be 80 to 90 percent of the email traffic
produced. The threat of so called voice spam or Spam over Internet Telephony
(SPIT) is even more fatal, for the annoyance and disturbance factor is much
higher. As instance an email that hits the inbox at 4 p.m. is useless but will
not disturb the user much. In contrast a ringing phone at 4 p.m. will lead to a
much higher disturbance. From the providers point of view both email spam and
voice spam produce unwanted traffic and loss of trust of customers into the
service. In order to mitigate this threat different approaches from different
parties have been developed. This paper focuses on state of the art anti voice
spam solutions, analyses them and reveals their weak points. In the end a SPIT
producing benchmark tool will be introduced, that attacks the presented anti
voice spam solutions. With this tool it is possible for an administrator of a
VoIP network to test how vulnerable his system is.
| [
{
"version": "v1",
"created": "Tue, 10 Jun 2008 09:34:30 GMT"
}
] | 2008-06-11T00:00:00 | [
[
"Schmidt",
"Andreas U.",
""
],
[
"Kuntze",
"Nicolai",
""
],
[
"Khayari",
"Rachid El",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0806.1636 | Ian Pratt-Hartmann | Ian Pratt-Hartmann | Data-Complexity of the Two-Variable Fragment with Counting Quantifiers | null | null | null | null | cs.LO cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The data-complexity of both satisfiability and finite satisfiability for the
two-variable fragment with counting is NP-complete; the data-complexity of both
query-answering and finite query-answering for the two-variable guarded
fragment with counting is co-NP-complete.
| [
{
"version": "v1",
"created": "Tue, 10 Jun 2008 11:08:07 GMT"
}
] | 2008-06-11T00:00:00 | [
[
"Pratt-Hartmann",
"Ian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0806.1640 | Arnaud Martin | Arnaud Martin (E3I2), Christophe Osswald (E3I2) | Toward a combination rule to deal with partial conflict and specificity
in belief functions theory | International Conference on Information Fusion, Qu\'ebec : Canada
(2007) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present and discuss a mixed conjunctive and disjunctive rule, a
generalization of conflict repartition rules, and a combination of these two
rules. In the belief functions theory one of the major problem is the conflict
repartition enlightened by the famous Zadeh's example. To date, many
combination rules have been proposed in order to solve a solution to this
problem. Moreover, it can be important to consider the specificity of the
responses of the experts. Since few year some unification rules are proposed.
We have shown in our previous works the interest of the proportional conflict
redistribution rule. We propose here a mixed combination rule following the
proportional conflict redistribution rule modified by a discounting procedure.
This rule generalizes many combination rules.
| [
{
"version": "v1",
"created": "Tue, 10 Jun 2008 12:03:43 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Martin",
"Arnaud",
"",
"E3I2"
],
[
"Osswald",
"Christophe",
"",
"E3I2"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0806.1649 | Carlos Roca P. | Carlos P. Roca, Jos\'e A. Cuesta, and Angel S\'anchez | Effect of spatial structure on the evolution of cooperation | Final version, 20 pages, 14 figures | Phys. Rev. E 80, 046106 (2009) | 10.1103/PhysRevE.80.046106 | null | q-bio.PE cs.GT physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spatial structure is known to have an impact on the evolution of cooperation,
and so it has been intensively studied during recent years. Previous work has
shown the relevance of some features, such as the synchronicity of the
updating, the clustering of the network or the influence of the update rule.
This has been done, however, for concrete settings with particular games,
networks and update rules, with the consequence that some contradictions have
arisen and a general understanding of these topics is missing in the broader
context of the space of 2x2 games. To address this issue, we have performed a
systematic and exhaustive simulation in the different degrees of freedom of the
problem. In some cases, we generalize previous knowledge to the broader context
of our study and explain the apparent contradictions. In other cases, however,
our conclusions refute what seems to be established opinions in the field, as
for example the robustness of the effect of spatial structure against changes
in the update rule, or offer new insights into the subject, e.g. the relation
between the intensity of selection and the asymmetry between the effects on
games with mixed equilibria.
| [
{
"version": "v1",
"created": "Tue, 10 Jun 2008 15:01:55 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jul 2008 19:29:19 GMT"
},
{
"version": "v3",
"created": "Thu, 30 Apr 2009 11:36:19 GMT"
},
{
"version": "v4",
"created": "Sat, 7 Nov 2009 18:57:01 GMT"
}
] | 2009-11-07T00:00:00 | [
[
"Roca",
"Carlos P.",
""
],
[
"Cuesta",
"José A.",
""
],
[
"Sánchez",
"Angel",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.