id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0705.3013 | Stefano Buzzi | Stefano Buzzi, H. Vincent Poor, and Daniela Saturnino | A stochastic non-cooperative game for energy efficiency in wireless data
networks | To appear in the Proceedings of the 2007 Tyrrhenian International
Workshop on Digital Communication, Naples, Italy, September 9 - 12, 2007 | null | null | null | cs.IT cs.GT math.IT | null | In this paper the issue of energy efficiency in CDMA wireless data networks
is addressed through a game theoretic approach. Building on a recent paper by
the first two authors, wherein a non-cooperative game for spreading-code
optimization, power control, and receiver design has been proposed to maximize
the ratio of data throughput to transmit power for each active user, a
stochastic algorithm is here described to perform adaptive implementation of
the said non-cooperative game. The proposed solution is based on a combination
of RLS-type and LMS-type adaptations, and makes use of readily available
measurements. Simulation results show that its performance approaches with
satisfactory accuracy that of the non-adaptive game, which requires a much
larger amount of prior information.
| [
{
"version": "v1",
"created": "Mon, 21 May 2007 16:38:31 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Buzzi",
"Stefano",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Saturnino",
"Daniela",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.3015 | Erik Schnetter | Dylan Stark, Gabrielle Allen, Tom Goodale, Thomas Radke, Erik
Schnetter | An Extensible Timing Infrastructure for Adaptive Large-scale
Applications | null | In Roman Wyrzykowski et al., editors, Parallel Processing and
Applied Mathematics (PPAM), 2007, Gdansk, Poland, volume 4967 of Lecture
Notes in Computer Science (LNCS), pages 1170-1179. Springer, 2007. | null | null | cs.PF cs.DC | null | Real-time access to accurate and reliable timing information is necessary to
profile scientific applications, and crucial as simulations become increasingly
complex, adaptive, and large-scale. The Cactus Framework provides flexible and
extensible capabilities for timing information through a well designed
infrastructure and timing API. Applications built with Cactus automatically
gain access to built-in timers, such as gettimeofday and getrusage,
system-specific hardware clocks, and high-level interfaces such as PAPI. We
describe the Cactus timer interface, its motivation, and its implementation. We
then demonstrate how this timing information can be used by an example
scientific application to profile itself, and to dynamically adapt itself to a
changing environment at run time.
| [
{
"version": "v1",
"created": "Mon, 21 May 2007 19:00:25 GMT"
}
] | 2009-04-16T00:00:00 | [
[
"Stark",
"Dylan",
""
],
[
"Allen",
"Gabrielle",
""
],
[
"Goodale",
"Tom",
""
],
[
"Radke",
"Thomas",
""
],
[
"Schnetter",
"Erik",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0705.3025 | Majed Haddad | Majed Haddad, Aawatif Menouni Hayar and Merouane Debbah | Spectral Efficiency of Spectrum Pooling Systems | 24 pages, 8 figures | IET Special Issue on Cognitive Spectrum Access, Vol. 2, No. 6, pp.
733-741, July 2008 | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this contribution, we investigate the idea of using cognitive radio to
reuse locally unused spectrum to increase the total system capacity. We
consider a multiband/wideband system in which the primary and cognitive users
wish to communicate to different receivers, subject to mutual interference and
assume that each user knows only his channel and the unused spectrum through
adequate sensing. The basic idea under the proposed scheme is based on the
notion of spectrum pooling. The idea is quite simple: a cognitive radio will
listen to the channel and, if sensed idle, will transmit during the voids. It
turns out that, although its simplicity, the proposed scheme showed very
interesting features with respect to the spectral efficiency and the maximum
number of possible pairwise cognitive communications. We impose the constraint
that users successively transmit over available bands through selfish water
filling. For the first time, our study has quantified the asymptotic (with
respect to the band) achievable gain of using spectrum pooling in terms of
spectral efficiency compared to classical radio systems. We then derive the
total spectral efficiency as well as the maximum number of possible pairwise
communications of such a spectrum pooling system.
| [
{
"version": "v1",
"created": "Mon, 21 May 2007 17:26:08 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Oct 2008 15:45:18 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Apr 2010 11:00:17 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Haddad",
"Majed",
""
],
[
"Hayar",
"Aawatif Menouni",
""
],
[
"Debbah",
"Merouane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.3050 | Kimmo Soramaki | Marco Galbiati and Kimmo Soramaki | A competitive multi-agent model of interbank payment systems | null | null | null | null | cs.MA | null | We develop a dynamic multi-agent model of an interbank payment system where
banks choose their level of available funds on the basis of private payoff
maximisation. The model consists of the repetition of a simultaneous move stage
game with incomplete information, incomplete monitoring, and stochastic
payoffs. Adaptation takes place with bayesian updating, with banks maximizing
immediate payoffs. We carry out numerical simulations to solve the model and
investigate two special scenarios: an operational incident and exogenous
throughput guidelines for payment submission. We find that the demand for
intraday credit is an S-shaped function of the cost ratio between intraday
credit costs and the costs associated with delaying payments. We also find that
the demand for liquidity is increased both under operational incidents and in
the presence of effective throughput guidelines.
| [
{
"version": "v1",
"created": "Tue, 22 May 2007 14:26:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Galbiati",
"Marco",
""
],
[
"Soramaki",
"Kimmo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0705.3058 | Brooke Shrader | Brooke Shrader and Anthony Ephremides | On the Shannon capacity and queueing stability of random access
multicast | 27 pages, 3 figures. Revisions to sections I, III, VII and App. A, B | null | null | null | cs.IT math.IT | null | We study and compare the Shannon capacity region and the stable throughput
region for a random access system in which source nodes multicast their
messages to multiple destination nodes. Under an erasure channel model which
accounts for interference and allows for multipacket reception, we first
characterize the Shannon capacity region. We then consider a queueing-theoretic
formulation and characterize the stable throughput region for two different
transmission policies: a retransmission policy and random linear coding. Our
results indicate that for large blocklengths, the random linear coding policy
provides a higher stable throughput than the retransmission policy.
Furthermore, our results provide an example of a transmission policy for which
the Shannon capacity region strictly outer bounds the stable throughput region,
which contradicts an unproven conjecture that the Shannon capacity and stable
throughput coincide for random access systems.
| [
{
"version": "v1",
"created": "Mon, 21 May 2007 21:20:52 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Sep 2007 00:24:17 GMT"
}
] | 2007-09-20T00:00:00 | [
[
"Shrader",
"Brooke",
""
],
[
"Ephremides",
"Anthony",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.3061 | Chao Chen | Daniel Freedman and Chao Chen | Measuring and Localing Homology Classes | References 8 and 22 are fixed | null | null | null | cs.CG math.AT | null | We develop a method for measuring and localizing homology classes. This
involves two problems. First, we define relevant notions of size for both a
homology class and a homology group basis, using ideas from relative homology.
Second, we propose an algorithm to compute the optimal homology basis, using
techniques from persistent homology and finite field algebra. Classes of the
computed optimal basis are localized with cycles conveying their sizes. The
algorithm runs in $O(\beta^4 n^3 \log^2 n)$ time, where $n$ is the size of the
simplicial complex and $\beta$ is the Betti number of the homology group.
| [
{
"version": "v1",
"created": "Mon, 21 May 2007 22:16:20 GMT"
},
{
"version": "v2",
"created": "Thu, 24 May 2007 18:01:33 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Freedman",
"Daniel",
""
],
[
"Chen",
"Chao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
}
] |
0705.3099 | Chris Ng | Chris T. K. Ng and Deniz Gunduz and Andrea Goldsmith and Elza Erkip | Distortion Minimization in Gaussian Layered Broadcast Coding with
Successive Refinement | Accepted for publication in IEEE Transactions on Information Theory | IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5074-5086, Nov. 2009 | 10.1109/TIT.2009.2030455 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A transmitter without channel state information (CSI) wishes to send a
delay-limited Gaussian source over a slowly fading channel. The source is coded
in superimposed layers, with each layer successively refining the description
in the previous one. The receiver decodes the layers that are supported by the
channel realization and reconstructs the source up to a distortion. The
expected distortion is minimized by optimally allocating the transmit power
among the source layers. For two source layers, the allocation is optimal when
power is first assigned to the higher layer up to a power ceiling that depends
only on the channel fading distribution; all remaining power, if any, is
allocated to the lower layer. For convex distortion cost functions with convex
constraints, the minimization is formulated as a convex optimization problem.
In the limit of a continuum of infinite layers, the minimum expected distortion
is given by the solution to a set of linear differential equations in terms of
the density of the fading distribution. As the bandwidth ratio b (channel uses
per source symbol) tends to zero, the power distribution that minimizes
expected distortion converges to the one that maximizes expected capacity.
While expected distortion can be improved by acquiring CSI at the transmitter
(CSIT) or by increasing diversity from the realization of independent fading
paths, at high SNR the performance benefit from diversity exceeds that from
CSIT, especially when b is large.
| [
{
"version": "v1",
"created": "Tue, 22 May 2007 07:07:33 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jun 2009 10:27:03 GMT"
}
] | 2009-10-22T00:00:00 | [
[
"Ng",
"Chris T. K.",
""
],
[
"Gunduz",
"Deniz",
""
],
[
"Goldsmith",
"Andrea",
""
],
[
"Erkip",
"Elza",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.3227 | H. Reiju Mihara | Masahiro Kumabe, H. Reiju Mihara | Computability of simple games: A characterization and application to the
core | 35 pages; To appear in Journal of Mathematical Economics; Appendix
added, Propositions, Remarks, etc. are renumbered | Journal of Mathematical Economics, Volume 44, Issues 3-4, February
2008, Pages 348-366 | 10.1016/j.jmateco.2007.05.012 | null | cs.GT cs.CC cs.LO math.LO | null | The class of algorithmically computable simple games (i) includes the class
of games that have finite carriers and (ii) is included in the class of games
that have finite winning coalitions. This paper characterizes computable games,
strengthens the earlier result that computable games violate anonymity, and
gives examples showing that the above inclusions are strict. It also extends
Nakamura's theorem about the nonemptyness of the core and shows that computable
games have a finite Nakamura number, implying that the number of alternatives
that the players can deal with rationally is restricted.
| [
{
"version": "v1",
"created": "Tue, 22 May 2007 17:49:15 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Aug 2007 13:57:59 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Kumabe",
"Masahiro",
""
],
[
"Mihara",
"H. Reiju",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0705.3261 | Yijia Fan | Yijia Fan, Chao Wang, John Thompson, H. Vincent Poor | Recovering Multiplexing Loss Through Successive Relaying Using
Repetition Coding | To appear in the IEEE Transactions on Wireless Communications | null | 10.1109/TWC.2007.060339 | null | cs.IT math.IT | null | In this paper, a transmission protocol is studied for a two relay wireless
network in which simple repetition coding is applied at the relays.
Information-theoretic achievable rates for this transmission scheme are given,
and a space-time V-BLAST signalling and detection method that can approach them
is developed. It is shown through the diversity multiplexing tradeoff analysis
that this transmission scheme can recover the multiplexing loss of the
half-duplex relay network, while retaining some diversity gain. This scheme is
also compared with conventional transmission protocols that exploit only the
diversity of the network at the cost of a multiplexing loss. It is shown that
the new transmission protocol offers significant performance advantages over
conventional protocols, especially when the interference between the two relays
is sufficiently strong.
| [
{
"version": "v1",
"created": "Tue, 22 May 2007 22:26:41 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Fan",
"Yijia",
""
],
[
"Wang",
"Chao",
""
],
[
"Thompson",
"John",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.3316 | Stephane Le Roux | St\'ephane Le Roux (LIP) | Acyclicity of Preferences, Nash Equilibria, and Subgame Perfect
Equilibria: a Formal and Constructive Equivalence | null | null | null | null | cs.DM cs.GT cs.LO | null | In 1953, Kuhn showed that every sequential game has a Nash equilibrium by
showing that a procedure, named ``backward induction'' in game theory, yields a
Nash equilibrium. It actually yields Nash equilibria that define a proper
subclass of Nash equilibria. In 1965, Selten named this proper subclass subgame
perfect equilibria. In game theory, payoffs are rewards usually granted at the
end of a game. Although traditional game theory mainly focuses on real-valued
payoffs that are implicitly ordered by the usual total order over the reals,
works of Simon or Blackwell already involved partially ordered payoffs. This
paper generalises the notion of sequential game by replacing real-valued payoff
functions with abstract atomic objects, called outcomes, and by replacing the
usual total order over the reals with arbitrary binary relations over outcomes,
called preferences. This introduces a general abstract formalism where Nash
equilibrium, subgame perfect equilibrium, and ``backward induction'' can still
be defined. This paper proves that the following three propositions are
equivalent: 1) Preferences over the outcomes are acyclic. 2) Every sequential
game has a Nash equilibrium. 3) Every sequential game has a subgame perfect
equilibrium. The result is fully computer-certified using Coq. Beside the
additional guarantee of correctness, the activity of formalisation using Coq
also helps clearly identify the useful definitions and the main articulations
of the proof.
| [
{
"version": "v1",
"created": "Wed, 23 May 2007 09:30:08 GMT"
}
] | 2007-05-24T00:00:00 | [
[
"Roux",
"Stéphane Le",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0705.3343 | David Coeurjolly | David Coeurjolly (LIRIS), Annick Montanvert (GIPSA-lab) | Optimal Separable Algorithms to Compute the Reverse Euclidean Distance
Transformation and Discrete Medial Axis in Arbitrary Dimension | null | IEEE Transactions on Pattern Analysis and Machine Intelligence 29,
3 (01/03/2007) 437-448 | 10.1109/TPAMI.2007.54 | null | cs.CG | null | In binary images, the distance transformation (DT) and the geometrical
skeleton extraction are classic tools for shape analysis. In this paper, we
present time optimal algorithms to solve the reverse Euclidean distance
transformation and the reversible medial axis extraction problems for
$d$-dimensional images. We also present a $d$-dimensional medial axis filtering
process that allows us to control the quality of the reconstructed shape.
| [
{
"version": "v1",
"created": "Wed, 23 May 2007 11:29:52 GMT"
}
] | 2007-05-24T00:00:00 | [
[
"Coeurjolly",
"David",
"",
"LIRIS"
],
[
"Montanvert",
"Annick",
"",
"GIPSA-lab"
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0705.3344 | Marco Lops | Ezio Biglieri, Marco Lops | Multiuser detection in a dynamic environment Part I: User identification
and data detection | To be published on IEEE Transactions on Information Theory | null | 10.1109/TIT.2007.903115 | null | cs.IT math.IT | null | In random-access communication systems, the number of active users varies
with time, and has considerable bearing on receiver's performance. Thus,
techniques aimed at identifying not only the information transmitted, but also
that number, play a central role in those systems. An example of application of
these techniques can be found in multiuser detection (MUD). In typical MUD
analyses, receivers are based on the assumption that the number of active users
is constant and known at the receiver, and coincides with the maximum number of
users entitled to access the system. This assumption is often overly
pessimistic, since many users might be inactive at any given time, and
detection under the assumption of a number of users larger than the real one
may impair performance.
The main goal of this paper is to introduce a general approach to the problem
of identifying active users and estimating their parameters and data in a
random-access system where users are continuously entering and leaving the
system. The tool whose use we advocate is Random-Set Theory: applying this, we
derive optimum receivers in an environment where the set of transmitters
comprises an unknown number of elements. In addition, we can derive
Bayesian-filter equations which describe the evolution with time of the a
posteriori probability density of the unknown user parameters, and use this
density to derive optimum detectors. In this paper we restrict ourselves to
interferer identification and data detection, while in a companion paper we
shall examine the more complex problem of estimating users' parameters.
| [
{
"version": "v1",
"created": "Wed, 23 May 2007 11:31:41 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Biglieri",
"Ezio",
""
],
[
"Lops",
"Marco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.3360 | Kyriakos Sgarbas | Kyriakos N. Sgarbas | The Road to Quantum Artificial Intelligence | 9 pages. Presented at PCI-2007: 11th Panhellenic Conference in
Informatics, 18-20 May 2007, Patras, Greece | In: T.S.Papatheodorou, D.N.Christodoulakis and N.N.Karanikolas
(eds), "Current Trends in Informatics", Vol.A, pp.469-477, New Technologies
Publications, Athens, 2007 (SET 978-960-89784-0-9) | null | null | cs.AI | null | This paper overviews the basic principles and recent advances in the emerging
field of Quantum Computation (QC), highlighting its potential application to
Artificial Intelligence (AI). The paper provides a very brief introduction to
basic QC issues like quantum registers, quantum gates and quantum algorithms
and then it presents references, ideas and research guidelines on how QC can be
used to deal with some basic AI problems, such as search and pattern matching,
as soon as quantum computers become widely available.
| [
{
"version": "v1",
"created": "Wed, 23 May 2007 12:31:47 GMT"
}
] | 2007-05-24T00:00:00 | [
[
"Sgarbas",
"Kyriakos N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.3466 | Travis C. Brooks | Travis C. Brooks | Open Access Publishing in Particle Physics: A Brief Introduction for the
non-Expert | null | null | null | SLAC-PUB-12507 | cs.DL | null | Open Access to particle physics literature does not sound particularly new or
exciting, since particle physicists have been reading preprints for decades,
and arXiv.org for 15 years. However new movements in Europe are attempting to
make the peer-reviewed literature of the field fully Open Access. This is not a
new movement, nor is it restricted to this field. However, given the field's
history of preprints and eprints, it is well suited to a change to a fully Open
Access publishing model. Data shows that 90% of HEP published literature is
freely available online, meaning that HEP libraries have little need for
expensive journal subscriptions. As libraries begin to cancel journal
subscriptions, the peer review process will lose its primary source of funding.
Open Access publishing models can potentially address this issue. European
physicists and funding agencies are proposing a consortium, SCOAP3, that might
solve many of the objections to traditional Open Access publishing models in
Particle Physics. These proposed changes should be viewed as a starting point
for a serious look at the field's publication model, and are at least worthy of
attention, if not adoption.
| [
{
"version": "v1",
"created": "Wed, 23 May 2007 20:28:47 GMT"
}
] | 2007-05-25T00:00:00 | [
[
"Brooks",
"Travis C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0705.3468 | Neng-Fa Zhou | Neng-Fa Zhou, Taisuke Sato, and Yi-Dong Shen | Linear Tabling Strategies and Optimizations | 29 pages, 1 figure, TPLP | null | null | null | cs.PL | null | Recently, the iterative approach named linear tabling has received
considerable attention because of its simplicity, ease of implementation, and
good space efficiency. Linear tabling is a framework from which different
methods can be derived based on the strategies used in handling looping
subgoals. One decision concerns when answers are consumed and returned. This
paper describes two strategies, namely, {\it lazy} and {\it eager} strategies,
and compares them both qualitatively and quantitatively. The results indicate
that, while the lazy strategy has good locality and is well suited for finding
all solutions, the eager strategy is comparable in speed with the lazy strategy
and is well suited for programs with cuts. Linear tabling relies on depth-first
iterative deepening rather than suspension to compute fixpoints. Each cluster
of inter-dependent subgoals as represented by a top-most looping subgoal is
iteratively evaluated until no subgoal in it can produce any new answers. Naive
re-evaluation of all looping subgoals, albeit simple, may be computationally
unacceptable. In this paper, we also introduce semi-naive optimization, an
effective technique employed in bottom-up evaluation of logic programs to avoid
redundant joins of answers, into linear tabling. We give the conditions for the
technique to be safe (i.e. sound and complete) and propose an optimization
technique called {\it early answer promotion} to enhance its effectiveness.
Benchmarking in B-Prolog demonstrates that with this optimization linear
tabling compares favorably well in speed with the state-of-the-art
implementation of SLG.
| [
{
"version": "v1",
"created": "Wed, 23 May 2007 20:52:42 GMT"
}
] | 2007-05-25T00:00:00 | [
[
"Zhou",
"Neng-Fa",
""
],
[
"Sato",
"Taisuke",
""
],
[
"Shen",
"Yi-Dong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0705.3487 | Antoine Meyer | Arnaud Carayol (IRISA), Antoine Meyer (LIAFA) | Linearly bounded infinite graphs | null | Acta Informatica 43, 4 (25/08/2006) p. 265-292 | 10.1007/s00236-006-0022-z | null | cs.LO | null | Linearly bounded Turing machines have been mainly studied as acceptors for
context-sensitive languages. We define a natural class of infinite automata
representing their observable computational behavior, called linearly bounded
graphs. These automata naturally accept the same languages as the linearly
bounded machines defining them. We present some of their structural properties
as well as alternative characterizations in terms of rewriting systems and
context-sensitive transductions. Finally, we compare these graphs to rational
graphs, which are another class of automata accepting the context-sensitive
languages, and prove that in the bounded-degree case, rational graphs are a
strict sub-class of linearly bounded graphs.
| [
{
"version": "v1",
"created": "Thu, 24 May 2007 15:29:21 GMT"
}
] | 2007-05-25T00:00:00 | [
[
"Carayol",
"Arnaud",
"",
"IRISA"
],
[
"Meyer",
"Antoine",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0705.3503 | Catuscia Palamidessi | Konstantinos Chatzikokolakis and Catuscia Palamidessi | Making Random Choices Invisible to the Scheduler | null | null | null | null | cs.CR cs.LO | null | When dealing with process calculi and automata which express both
nondeterministic and probabilistic behavior, it is customary to introduce the
notion of scheduler to solve the nondeterminism. It has been observed that for
certain applications, notably those in security, the scheduler needs to be
restricted so not to reveal the outcome of the protocol's random choices, or
otherwise the model of adversary would be too strong even for ``obviously
correct'' protocols. We propose a process-algebraic framework in which the
control on the scheduler can be specified in syntactic terms, and we show how
to apply it to solve the problem mentioned above. We also consider the
definition of (probabilistic) may and must preorders, and we show that they are
precongruences with respect to the restricted schedulers. Furthermore, we show
that all the operators of the language, except replication, distribute over
probabilistic summation, which is a useful property for verification.
| [
{
"version": "v1",
"created": "Thu, 24 May 2007 04:28:47 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Chatzikokolakis",
"Konstantinos",
""
],
[
"Palamidessi",
"Catuscia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0705.3555 | Albert Guill\'en i F\`abregas | Albert Guillen i Fabregas and Giuseppe Caire | Multidimensional Coded Modulation in Block-Fading Channnels | to appear IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | We study the problem of constructing coded modulation schemes over
multidimensional signal sets in Nakagami-$m$ block-fading channels. In
particular, we consider the optimal diversity reliability exponent of the error
probability when the multidimensional constellation is obtained as the rotation
of classical complex-plane signal constellations. We show that multidimensional
rotations of full dimension achieve the optimal diversity reliability exponent,
also achieved by Gaussian constellations. Multidimensional rotations of full
dimension induce a large decoding complexity, and in some cases it might be
beneficial to use multiple rotations of smaller dimension. We also study the
diversity reliability exponent in this case, which yields the optimal
rate-diversity-complexity tradeoff in block-fading channels with discrete
inputs.
| [
{
"version": "v1",
"created": "Thu, 24 May 2007 11:06:23 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Nov 2007 15:07:52 GMT"
}
] | 2007-11-26T00:00:00 | [
[
"Fabregas",
"Albert Guillen i",
""
],
[
"Caire",
"Giuseppe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.3561 | Lucas Bordeaux | Lucas Bordeaux, Marco Cadoli, Toni Mancini | Generalizing Consistency and other Constraint Properties to Quantified
Constraints | null | null | null | null | cs.LO cs.AI | null | Quantified constraints and Quantified Boolean Formulae are typically much
more difficult to reason with than classical constraints, because quantifier
alternation makes the usual notion of solution inappropriate. As a consequence,
basic properties of Constraint Satisfaction Problems (CSP), such as consistency
or substitutability, are not completely understood in the quantified case.
These properties are important because they are the basis of most of the
reasoning methods used to solve classical (existentially quantified)
constraints, and one would like to benefit from similar reasoning methods in
the resolution of quantified constraints. In this paper, we show that most of
the properties that are used by solvers for CSP can be generalized to
quantified CSP. This requires a re-thinking of a number of basic concepts; in
particular, we propose a notion of outcome that generalizes the classical
notion of solution and on which all definitions are based. We propose a
systematic study of the relations which hold between these properties, as well
as complexity results regarding the decision of these properties. Finally, and
since these problems are typically intractable, we generalize the approach used
in CSP and propose weaker, easier to check notions based on locality, which
allow to detect these properties incompletely but in polynomial time.
| [
{
"version": "v1",
"created": "Thu, 24 May 2007 11:27:55 GMT"
}
] | 2007-05-25T00:00:00 | [
[
"Bordeaux",
"Lucas",
""
],
[
"Cadoli",
"Marco",
""
],
[
"Mancini",
"Toni",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.3593 | Wolfgang Jacquet | W. Jacquet, P. de Groen | MI image registration using prior knowledge | 16 pages | null | null | null | cs.CV | null | Subtraction of aligned images is a means to assess changes in a wide variety
of clinical applications. In this paper we explore the information theoretical
origin of Mutual Information (MI), which is based on Shannon's entropy.However,
the interpretation of standard MI registration as a communication channel
suggests that MI is too restrictive a criterion. In this paper the concept of
Mutual Information (MI) is extended to (Normalized) Focussed Mutual Information
(FMI) to incorporate prior knowledge to overcome some shortcomings of MI. We
use this to develop new methodologies to successfully address specific
registration problems, the follow-up of dental restorations, cephalometry, and
the monitoring of implants.
| [
{
"version": "v1",
"created": "Thu, 24 May 2007 14:41:11 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Jun 2007 12:14:51 GMT"
}
] | 2007-06-19T00:00:00 | [
[
"Jacquet",
"W.",
""
],
[
"de Groen",
"P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0705.3610 | Antoine Meyer | Greta Yorsh, Alexander Rabinovich, Mooly Sagiv, Antoine Meyer (LIAFA),
Ahmed Bouajjani (LIAFA) | A Logic of Reachable Patterns in Linked Data-Structures | null | Foundations of Software Science and Computation Structures
(29/03/2006) p. 94-110 | 10.1007/11690634_7 | null | cs.LO | null | We define a new decidable logic for expressing and checking invariants of
programs that manipulate dynamically-allocated objects via pointers and
destructive pointer updates. The main feature of this logic is the ability to
limit the neighborhood of a node that is reachable via a regular expression
from a designated node. The logic is closed under boolean operations
(entailment, negation) and has a finite model property. The key technical
result is the proof of decidability. We show how to express precondition,
postconditions, and loop invariants for some interesting programs. It is also
possible to express properties such as disjointness of data-structures, and
low-level heap mutations. Moreover, our logic can express properties of
arbitrary data-structures and of an arbitrary number of pointer fields. The
latter provides a way to naturally specify postconditions that relate the
fields on entry to a procedure to the fields on exit. Therefore, it is possible
to use the logic to automatically prove partial correctness of programs
performing low-level heap mutations.
| [
{
"version": "v1",
"created": "Thu, 24 May 2007 16:10:52 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Yorsh",
"Greta",
"",
"LIAFA"
],
[
"Rabinovich",
"Alexander",
"",
"LIAFA"
],
[
"Sagiv",
"Mooly",
"",
"LIAFA"
],
[
"Meyer",
"Antoine",
"",
"LIAFA"
],
[
"Bouajjani",
"Ahmed",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0705.3616 | Andy Zaidman | Andy Zaidman, Bart Van Rompaey, Serge Demeyer, Arie van Deursen | On How Developers Test Open Source Software Systems | null | null | null | TUD-SERG-2007-012 | cs.SE | null | Engineering software systems is a multidisciplinary activity, whereby a
number of artifacts must be created - and maintained - synchronously. In this
paper we investigate whether production code and the accompanying tests
co-evolve by exploring a project's versioning system, code coverage reports and
size-metrics. Three open source case studies teach us that testing activities
usually start later on during the lifetime and are more "phased", although we
did not observe increasing testing activity before releases. Furthermore, we
note large differences in the levels of test coverage given the proportion of
test code.
| [
{
"version": "v1",
"created": "Thu, 24 May 2007 16:21:35 GMT"
}
] | 2007-05-25T00:00:00 | [
[
"Zaidman",
"Andy",
""
],
[
"Van Rompaey",
"Bart",
""
],
[
"Demeyer",
"Serge",
""
],
[
"van Deursen",
"Arie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0705.3631 | Francisco Santos | Pilar Sabariego, Francisco Santos | Triple-loop networks with arbitrarily many minimum distance diagrams | 17 pages, 8 figures | Discrete Mathematics, 309(6), April 2009, 1672-1684. | 10.1016/j.disc.2008.02.047 | null | math.CO cs.DM math.OC | null | Minimum distance diagrams are a way to encode the diameter and routing
information of multi-loop networks. For the widely studied case of double-loop
networks, it is known that each network has at most two such diagrams and that
they have a very definite form "L-shape''.
In contrast, in this paper we show that there are triple-loop networks with
an arbitrarily big number of associated minimum distance diagrams. For doing
this, we build-up on the relations between minimum distance diagrams and
monomial ideals.
| [
{
"version": "v1",
"created": "Thu, 24 May 2007 17:59:33 GMT"
}
] | 2009-07-07T00:00:00 | [
[
"Sabariego",
"Pilar",
""
],
[
"Santos",
"Francisco",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0705.3644 | Chenguang Lu | Chenguang Lu | Subjective Information Measure and Rate Fidelity Theory | 5 pages, 10 figures | null | null | null | cs.IT cs.HC math.IT | null | Using fish-covering model, this paper intuitively explains how to extend
Hartley's information formula to the generalized information formula step by
step for measuring subjective information: metrical information (such as
conveyed by thermometers), sensory information (such as conveyed by color
vision), and semantic information (such as conveyed by weather forecasts). The
pivotal step is to differentiate condition probability and logical condition
probability of a message. The paper illustrates the rationality of the formula,
discusses the coherence of the generalized information formula and Popper's
knowledge evolution theory. For optimizing data compression, the paper
discusses rate-of-limiting-errors and its similarity to complexity-distortion
based on Kolmogorov's complexity theory, and improves the rate-distortion
theory into the rate-fidelity theory by replacing Shannon's distortion with
subjective mutual information. It is proved that both the rate-distortion
function and the rate-fidelity function are equivalent to a
rate-of-limiting-errors function with a group of fuzzy sets as limiting
condition, and can be expressed by a formula of generalized mutual information
for lossy coding, or by a formula of generalized entropy for lossless coding.
By analyzing the rate-fidelity function related to visual discrimination and
digitized bits of pixels of images, the paper concludes that subjective
information is less than or equal to objective (Shannon's) information; there
is an optimal matching point at which two kinds of information are equal; the
matching information increases with visual discrimination (defined by confusing
probability) rising; for given visual discrimination, too high resolution of
images or too much objective information is wasteful.
| [
{
"version": "v1",
"created": "Thu, 24 May 2007 19:33:43 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Lu",
"Chenguang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.3669 | Donald Sofge | Donald A. Sofge | Structural Health Monitoring Using Neural Network Based Vibrational
System Identification | 4 pages | D. Sofge, "Structural Health Monitoring Using Neural Network Based
Vibrational System Identification," In Proceedings of the Australia-New
Zealand Conference on Intelligent Information Systems, pp. 91-94, IEEE, 1994 | 10.1109/ANZIIS.1994.396943 | null | cs.NE cs.CV cs.SD | null | Composite fabrication technologies now provide the means for producing
high-strength, low-weight panels, plates, spars and other structural components
which use embedded fiber optic sensors and piezoelectric transducers. These
materials, often referred to as smart structures, make it possible to sense
internal characteristics, such as delaminations or structural degradation. In
this effort we use neural network based techniques for modeling and analyzing
dynamic structural information for recognizing structural defects. This yields
an adaptable system which gives a measure of structural integrity for composite
structures.
| [
{
"version": "v1",
"created": "Thu, 24 May 2007 21:48:18 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Sofge",
"Donald A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
] |
0705.3677 | Cemal Akcaba | Cemal Ak\c{c}aba, Patrick Kuppinger and Helmut B\"olcskei | Distributed Transmit Diversity in Relay Networks | 5 pages, 1 figure | null | null | null | cs.IT math.IT | null | We analyze fading relay networks, where a single-antenna source-destination
terminal pair communicates through a set of half-duplex single-antenna relays
using a two-hop protocol with linear processing at the relay level. A family of
relaying schemes is presented which achieves the entire optimal
diversity-multiplexing (DM) tradeoff curve. As a byproduct of our analysis, it
follows that delay diversity and phase-rolling at the relay level are optimal
with respect to the entire DM-tradeoff curve, provided the delays and the
modulation frequencies, respectively, are chosen appropriately.
| [
{
"version": "v1",
"created": "Thu, 24 May 2007 23:07:56 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Akçaba",
"Cemal",
""
],
[
"Kuppinger",
"Patrick",
""
],
[
"Bölcskei",
"Helmut",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.3683 | Hung-Ta Pai | H.-T. Pai and Y. S. Han | Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless
Sensor Networks | 33 pages, 7 figures, 2 tables | null | null | null | cs.CR cs.DC cs.NI | null | Wireless sensor networks place sensors into an area to collect data and send
them back to a base station. Data fusion, which fuses the collected data before
they are sent to the base station, is usually implemented over the network.
Since the sensor is typically placed in locations accessible to malicious
attackers, information assurance of the data fusion process is very important.
A witness-based approach has been proposed to validate the fusion data. In this
approach, the base station receives the fusion data and "votes" on the data
from a randomly chosen sensor node. The vote comes from other sensor nodes,
called "witnesses," to verify the correctness of the fusion data. Because the
base station obtains the vote through the chosen node, the chosen node could
forge the vote if it is compromised. Thus, the witness node must encrypt the
vote to prevent this forgery. Compared with the vote, the encryption requires
more bits, increasing transmission burden from the chosen node to the base
station. The chosen node consumes more power. This work improves the
witness-based approach using direct voting mechanism such that the proposed
scheme has better performance in terms of assurance, overhead, and delay. The
witness node transmits the vote directly to the base station. Forgery is not a
problem in this scheme. Moreover, fewer bits are necessary to represent the
vote, significantly reducing the power consumption. Performance analysis and
simulation results indicate that the proposed approach can achieve a 40 times
better overhead than the witness-based approach.
| [
{
"version": "v1",
"created": "Fri, 25 May 2007 02:56:47 GMT"
}
] | 2007-05-28T00:00:00 | [
[
"Pai",
"H. -T.",
""
],
[
"Han",
"Y. S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0705.3693 | Jan Mandel | Jonathan D. Beezley, Jan Mandel | Morphing Ensemble Kalman Filters | 17 pages, 7 figures. Added DDDAS references to the introduction | null | 10.1111/j.1600-0870.2007.00275.x | UCDHSC CCM Report 240 | math.DS cs.CV math.ST physics.ao-ph stat.ME stat.TH | null | A new type of ensemble filter is proposed, which combines an ensemble Kalman
filter (EnKF) with the ideas of morphing and registration from image
processing. This results in filters suitable for nonlinear problems whose
solutions exhibit moving coherent features, such as thin interfaces in wildfire
modeling. The ensemble members are represented as the composition of one common
state with a spatial transformation, called registration mapping, plus a
residual. A fully automatic registration method is used that requires only
gridded data, so the features in the model state do not need to be identified
by the user. The morphing EnKF operates on a transformed state consisting of
the registration mapping and the residual. Essentially, the morphing EnKF uses
intermediate states obtained by morphing instead of linear combinations of the
states.
| [
{
"version": "v1",
"created": "Fri, 25 May 2007 05:46:33 GMT"
},
{
"version": "v2",
"created": "Sun, 27 May 2007 19:38:42 GMT"
},
{
"version": "v3",
"created": "Wed, 8 Aug 2007 17:17:36 GMT"
},
{
"version": "v4",
"created": "Thu, 23 Aug 2007 07:45:33 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Beezley",
"Jonathan D.",
""
],
[
"Mandel",
"Jan",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Physics",
"code": "physics.ao-ph",
"description": "Atmospheric and oceanic physics and physical chemistry, biogeophysics, and climate science",
"span": "(Atmospheric and Oceanic Physics)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0705.3740 | Gilles Z\'emor | J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, G. Z\'emor | Optimal Iris Fuzzy Sketches | 9 pages. Submitted to the IEEE Conference on Biometrics: Theory,
Applications and Systems, 2007 Washington DC | Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007.
First IEEE International Conference on | 10.1109/BTAS.2007.4401904 | null | cs.CR | null | Fuzzy sketches, introduced as a link between biometry and cryptography, are a
way of handling biometric data matching as an error correction issue. We focus
here on iris biometrics and look for the best error-correcting code in that
respect. We show that two-dimensional iterative min-sum decoding leads to
results near the theoretical limits. In particular, we experiment our
techniques on the Iris Challenge Evaluation (ICE) database and validate our
findings.
| [
{
"version": "v1",
"created": "Fri, 25 May 2007 10:38:14 GMT"
}
] | 2008-04-02T00:00:00 | [
[
"Bringer",
"J.",
""
],
[
"Chabanne",
"H.",
""
],
[
"Cohen",
"G.",
""
],
[
"Kindarji",
"B.",
""
],
[
"Zémor",
"G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0705.3748 | Oleg Verbitsky | Oleg Verbitsky | On the Obfuscation Complexity of Planar Graphs | 12 pages, 1 figure. The proof of Theorem 3 is simplified. An overview
of a related work is added | null | null | null | cs.DM cs.CC | null | Being motivated by John Tantalo's Planarity Game, we consider straight line
plane drawings of a planar graph $G$ with edge crossings and wonder how
obfuscated such drawings can be. We define $obf(G)$, the obfuscation complexity
of $G$, to be the maximum number of edge crossings in a drawing of $G$.
Relating $obf(G)$ to the distribution of vertex degrees in $G$, we show an
efficient way of constructing a drawing of $G$ with at least $obf(G)/3$ edge
crossings. We prove bounds $(\delta(G)^2/24-o(1))n^2 < \obf G <3 n^2$ for an
$n$-vertex planar graph $G$ with minimum vertex degree $\delta(G)\ge 2$.
The shift complexity of $G$, denoted by $shift(G)$, is the minimum number of
vertex shifts sufficient to eliminate all edge crossings in an arbitrarily
obfuscated drawing of $G$ (after shifting a vertex, all incident edges are
supposed to be redrawn correspondingly). If $\delta(G)\ge 3$, then $shift(G)$
is linear in the number of vertices due to the known fact that the matching
number of $G$ is linear. However, in the case $\delta(G)\ge2$ we notice that
$shift(G)$ can be linear even if the matching number is bounded. As for
computational complexity, we show that, given a drawing $D$ of a planar graph,
it is NP-hard to find an optimum sequence of shifts making $D$ crossing-free.
| [
{
"version": "v1",
"created": "Fri, 25 May 2007 11:19:03 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jun 2007 08:50:52 GMT"
},
{
"version": "v3",
"created": "Fri, 14 Dec 2007 12:32:42 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Verbitsky",
"Oleg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0705.3751 | Laurent Lyaudet | Laurent Lyaudet (LIP), Pascal Koiran (LIP), Uffe Flarup (IMADA) | On the expressive power of planar perfect matching and permanents of
bounded treewidth matrices | 14 pages | null | null | null | cs.DM cs.CC | null | Valiant introduced some 25 years ago an algebraic model of computation along
with the complexity classes VP and VNP, which can be viewed as analogues of the
classical classes P and NP. They are defined using non-uniform sequences of
arithmetic circuits and provides a framework to study the complexity for
sequences of polynomials. Prominent examples of difficult (that is,
VNP-complete) problems in this model includes the permanent and hamiltonian
polynomials. While the permanent and hamiltonian polynomials in general are
difficult to evaluate, there have been research on which special cases of these
polynomials admits efficient evaluation. For instance, Barvinok has shown that
if the underlying matrix has bounded rank, both the permanent and the
hamiltonian polynomials can be evaluated in polynomial time, and thus are in
VP. Courcelle, Makowsky and Rotics have shown that for matrices of bounded
treewidth several difficult problems (including evaluating the permanent and
hamiltonian polynomials) can be solved efficiently. An earlier result of this
flavour is Kasteleyn's theorem which states that the sum of weights of perfect
matchings of a planar graph can be computed in polynomial time, and thus is in
VP also. For general graphs this problem is VNP-complete. In this paper we
investigate the expressive power of the above results. We show that the
permanent and hamiltonian polynomials for matrices of bounded treewidth both
are equivalent to arithmetic formulas. Also, arithmetic weakly skew circuits
are shown to be equivalent to the sum of weights of perfect matchings of planar
graphs.
| [
{
"version": "v1",
"created": "Fri, 25 May 2007 11:34:13 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Lyaudet",
"Laurent",
"",
"LIP"
],
[
"Koiran",
"Pascal",
"",
"LIP"
],
[
"Flarup",
"Uffe",
"",
"IMADA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0705.3766 | Anton Eremeev | Anton Eremeev | On complexity of optimized crossover for binary representations | Dagstuhl Seminar 06061 "Theory of Evolutionary Algorithms", 2006 | null | null | null | cs.NE cs.AI | null | We consider the computational complexity of producing the best possible
offspring in a crossover, given two solutions of the parents. The crossover
operators are studied on the class of Boolean linear programming problems,
where the Boolean vector of variables is used as the solution representation.
By means of efficient reductions of the optimized gene transmitting crossover
problems (OGTC) we show the polynomial solvability of the OGTC for the maximum
weight set packing problem, the minimum weight set partition problem and for
one of the versions of the simple plant location problem. We study a connection
between the OGTC for linear Boolean programming problem and the maximum weight
independent set problem on 2-colorable hypergraph and prove the NP-hardness of
several special cases of the OGTC problem in Boolean linear programming.
| [
{
"version": "v1",
"created": "Fri, 25 May 2007 13:07:18 GMT"
}
] | 2007-05-28T00:00:00 | [
[
"Eremeev",
"Anton",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.3820 | Francisco Santos | Oswin Aichholzer, Thomas Hackl, Michael Hoffmann, Clemens Huemer,
Attila Por, Francisco Santos, Bettina Speckmann, Birgit Vogtenhuber | Maximizing Maximal Angles for Plane Straight-Line Graphs | 15 pages, 14 figures. Apart of minor corrections, some proofs that
were omitted in the previous version are now included | In "Algorithms and Data Structures, WADS 2007, Halifax, Canada,
August 15-17, 2007", Frank Dehne et al. (Eds.), LNCS 4619, Springer-Verlag,
2007, pp. 458-469 | 10.1007/978-3-540-73951-7_40 | null | cs.CG cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $G=(S, E)$ be a plane straight-line graph on a finite point set
$S\subset\R^2$ in general position. The incident angles of a vertex $p \in S$
of $G$ are the angles between any two edges of $G$ that appear consecutively in
the circular order of the edges incident to $p$.
A plane straight-line graph is called $\phi$-open if each vertex has an
incident angle of size at least $\phi$. In this paper we study the following
type of question: What is the maximum angle $\phi$ such that for any finite set
$S\subset\R^2$ of points in general position we can find a graph from a certain
class of graphs on $S$ that is $\phi$-open? In particular, we consider the
classes of triangulations, spanning trees, and paths on $S$ and give tight
bounds in most cases.
| [
{
"version": "v1",
"created": "Fri, 25 May 2007 18:10:45 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Oct 2009 19:07:20 GMT"
}
] | 2010-06-15T00:00:00 | [
[
"Aichholzer",
"Oswin",
""
],
[
"Hackl",
"Thomas",
""
],
[
"Hoffmann",
"Michael",
""
],
[
"Huemer",
"Clemens",
""
],
[
"Por",
"Attila",
""
],
[
"Santos",
"Francisco",
""
],
[
"Speckmann",
"Bettina",
""
],
[
"Vogtenhuber",
"Birgit",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0705.3888 | Antoine Meyer | Ahmed Bouajjani (LIAFA), Antoine Meyer (LIAFA) | Symbolic Reachability Analysis of Higher-Order Context-Free Processes | null | FSTTCS 2004: Foundations of Software Technology and Theoretical
Computer Science (24/11/2004) 135-147 | 10.1007/b104325 | null | cs.LO | null | We consider the problem of symbolic reachability analysis of higher-order
context-free processes. These models are generalizations of the context-free
processes (also called BPA processes) where each process manipulates a data
structure which can be seen as a nested stack of stacks. Our main result is
that, for any higher-order context-free process, the set of all predecessors of
a given regular set of configurations is regular and effectively constructible.
This result generalizes the analogous result which is known for level 1
context-free processes. We show that this result holds also in the case of
backward reachability analysis under a regular constraint on configurations. As
a corollary, we obtain a symbolic model checking algorithm for the temporal
logic E(U,X) with regular atomic predicates, i.e., the fragment of CTL
restricted to the EU and EX modalities.
| [
{
"version": "v1",
"created": "Mon, 28 May 2007 16:31:04 GMT"
}
] | 2007-05-29T00:00:00 | [
[
"Bouajjani",
"Ahmed",
"",
"LIAFA"
],
[
"Meyer",
"Antoine",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0705.3895 | Apoorva Patel | Apoorva D. Patel | Towards Understanding the Origin of Genetic Languages | (v1) 33 pages, contributed chapter to "Quantum Aspects of Life",
edited by D. Abbott, P. Davies and A. Pati, (v2) published version with some
editing | null | 10.1142/9781848162556_0010 | null | q-bio.GN cs.IT math.IT physics.bio-ph quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Molecular biology is a nanotechnology that works--it has worked for billions
of years and in an amazing variety of circumstances. At its core is a system
for acquiring, processing and communicating information that is universal, from
viruses and bacteria to human beings. Advances in genetics and experience in
designing computers have taken us to a stage where we can understand the
optimisation principles at the root of this system, from the availability of
basic building blocks to the execution of tasks. The languages of DNA and
proteins are argued to be the optimal solutions to the information processing
tasks they carry out. The analysis also suggests simpler predecessors to these
languages, and provides fascinating clues about their origin. Obviously, a
comprehensive unraveling of the puzzle of life would have a lot to say about
what we may design or convert ourselves into.
| [
{
"version": "v1",
"created": "Sat, 26 May 2007 13:01:20 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Oct 2008 11:37:41 GMT"
}
] | 2016-12-21T00:00:00 | [
[
"Patel",
"Apoorva D.",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.bio-ph",
"description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.",
"span": "(Biological Physics)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0705.3949 | Yeb Havinga | Yeb Havinga | Translating a first-order modal language to relational algebra | null | null | null | null | cs.LO cs.DB | null | This paper is about Kripke structures that are inside a relational database
and queried with a modal language. At first the modal language that is used is
introduced, followed by a definition of the database and relational algebra.
Based on these definitions two things are presented: a mapping from components
of the modal structure to a relational database schema and instance, and a
translation from queries in the modal language to relational algebra queries.
| [
{
"version": "v1",
"created": "Sun, 27 May 2007 12:36:58 GMT"
}
] | 2007-05-29T00:00:00 | [
[
"Havinga",
"Yeb",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0705.3990 | Tadashi Wadyama | Tadashi Wadayama | Interior Point Decoding for Linear Vector Channels | 18 pages, 17 figures, The paper has been submitted to IEEE
Transaction on Information Theory | null | 10.1088/1742-6596/95/1/012009 | null | cs.IT math.IT | null | In this paper, a novel decoding algorithm for low-density parity-check (LDPC)
codes based on convex optimization is presented. The decoding algorithm, called
interior point decoding, is designed for linear vector channels. The linear
vector channels include many practically important channels such as inter
symbol interference channels and partial response channels. It is shown that
the maximum likelihood decoding (MLD) rule for a linear vector channel can be
relaxed to a convex optimization problem, which is called a relaxed MLD
problem. The proposed decoding algorithm is based on a numerical optimization
technique so called interior point method with barrier function. Approximate
variations of the gradient descent and the Newton methods are used to solve the
convex optimization problem. In a decoding process of the proposed algorithm, a
search point always lies in the fundamental polytope defined based on a
low-density parity-check matrix. Compared with a convectional joint message
passing decoder, the proposed decoding algorithm achieves better BER
performance with less complexity in the case of partial response channels in
many cases.
| [
{
"version": "v1",
"created": "Mon, 28 May 2007 01:14:19 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Apr 2008 04:11:29 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Wadayama",
"Tadashi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.3992 | Tadashi Wadyama | Tadashi Wadayama | Average Stopping Set Weight Distribution of Redundant Random Matrix
Ensembles | 14 pages, 7 figures, Conference version to appear at the 2007 IEEE
International Symposium on Information Theory, Nice, France, June 2007 | null | 10.1109/ISIT.2007.4557663 | null | cs.IT math.IT | null | In this paper, redundant random matrix ensembles (abbreviated as redundant
random ensembles) are defined and their stopping set (SS) weight distributions
are analyzed. A redundant random ensemble consists of a set of binary matrices
with linearly dependent rows. These linearly dependent rows (redundant rows)
significantly reduce the number of stopping sets of small size. An upper and
lower bound on the average SS weight distribution of the redundant random
ensembles are shown. From these bounds, the trade-off between the number of
redundant rows (corresponding to decoding complexity of BP on BEC) and the
critical exponent of the asymptotic growth rate of SS weight distribution
(corresponding to decoding performance) can be derived. It is shown that, in
some cases, a dense matrix with linearly dependent rows yields asymptotically
(i.e., in the regime of small erasure probability) better performance than
regular LDPC matrices with comparable parameters.
| [
{
"version": "v1",
"created": "Mon, 28 May 2007 01:55:36 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Wadayama",
"Tadashi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.3995 | Tadashi Wadyama | Tadashi Wadayama | On Undetected Error Probability of Binary Matrix Ensembles | 9 pages, a part of the paper was submitted to ISIT 2008 | null | null | null | cs.IT math.IT | null | In this paper, an analysis of the undetected error probability of ensembles
of binary matrices is presented. The ensemble called the Bernoulli ensemble
whose members are considered as matrices generated from i.i.d. Bernoulli source
is mainly considered here. The main contributions of this work are (i)
derivation of the error exponent of the average undetected error probability
and (ii) closed form expressions for the variance of the undetected error
probability. It is shown that the behavior of the exponent for a sparse
ensemble is somewhat different from that for a dense ensemble. Furthermore, as
a byproduct of the proof of the variance formula, simple covariance formula of
the weight distribution is derived.
| [
{
"version": "v1",
"created": "Mon, 28 May 2007 02:44:27 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Apr 2008 02:36:53 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Wadayama",
"Tadashi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.4045 | Thomas Eccardt | Thomas M. Eccardt | The use of the logarithm of the variate in the calculation of
differential entropy among certain related statistical distributions | 9 pages, one table | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper demonstrates that basic statistics (mean, variance) of the
logarithm of the variate itself can be used in the calculation of differential
entropy among random variables known to be multiples and powers of a common
underlying variate. For the same set of distributions, the variance of the
differential self-information is shown also to be a function of statistics of
the logarithmic variate. Then entropy and its "variance" can be estimated using
only statistics of the logarithmic variate plus constants, without reference to
the traditional parameters of the variate.
| [
{
"version": "v1",
"created": "Mon, 28 May 2007 13:45:56 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Dec 2008 18:11:39 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Jan 2009 03:36:42 GMT"
}
] | 2009-01-26T00:00:00 | [
[
"Eccardt",
"Thomas M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.4064 | Antoine Meyer | Antoine Meyer (LIAFA) | On Term Rewriting Systems Having a Rational Derivation | null | Foundations of Software Science and Computation Structures
(05/03/2004) 378-392 | 10.1007/b95995 | null | cs.LO | null | Several types of term rewriting systems can be distinguished by the way their
rules overlap. In particular, we define the classes of prefix, suffix,
bottom-up and top-down systems, which generalize similar classes on words. Our
aim is to study the derivation relation of such systems (i.e. the reflexive and
transitive closure of their rewriting relation) and, if possible, to provide a
finite mechanism characterizing it. Using a notion of rational relations based
on finite graph grammars, we show that the derivation of any bottom-up,
top-down or suffix systems is rational, while it can be non recursive for
prefix systems.
| [
{
"version": "v1",
"created": "Mon, 28 May 2007 16:30:27 GMT"
}
] | 2007-05-29T00:00:00 | [
[
"Meyer",
"Antoine",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0705.4085 | David Wood | Erik D. Demaine, Francisco Gomez-Martin, Henk Meijer, David Rappaport,
Perouz Taslakian, Godfried T. Toussaint, Terry Winograd, David R. Wood | The Distance Geometry of Music | This is the full version of the paper: "The distance geometry of deep
rhythms and scales." 17th Canadian Conference on Computational Geometry (CCCG
'05), University of Windsor, Canada, 2005 | null | null | null | cs.CG | null | We demonstrate relationships between the classic Euclidean algorithm and many
other fields of study, particularly in the context of music and distance
geometry. Specifically, we show how the structure of the Euclidean algorithm
defines a family of rhythms which encompass over forty timelines
(\emph{ostinatos}) from traditional world music. We prove that these
\emph{Euclidean rhythms} have the mathematical property that their onset
patterns are distributed as evenly as possible: they maximize the sum of the
Euclidean distances between all pairs of onsets, viewing onsets as points on a
circle. Indeed, Euclidean rhythms are the unique rhythms that maximize this
notion of \emph{evenness}. We also show that essentially all Euclidean rhythms
are \emph{deep}: each distinct distance between onsets occurs with a unique
multiplicity, and these multiplicies form an interval $1,2,...,k-1$. Finally,
we characterize all deep rhythms, showing that they form a subclass of
generated rhythms, which in turn proves a useful property called shelling. All
of our results for musical rhythms apply equally well to musical scales. In
addition, many of the problems we explore are interesting in their own right as
distance geometry problems on the circle; some of the same problems were
explored by Erd\H{o}s in the plane.
| [
{
"version": "v1",
"created": "Mon, 28 May 2007 18:36:19 GMT"
}
] | 2007-05-29T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Gomez-Martin",
"Francisco",
""
],
[
"Meijer",
"Henk",
""
],
[
"Rappaport",
"David",
""
],
[
"Taslakian",
"Perouz",
""
],
[
"Toussaint",
"Godfried T.",
""
],
[
"Winograd",
"Terry",
""
],
[
"Wood",
"David R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0705.4094 | Ian Kash | Eric j. Friedman, Joseph Y. Halpern, Ian Kash | Efficiency and Nash Equilibria in a Scrip System for P2P Networks | null | null | null | null | cs.GT | null | A model of providing service in a P2P network is analyzed. It is shown that
by adding a scrip system, a mechanism that admits a reasonable Nash equilibrium
that reduces free riding can be obtained. The effect of varying the total
amount of money (scrip) in the system on efficiency (i.e., social welfare) is
analyzed, and it is shown that by maintaining the appropriate ratio between the
total amount of money and the number of agents, efficiency is maximized. The
work has implications for many online systems, not only P2P networks but also a
wide variety of online forums for which scrip systems are popular, but formal
analyses have been lacking.
| [
{
"version": "v1",
"created": "Mon, 28 May 2007 20:53:09 GMT"
}
] | 2007-05-30T00:00:00 | [
[
"Friedman",
"Eric j.",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Kash",
"Ian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0705.4110 | Ian Kash | Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern | Optimizing Scrip Systems: Efficiency, Crashes, Hoarders, and Altruists | null | null | null | null | cs.GT | null | We discuss the design of efficient scrip systems and develop tools for
empirically analyzing them. For those interested in the empirical study of
scrip systems, we demonstrate how characteristics of agents in a system can be
inferred from the equilibrium distribution of money. From the perspective of a
system designer, we examine the effect of the money supply on social welfare
and show that social welfare is maximized by increasing the money supply up to
the point that the system experiences a ``monetary crash,'' where money is
sufficiently devalued that no agent is willing to perform a service. We also
examine the implications of the presence of altruists and hoarders on the
performance of the system. While a small number of altruists may improve social
welfare, too many can also cause the system to experience a monetary crash,
which may be bad for social welfare. Hoarders generally decrease social welfare
but, surprisingly, they also promote system stability by helping prevent
monetary crashes. In addition, we provide new technical tools for analyzing and
computing equilibria by showing that our model exhibits strategic
complementarities, which implies that there exist equilibria in pure strategies
that can be computed efficiently.
| [
{
"version": "v1",
"created": "Mon, 28 May 2007 21:14:04 GMT"
}
] | 2007-05-30T00:00:00 | [
[
"Kash",
"Ian A.",
""
],
[
"Friedman",
"Eric J.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0705.4134 | Michael Vielhaber | Michael Vielhaber and Monica del Pilar Canales | The Battery-Discharge-Model: A Class of Stochastic Finite Automata to
Simulate Multidimensional Continued Fraction Expansion | 12 pages | null | null | null | cs.IT cs.CC cs.CR math.IT | null | We define an infinite stochastic state machine, the Battery-Discharge-Model
(BDM), which simulates the behaviour of linear and jump complexity of the
continued fraction expansion of multidimensional formal power series, a
relevant security measure in the cryptanalysis of stream ciphers.
We also obtain finite approximations to the infinite BDM, where polynomially
many states suffice to approximate with an exponentially small error the
probabilities and averages for linear and jump complexity of M-multisequences
of length n over the finite field F_q, for any M, n, q.
| [
{
"version": "v1",
"created": "Tue, 29 May 2007 02:50:42 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Vielhaber",
"Michael",
""
],
[
"Canales",
"Monica del Pilar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.4138 | Michael Vielhaber | Michael Vielhaber and Monica del Pilar Canales | The Asymptotic Normalized Linear Complexity of Multisequences | 19 pages, 2 figures, submitted to J. Complexity | null | null | null | cs.IT cs.CC cs.CR math.IT | null | We show that the asymptotic linear complexity of a multisequence a in
F_q^\infty that is I := liminf L_a(n)/n and S := limsup L_a(n)/n satisfy the
inequalities M/(M+1) <= S <= 1 and M(1-S) <= I <= 1-S/M, if all M sequences
have nonzero discrepancy infinitely often, and all pairs (I,S) satisfying these
conditions are met by 2^{\aleph_0} multisequences a.
This answers an Open Problem by Dai, Imamura, and Yang.
Keywords: Linear complexity, multisequence, Battery Discharge Model,
isometry.
| [
{
"version": "v1",
"created": "Tue, 29 May 2007 03:41:21 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Vielhaber",
"Michael",
""
],
[
"Canales",
"Monica del Pilar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.4171 | Eva Borbely | Eva Borbely | Grover search algorithm | null | null | null | null | cs.DS | null | A quantum algorithm is a set of instructions for a quantum computer, however,
unlike algorithms in classical computer science their results cannot be
guaranteed. A quantum system can undergo two types of operation, measurement
and quantum state transformation, operations themselves must be unitary
(reversible). Most quantum algorithms involve a series of quantum state
transformations followed by a measurement. Currently very few quantum
algorithms are known and no general design methodology exists for their
construction.
| [
{
"version": "v1",
"created": "Tue, 29 May 2007 09:42:46 GMT"
}
] | 2007-05-30T00:00:00 | [
[
"Borbely",
"Eva",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0705.4185 | Tony Thomas | Tony Thomas | Secure Two-party Protocols for Point Inclusion Problem | null | null | null | null | cs.CR | null | It is well known that, in theory, the general secure multi-party computation
problem is solvable using circuit evaluation protocols. However, the
communication complexity of the resulting protocols depend on the size of the
circuit that expresses the functionality to be computed and hence can be
impractical. Hence special solutions are needed for specific problems for
efficiency reasons. The point inclusion problem in computational geometry is a
special multiparty computation and has got many applications. Previous
protocols for the secure point inclusion problem are not adequate. In this
paper we modify some known solutions to the point inclusion problem in
computational geometry to the frame work of secure two-party computation.
| [
{
"version": "v1",
"created": "Tue, 29 May 2007 10:21:25 GMT"
}
] | 2007-05-30T00:00:00 | [
[
"Thomas",
"Tony",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0705.4226 | Joachim De Lataillade | Joachim De Lataillade (PPS) | Second-Order Type Isomorphisms Through Game Semantics | accepted by Annals of Pure and Applied Logic, Special Issue on Game
Semantics | null | null | null | cs.LO | null | The characterization of second-order type isomorphisms is a purely
syntactical problem that we propose to study under the enlightenment of game
semantics. We study this question in the case of second-order
λ$\mu$-calculus, which can be seen as an extension of system F to
classical logic, and for which we define a categorical framework: control
hyperdoctrines. Our game model of λ$\mu$-calculus is based on polymorphic
arenas (closely related to Hughes' hyperforests) which evolve during the play
(following the ideas of Murawski-Ong). We show that type isomorphisms coincide
with the "equality" on arenas associated with types. Finally we deduce the
equational characterization of type isomorphisms from this equality. We also
recover from the same model Roberto Di Cosmo's characterization of type
isomorphisms for system F. This approach leads to a geometrical comprehension
on the question of second order type isomorphisms, which can be easily extended
to some other polymorphic calculi including additional programming features.
| [
{
"version": "v1",
"created": "Tue, 29 May 2007 14:26:26 GMT"
}
] | 2007-05-30T00:00:00 | [
[
"De Lataillade",
"Joachim",
"",
"PPS"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0705.4228 | Joachim De Lataillade | Joachim De Lataillade (PPS) | Curry-style type Isomorphisms and Game Semantics | Accept\'e \`a Mathematical Structures for Computer Science, Special
Issue on Type Isomorphisms | null | null | null | cs.LO | null | Curry-style system F, ie. system F with no explicit types in terms, can be
seen as a core presentation of polymorphism from the point of view of
programming languages. This paper gives a characterisation of type isomorphisms
for this language, by using a game model whose intuitions come both from the
syntax and from the game semantics universe. The model is composed of: an
untyped part to interpret terms, a notion of game to interpret types, and a
typed part to express the fact that an untyped strategy plays on a game. By
analysing isomorphisms in the model, we prove that the equational system
corresponding to type isomorphisms for Curry-style system F is the extension of
the equational system for Church-style isomorphisms with a new, non-trivial
equation: forall X.A = A[forall Y.Y/X] if X appears only positively in A.
| [
{
"version": "v1",
"created": "Tue, 29 May 2007 14:31:02 GMT"
}
] | 2007-05-30T00:00:00 | [
[
"De Lataillade",
"Joachim",
"",
"PPS"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0705.4302 | Jens Oehlschl\"agel | Jens Oehlschl\"agel | Truecluster matching | 15 pages, 2 figures. Details the matching needed for "Truecluster:
robust scalable clustering with model selection" but can also be used in
different contexts | null | null | null | cs.AI | null | Cluster matching by permuting cluster labels is important in many clustering
contexts such as cluster validation and cluster ensemble techniques. The
classic approach is to minimize the euclidean distance between two cluster
solutions which induces inappropriate stability in certain settings. Therefore,
we present the truematch algorithm that introduces two improvements best
explained in the crisp case. First, instead of maximizing the trace of the
cluster crosstable, we propose to maximize a chi-square transformation of this
crosstable. Thus, the trace will not be dominated by the cells with the largest
counts but by the cells with the most non-random observations, taking into
account the marginals. Second, we suggest a probabilistic component in order to
break ties and to make the matching algorithm truly random on random data. The
truematch algorithm is designed as a building block of the truecluster
framework and scales in polynomial time. First simulation results confirm that
the truematch algorithm gives more consistent truecluster results for unequal
cluster sizes. Free R software is available.
| [
{
"version": "v1",
"created": "Tue, 29 May 2007 21:52:17 GMT"
}
] | 2007-05-31T00:00:00 | [
[
"Oehlschlägel",
"Jens",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.4320 | William Hung | William N. N. Hung, Changjian Gao, Xiaoyu Song, Dan Hammerstrom | Defect-Tolerant CMOL Cell Assignment via Satisfiability | To appear in Nanoelectronic Devices for Defense and Security
(NANO-DDS), Crystal City, Virginia, June 2007 | null | null | null | cs.DM cs.DS | null | We present a CAD framework for CMOL, a hybrid CMOS/ molecular circuit
architecture. Our framework first transforms any logically synthesized circuit
based on AND/OR/NOT gates to a NOR gate circuit, and then maps the NOR gates to
CMOL. We encode the CMOL cell assignment problem as boolean conditions. The
boolean constraint is satisfiable if and only if there is a way to map all the
NOR gates to the CMOL cells. We further investigate various types of static
defects for the CMOL architecture, and propose a reconfiguration technique that
can deal with these defects through our CAD framework. This is the first
automated framework for CMOL cell assignment, and the first to model several
different CMOL static defects. Empirical results show that our approach is
efficient and scalable.
| [
{
"version": "v1",
"created": "Tue, 29 May 2007 23:46:38 GMT"
}
] | 2007-05-31T00:00:00 | [
[
"Hung",
"William N. N.",
""
],
[
"Gao",
"Changjian",
""
],
[
"Song",
"Xiaoyu",
""
],
[
"Hammerstrom",
"Dan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0705.4369 | Jean-Michel Muller | Peter Kornerup (IMADA), Vincent Lef\`evre (LIP), Jean-Michel Muller
(LIP) | Computing Integer Powers in Floating-Point Arithmetic | Laboratoire LIP : CNRS/ENS Lyon/INRIA/Universit\'e Lyon 1 | null | null | null | cs.NA cs.MS | null | We introduce two algorithms for accurately evaluating powers to a positive
integer in floating-point arithmetic, assuming a fused multiply-add (fma)
instruction is available. We show that our log-time algorithm always produce
faithfully-rounded results, discuss the possibility of getting correctly
rounded results, and show that results correctly rounded in double precision
can be obtained if extended-precision is available with the possibility to
round into double precision (with a single rounding).
| [
{
"version": "v1",
"created": "Wed, 30 May 2007 11:34:39 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Kornerup",
"Peter",
"",
"IMADA"
],
[
"Lefèvre",
"Vincent",
"",
"LIP"
],
[
"Muller",
"Jean-Michel",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0705.4415 | Cnrs : Umr 6057 Laboratoire Parole Et Langage | Carine Andr\'e (LPL), Alain Ghio (LPL), Christian Cav\'e (LPL),
Bernard Teston (LPL) | PERCEVAL: a Computer-Driven System for Experimentation on Auditory and
Visual Perception | null | Proceedings of International Congress of Phonetic Sciences (ICPhS)
(2003) 1421-1424 | null | 1557 | cs.SE | null | Since perception tests are highly time-consuming, there is a need to automate
as many operations as possible, such as stimulus generation, procedure control,
perception testing, and data analysis. The computer-driven system we are
presenting here meets these objectives. To achieve large flexibility, the tests
are controlled by scripts. The system's core software resembles that of a
lexical-syntactic analyzer, which reads and interprets script files sent to it.
The execution sequence (trial) is modified in accordance with the commands and
data received. This type of operation provides a great deal of flexibility and
supports a wide variety of tests such as auditory-lexical decision making,
phoneme monitoring, gating, phonetic categorization, word identification, voice
quality, etc. To achieve good performance, we were careful about timing
accuracy, which is the greatest problem in computerized perception tests.
| [
{
"version": "v1",
"created": "Wed, 30 May 2007 15:31:07 GMT"
}
] | 2007-05-31T00:00:00 | [
[
"André",
"Carine",
"",
"LPL"
],
[
"Ghio",
"Alain",
"",
"LPL"
],
[
"Cavé",
"Christian",
"",
"LPL"
],
[
"Teston",
"Bernard",
"",
"LPL"
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0705.4442 | Dan Olteanu | Dan Olteanu and Christoph Koch and Lyublena Antova | World-set Decompositions: Expressiveness and Efficient Algorithms | 34 pages, 13 figures, extended version of ICDT'07 paper | null | null | null | cs.DB | null | Uncertain information is commonplace in real-world data management scenarios.
The ability to represent large sets of possible instances (worlds) while
supporting efficient storage and processing is an important challenge in this
context. The recent formalism of world-set decompositions (WSDs) provides a
space-efficient representation for uncertain data that also supports scalable
processing. WSDs are complete for finite world-sets in that they can represent
any finite set of possible worlds. For possibly infinite world-sets, we show
that a natural generalization of WSDs precisely captures the expressive power
of c-tables. We then show that several important decision problems are
efficiently solvable on WSDs while they are NP-hard on c-tables. Finally, we
give a polynomial-time algorithm for factorizing WSDs, i.e. an efficient
algorithm for minimizing such representations.
| [
{
"version": "v1",
"created": "Wed, 30 May 2007 17:56:06 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Jan 2008 10:58:06 GMT"
}
] | 2008-01-09T00:00:00 | [
[
"Olteanu",
"Dan",
""
],
[
"Koch",
"Christoph",
""
],
[
"Antova",
"Lyublena",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0705.4485 | Edoardo Airoldi | Edoardo M Airoldi, David M Blei, Stephen E Fienberg, Eric P Xing | Mixed membership stochastic blockmodels | 46 pages, 14 figures, 3 tables | Journal of Machine Learning Research, 9, 1981-2014. | null | null | stat.ME cs.LG math.ST physics.soc-ph stat.ML stat.TH | null | Observations consisting of measurements on relationships for pairs of objects
arise in many settings, such as protein interaction and gene regulatory
networks, collections of author-recipient email, and social networks. Analyzing
such data with probabilisic models can be delicate because the simple
exchangeability assumptions underlying many boilerplate models no longer hold.
In this paper, we describe a latent variable model of such data called the
mixed membership stochastic blockmodel. This model extends blockmodels for
relational data to ones which capture mixed membership latent relational
structure, thus providing an object-specific low-dimensional representation. We
develop a general variational inference algorithm for fast approximate
posterior inference. We explore applications to social and protein interaction
networks.
| [
{
"version": "v1",
"created": "Wed, 30 May 2007 23:22:59 GMT"
}
] | 2010-02-22T00:00:00 | [
[
"Airoldi",
"Edoardo M",
""
],
[
"Blei",
"David M",
""
],
[
"Fienberg",
"Stephen E",
""
],
[
"Xing",
"Eric P",
""
]
] | [
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0705.4566 | Bastian Wemmenhove | Bastian Wemmenhove and Bert Kappen | Loop corrections for message passing algorithms in continuous variable
models | null | null | null | null | cs.AI cs.LG | null | In this paper we derive the equations for Loop Corrected Belief Propagation
on a continuous variable Gaussian model. Using the exactness of the averages
for belief propagation for Gaussian models, a different way of obtaining the
covariances is found, based on Belief Propagation on cavity graphs. We discuss
the relation of this loop correction algorithm to Expectation Propagation
algorithms for the case in which the model is no longer Gaussian, but slightly
perturbed by nonlinear terms.
| [
{
"version": "v1",
"created": "Thu, 31 May 2007 10:35:07 GMT"
}
] | 2007-06-01T00:00:00 | [
[
"Wemmenhove",
"Bastian",
""
],
[
"Kappen",
"Bert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0705.4584 | Stefan Johansson | Magnus Boman and Stefan J. Johansson | Modeling Epidemic Spread in Synthetic Populations - Virtual Plagues in
Massively Multiplayer Online Games | Accepted for presentation at Digital Games Research Association
(DiGRA) conference in Tokyo in September 2007. All comments to the authors
(mail addresses are in the paper) are welcome | null | null | null | cs.CY cs.AI cs.MA | null | A virtual plague is a process in which a behavior-affecting property spreads
among characters in a Massively Multiplayer Online Game (MMOG). The MMOG
individuals constitute a synthetic population, and the game can be seen as a
form of interactive executable model for studying disease spread, albeit of a
very special kind. To a game developer maintaining an MMOG, recognizing,
monitoring, and ultimately controlling a virtual plague is important,
regardless of how it was initiated. The prospect of using tools, methods and
theory from the field of epidemiology to do this seems natural and appealing.
We will address the feasibility of such a prospect, first by considering some
basic measures used in epidemiology, then by pointing out the differences
between real world epidemics and virtual plagues. We also suggest directions
for MMOG developer control through epidemiological modeling. Our aim is
understanding the properties of virtual plagues, rather than trying to
eliminate them or mitigate their effects, as would be in the case of real
infectious disease.
| [
{
"version": "v1",
"created": "Thu, 31 May 2007 12:15:05 GMT"
}
] | 2007-06-01T00:00:00 | [
[
"Boman",
"Magnus",
""
],
[
"Johansson",
"Stefan J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0705.4604 | Henrik Reif Andersen | Henrik Reif Andersen and Kaare J. Kristoffersen | Temporal Runtime Verification using Monadic Difference Logic | null | null | null | null | cs.LO | null | In this paper we present an algorithm for performing runtime verification of
a bounded temporal logic over timed runs. The algorithm consists of three
elements. First, the bounded temporal formula to be verified is translated into
a monadic first-order logic over difference inequalities, which we call monadic
difference logic. Second, at each step of the timed run, the monadic difference
formula is modified by computing a quotient with the state and time of that
step. Third, the resulting formula is checked for being a tautology or being
unsatisfiable by a decision procedure for monadic difference logic.
We further provide a simple decision procedure for monadic difference logic
based on the data structure Difference Decision Diagrams. The algorithm is
complete in a very strong sense on a subclass of temporal formulae
characterized as homogeneously monadic and it is approximate on other formulae.
The approximation comes from the fact that not all unsatisfiable or
tautological formulae are recognised at the earliest possible time of the
runtime verification.
Contrary to existing approaches, the presented algorithms do not work by
syntactic rewriting but employ efficient decision structures which make them
applicable in real applications within for instance business software.
| [
{
"version": "v1",
"created": "Thu, 31 May 2007 13:22:02 GMT"
}
] | 2007-06-01T00:00:00 | [
[
"Andersen",
"Henrik Reif",
""
],
[
"Kristoffersen",
"Kaare J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0705.4606 | Marco Pellegrini | Filippo Geraci and Marco Pellegrini | Dynamic User-Defined Similarity Searching in Semi-Structured Text
Retrieval | Submitted to Spire 2007 | null | null | IIT TR-07/2007 | cs.IR cs.DS | null | Modern text retrieval systems often provide a similarity search utility, that
allows the user to find efficiently a fixed number k of documents in the data
set that are most similar to a given query (here a query is either a simple
sequence of keywords or the identifier of a full document found in previous
searches that is considered of interest). We consider the case of a textual
database made of semi-structured documents. Each field, in turns, is modelled
with a specific vector space. The problem is more complex when we also allow
each such vector space to have an associated user-defined dynamic weight that
influences its contribution to the overall dynamic aggregated and weighted
similarity. This dynamic problem has been tackled in a recent paper by
Singitham et al. in in VLDB 2004. Their proposed solution, which we take as
baseline, is a variant of the cluster-pruning technique that has the potential
for scaling to very large corpora of documents, and is far more efficient than
the naive exhaustive search. We devise an alternative way of embedding weights
in the data structure, coupled with a non-trivial application of a clustering
algorithm based on the furthest point first heuristic for the metric k-center
problem. The validity of our approach is demonstrated experimentally by showing
significant performance improvements over the scheme proposed in Singitham et
al. in VLDB 2004. We improve significantly tradeoffs between query time and
output quality with respect to the baseline method in Singitham et al. in in
VLDB 2004, and also with respect to a novel method by Chierichetti et al. to
appear in ACM PODS 2007. We also speed up the pre-processing time by a factor
at least thirty.
| [
{
"version": "v1",
"created": "Thu, 31 May 2007 13:46:39 GMT"
}
] | 2007-06-01T00:00:00 | [
[
"Geraci",
"Filippo",
""
],
[
"Pellegrini",
"Marco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0705.4618 | Roberto Bagnara | Roberto Bagnara, Patricia M. Hill, Enea Zaffanella | An Improved Tight Closure Algorithm for Integer Octagonal Constraints | 15 pages, 2 figures | null | null | null | cs.DS cs.CG cs.LO | null | Integer octagonal constraints (a.k.a. ``Unit Two Variables Per Inequality''
or ``UTVPI integer constraints'') constitute an interesting class of
constraints for the representation and solution of integer problems in the
fields of constraint programming and formal analysis and verification of
software and hardware systems, since they couple algorithms having polynomial
complexity with a relatively good expressive power. The main algorithms
required for the manipulation of such constraints are the satisfiability check
and the computation of the inferential closure of a set of constraints. The
latter is called `tight' closure to mark the difference with the (incomplete)
closure algorithm that does not exploit the integrality of the variables. In
this paper we present and fully justify an O(n^3) algorithm to compute the
tight closure of a set of UTVPI integer constraints.
| [
{
"version": "v1",
"created": "Thu, 31 May 2007 14:32:46 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Jun 2007 08:17:11 GMT"
}
] | 2007-06-01T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Hill",
"Patricia M.",
""
],
[
"Zaffanella",
"Enea",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0705.4654 | Donald Sofge | Peter F. Lichtenwalner and Donald A. Sofge | Local Area Damage Detection in Composite Structures Using Piezoelectric
Transducers | 7 pages | P.F. Lichtenwalner and D. Sofge, "Local Area Damage Detection in
Composite Structures Using Piezoelectric Transducers," In Proc. SPIE Sym. on
Smart Structures and Materials, Vol. 3326, SPIE, pp. 509-515, 1998 | 10.1117/12.310667 | null | cs.SD cs.CV | null | An integrated and automated smart structures approach for structural health
monitoring is presented, utilizing an array of piezoelectric transducers
attached to or embedded within the structure for both actuation and sensing.
The system actively interrogates the structure via broadband excitation of
multiple actuators across a desired frequency range. The structure's vibration
signature is then characterized by computing the transfer functions between
each actuator/sensor pair, and compared to the baseline signature. Experimental
results applying the system to local area damage detection in a MD Explorer
rotorcraft composite flexbeam are presented.
| [
{
"version": "v1",
"created": "Thu, 31 May 2007 17:19:17 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Lichtenwalner",
"Peter F.",
""
],
[
"Sofge",
"Donald A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0705.4658 | Marius Zimand | Marius Zimand | Two sources are better than one for increasing the Kolmogorov complexity
of infinite sequences | Theorem 4.15 replaced with a weaker version; several other minor
changes | null | null | null | cs.IT cs.CC math.IT | null | The randomness rate of an infinite binary sequence is characterized by the
sequence of ratios between the Kolmogorov complexity and the length of the
initial segments of the sequence. It is known that there is no uniform
effective procedure that transforms one input sequence into another sequence
with higher randomness rate. By contrast, we display such a uniform effective
procedure having as input two independent sequences with positive but
arbitrarily small constant randomness rate. Moreover the transformation is a
truth-table reduction and the output has randomness rate arbitrarily close to
1.
| [
{
"version": "v1",
"created": "Thu, 31 May 2007 17:38:04 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Dec 2007 14:12:28 GMT"
}
] | 2007-12-11T00:00:00 | [
[
"Zimand",
"Marius",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.4673 | B\'ela Csaba | B\'ela Csaba (Anal. and Stoch. Res. Group, HAS), Andr\'as S. Pluh\'ar
(Dept. of Comp. Sci., Univ. of Szeged) | A randomized algorithm for the on-line weighted bipartite matching
problem | to be published | null | null | null | cs.DS cs.DM | null | We study the on-line minimum weighted bipartite matching problem in arbitrary
metric spaces. Here, $n$ not necessary disjoint points of a metric space $M$
are given, and are to be matched on-line with $n$ points of $M$ revealed one by
one. The cost of a matching is the sum of the distances of the matched points,
and the goal is to find or approximate its minimum. The competitive ratio of
the deterministic problem is known to be $\Theta(n)$. It was conjectured that a
randomized algorithm may perform better against an oblivious adversary, namely
with an expected competitive ratio $\Theta(\log n)$. We prove a slightly weaker
result by showing a $o(\log^3 n)$ upper bound on the expected competitive
ratio. As an application the same upper bound holds for the notoriously hard
fire station problem, where $M$ is the real line.
| [
{
"version": "v1",
"created": "Thu, 31 May 2007 18:35:21 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Jun 2007 20:24:22 GMT"
}
] | 2007-06-06T00:00:00 | [
[
"Csaba",
"Béla",
"",
"Anal. and Stoch. Res. Group, HAS"
],
[
"Pluhár",
"András S.",
"",
"Dept. of Comp. Sci., Univ. of Szeged"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0705.4676 | Daniel Lemire | Daniel Lemire and Owen Kaser | Recursive n-gram hashing is pairwise independent, at best | See software at https://github.com/lemire/rollinghashcpp | Computer Speech & Language 24(4): 698-710 (2010) | 10.1016/j.csl.2009.12.001 | null | cs.DB cs.CL | http://creativecommons.org/licenses/by/4.0/ | Many applications use sequences of n consecutive symbols (n-grams). Hashing
these n-grams can be a performance bottleneck. For more speed, recursive hash
families compute hash values by updating previous values. We prove that
recursive hash families cannot be more than pairwise independent. While hashing
by irreducible polynomials is pairwise independent, our implementations either
run in time O(n) or use an exponential amount of memory. As a more scalable
alternative, we make hashing by cyclic polynomials pairwise independent by
ignoring n-1 bits. Experimentally, we show that hashing by cyclic polynomials
is is twice as fast as hashing by irreducible polynomials. We also show that
randomized Karp-Rabin hash families are not pairwise independent.
| [
{
"version": "v1",
"created": "Thu, 31 May 2007 18:41:28 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Dec 2008 17:39:33 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Feb 2009 21:37:14 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Feb 2009 16:23:41 GMT"
},
{
"version": "v5",
"created": "Wed, 5 Aug 2009 03:01:20 GMT"
},
{
"version": "v6",
"created": "Wed, 19 Aug 2009 14:39:54 GMT"
},
{
"version": "v7",
"created": "Wed, 4 Jan 2012 20:37:05 GMT"
},
{
"version": "v8",
"created": "Mon, 6 Jun 2016 15:18:03 GMT"
}
] | 2016-06-07T00:00:00 | [
[
"Lemire",
"Daniel",
""
],
[
"Kaser",
"Owen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0706.0014 | Anna Urbanska | Anna Urbanska (LJK) | Towards an exact adaptive algorithm for the determinant of a rational
matrix | null | null | null | null | cs.SC | null | In this paper we propose several strategies for the exact computation of the
determinant of a rational matrix. First, we use the Chinese Remaindering
Theorem and the rational reconstruction to recover the rational determinant
from its modular images. Then we show a preconditioning for the determinant
which allows us to skip the rational reconstruction process and reconstruct an
integer result. We compare those approaches with matrix preconditioning which
allow us to treat integer instead of rational matrices. This allows us to
introduce integer determinant algorithms to the rational determinant problem.
In particular, we discuss the applicability of the adaptive determinant
algorithm of [9] and compare it with the integer Chinese Remaindering scheme.
We present an analysis of the complexity of the strategies and evaluate their
experimental performance on numerous examples. This experience allows us to
develop an adaptive strategy which would choose the best solution at the run
time, depending on matrix properties. All strategies have been implemented in
LinBox linear algebra library.
| [
{
"version": "v1",
"created": "Thu, 31 May 2007 20:23:08 GMT"
}
] | 2009-04-16T00:00:00 | [
[
"Urbanska",
"Anna",
"",
"LJK"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0706.0022 | Marko Antonio Rodriguez | Marko A. Rodriguez and Johan Bollen | Modeling Computations in a Semantic Network | project website: http://neno.lanl.gov | null | null | null | cs.AI | null | Semantic network research has seen a resurgence from its early history in the
cognitive sciences with the inception of the Semantic Web initiative. The
Semantic Web effort has brought forth an array of technologies that support the
encoding, storage, and querying of the semantic network data structure at the
world stage. Currently, the popular conception of the Semantic Web is that of a
data modeling medium where real and conceptual entities are related in
semantically meaningful ways. However, new models have emerged that explicitly
encode procedural information within the semantic network substrate. With these
new technologies, the Semantic Web has evolved from a data modeling medium to a
computational medium. This article provides a classification of existing
computational modeling efforts and the requirements of supporting technologies
that will aid in the further growth of this burgeoning domain.
| [
{
"version": "v1",
"created": "Thu, 31 May 2007 21:56:25 GMT"
}
] | 2021-08-23T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
],
[
"Bollen",
"Johan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0706.0046 | Jingchao Chen | Jing-Chao Chen | Symmetry Partition Sort | null | null | null | null | cs.DS | null | In this paper, we propose a useful replacement for quicksort-style utility
functions. The replacement is called Symmetry Partition Sort, which has
essentially the same principle as Proportion Extend Sort. The maximal
difference between them is that the new algorithm always places already
partially sorted inputs (used as a basis for the proportional extension) on
both ends when entering the partition routine. This is advantageous to speeding
up the partition routine. The library function based on the new algorithm is
more attractive than Psort which is a library function introduced in 2004. Its
implementation mechanism is simple. The source code is clearer. The speed is
faster, with O(n log n) performance guarantee. Both the robustness and
adaptivity are better. As a library function, it is competitive.
| [
{
"version": "v1",
"created": "Fri, 1 Jun 2007 01:47:06 GMT"
}
] | 2007-06-04T00:00:00 | [
[
"Chen",
"Jing-Chao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0706.0103 | Giorgi Japaridze | Giorgi Japaridze | Many concepts and two logics of algorithmic reduction | To appear in Studia Logica in the Spring of 2009 | Studia Logica 91 (2009), pp. 1-24 | 10.1007/s11225-009-9164-7 | null | cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Within the program of finding axiomatizations for various parts of
computability logic, it was proved earlier that the logic of interactive Turing
reduction is exactly the implicative fragment of Heyting's intuitionistic
calculus. That sort of reduction permits unlimited reusage of the computational
resource represented by the antecedent. An at least equally basic and natural
sort of algorithmic reduction, however, is the one that does not allow such
reusage. The present article shows that turning the logic of the first sort of
reduction into the logic of the second sort of reduction takes nothing more
than just deleting the contraction rule from its Gentzen-style axiomatization.
The first (Turing) sort of interactive reduction is also shown to come in three
natural versions. While those three versions are very different from each
other, their logical behaviors (in isolation) turn out to be indistinguishable,
with that common behavior being precisely captured by implicative
intuitionistic logic. Among the other contributions of the present article is
an informal introduction of a series of new -- finite and bounded -- versions
of recurrence operations and the associated reduction operations. An online
source on computability logic can be found at
http://www.cis.upenn.edu/~giorgi/cl.html
| [
{
"version": "v1",
"created": "Fri, 1 Jun 2007 09:07:20 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Jun 2007 13:59:23 GMT"
},
{
"version": "v3",
"created": "Sun, 13 Jan 2008 16:31:14 GMT"
},
{
"version": "v4",
"created": "Sun, 12 Oct 2008 19:15:22 GMT"
}
] | 2011-04-15T00:00:00 | [
[
"Japaridze",
"Giorgi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0706.0225 | Qiang Li | Qiang Li and C. N. Georghiades | On the End-to-End Distortion for a Buffered Transmission over Fading
Channel | null | null | null | null | cs.IT math.IT | null | In this paper, we study the end-to-end distortion/delay tradeoff for a
analogue source transmitted over a fading channel. The analogue source is
quantized and stored in a buffer until it is transmitted. There are two extreme
cases as far as buffer delay is concerned: no delay and infinite delay. We
observe that there is a significant power gain by introducing a buffer delay.
Our goal is to investigate the situation between these two extremes. Using
recently proposed \emph{effective capacity} concept, we derive a closed-form
formula for this tradeoff. For SISO case, an asymptotically tight upper bound
for our distortion-delay curve is derived, which approaches to the infinite
delay lower bound as $\mathcal{D}_\infty \exp(\frac{C}{\tau_n})$, with $\tau_n$
is the normalized delay, $C$ is a constant. For more general MIMO channel, we
computed the distortion SNR exponent -- the exponential decay rate of the
expected distortion in the high SNR regime. Numerical results demonstrate that
introduction of a small amount delay can save significant transmission power.
| [
{
"version": "v1",
"created": "Fri, 1 Jun 2007 21:40:59 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Li",
"Qiang",
""
],
[
"Georghiades",
"C. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.0252 | David Monniaux | David Monniaux (LIENS) | Applying the Z-transform for the static analysis of floating-point
numerical filters | null | null | null | null | cs.PL cs.NA | null | Digital linear filters are used in a variety of applications (sound
treatment, control/command, etc.), implemented in software, in hardware, or a
combination thereof. For safety-critical applications, it is necessary to bound
all variables and outputs of all filters. We give a compositional, effective
abstraction for digital linear filters expressed as block diagrams, yielding
sound, precise bounds for fixed-point or floating-point implementations of the
filters.
| [
{
"version": "v1",
"created": "Sat, 2 Jun 2007 06:18:48 GMT"
}
] | 2007-06-05T00:00:00 | [
[
"Monniaux",
"David",
"",
"LIENS"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0706.0280 | Tshilidzi Marwala | Evan Hurwitz and Tshilidzi Marwala | Multi-Agent Modeling Using Intelligent Agents in the Game of Lerpa | 32 pages | null | null | null | cs.MA cs.GT | null | Game theory has many limitations implicit in its application. By utilizing
multiagent modeling, it is possible to solve a number of problems that are
unsolvable using traditional game theory. In this paper reinforcement learning
is applied to neural networks to create intelligent agents
| [
{
"version": "v1",
"created": "Sat, 2 Jun 2007 17:20:21 GMT"
}
] | 2007-06-05T00:00:00 | [
[
"Hurwitz",
"Evan",
""
],
[
"Marwala",
"Tshilidzi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0706.0300 | Tshilidzi Marwala | Simon Scurrell, Tshilidzi Marwala and David Rubin | Automatic Detection of Pulmonary Embolism using Computational
Intelligence | 5 pages | null | null | null | cs.CV | null | This article describes the implementation of a system designed to
automatically detect the presence of pulmonary embolism in lung scans. These
images are firstly segmented, before alignment and feature extraction using
PCA. The neural network was trained using the Hybrid Monte Carlo method,
resulting in a committee of 250 neural networks and good results are obtained.
| [
{
"version": "v1",
"created": "Sun, 3 Jun 2007 05:17:38 GMT"
}
] | 2007-06-05T00:00:00 | [
[
"Scurrell",
"Simon",
""
],
[
"Marwala",
"Tshilidzi",
""
],
[
"Rubin",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0706.0306 | Johannes Mueller | Andreas Hense, Johannes Mueller | Submission of content to a digital object repository using a
configurable workflow system | null | null | null | null | cs.DL | null | The prototype of a workflow system for the submission of content to a digital
object repository is here presented. It is based entirely on open-source
standard components and features a service-oriented architecture. The front-end
consists of Java Business Process Management (jBPM), Java Server Faces (JSF),
and Java Server Pages (JSP). A Fedora Repository and a mySQL data base
management system serve as a back-end. The communication between front-end and
back-end uses a SOAP minimal binding stub. We describe the design principles
and the construction of the prototype and discuss the possibilities and
limitations of work ow creation by administrators. The code of the prototype is
open-source and can be retrieved in the project escipub at
http://sourceforge.net
| [
{
"version": "v1",
"created": "Sun, 3 Jun 2007 19:37:41 GMT"
}
] | 2007-06-05T00:00:00 | [
[
"Hense",
"Andreas",
""
],
[
"Mueller",
"Johannes",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0706.0323 | N. Raj Rao | N. Raj Rao and Roland Speicher | Multiplication of free random variables and the S-transform: the case of
vanishing mean | Submitted to the Electronic Communications on Probability | null | null | null | math.OA cs.IT math.IT math.PR | null | This note extends Voiculescu's S-transform based analytical machinery for
free multiplicative convolution to the case where the mean of the probability
measures vanishes. We show that with the right interpretation of the
S-transform in the case of vanishing mean, the usual formula makes perfectly
good sense.
| [
{
"version": "v1",
"created": "Mon, 4 Jun 2007 02:10:27 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Rao",
"N. Raj",
""
],
[
"Speicher",
"Roland",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OA",
"description": "Algebras of operators on Hilbert space, C^*-algebras, von Neumann algebras, non-commutative geometry",
"span": "(Operator Algebras)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0706.0427 | Jidong Zhong | Jidong Zhong | Watermark Embedding and Detection | PhD Dissertation (157 pages), Shanghai Jiaotong Universtiy, 2007 | null | null | null | cs.MM cs.CR | null | The embedder and the detector (or decoder) are the two most important
components of the digital watermarking systems. Thus in this work, we discuss
how to design a better embedder and detector (or decoder). I first give a
summary of the prospective applications of watermarking technology and major
watermarking schemes in the literature. My review on the literature closely
centers upon how the side information is exploited at both embedders and
detectors. In Chapter 3, I explore the optimum detector or decoder according to
a particular probability distribution of the host signals. We found that the
performance of both multiplicative and additive spread spectrum schemes depends
on the shape parameter of the host signals. For spread spectrum schemes, the
performance of the detector or the decoder is reduced by the host interference.
Thus I present a new host-interference rejection technique for the
multiplicative spread spectrum schemes. Its embedding rule is tailored to the
optimum detection or decoding rule. Though the host interference rejection
schemes enjoy a big performance gain over the traditional spread spectrum
schemes, their drawbacks that it is difficult for them to be implemented with
the perceptual analysis to achieve the maximum allowable embedding level
discourage their use in real scenarios. Thus, in the last chapters of this
work, I introduce a double-sided technique to tackle this drawback. It differs
from the host interference rejection schemes in that it utilizes but does not
reject the host interference at its embedder. The perceptual analysis can be
easily implemented in our scheme to achieve the maximum allowable level of
embedding strength.
| [
{
"version": "v1",
"created": "Sat, 2 Jun 2007 05:37:34 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Zhong",
"Jidong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0706.0430 | Shishir Nagaraja | Shishir Nagaraja | Anonymity in the Wild: Mixes on unstructured networks | published in Privacy Enhancing Technologies 2007, Ottawa | null | null | null | cs.CR cs.NI | null | As decentralized computing scenarios get ever more popular, unstructured
topologies are natural candidates to consider running mix networks upon. We
consider mix network topologies where mixes are placed on the nodes of an
unstructured network, such as social networks and scale-free random networks.
We explore the efficiency and traffic analysis resistance properties of mix
networks based on unstructured topologies as opposed to theoretically optimal
structured topologies, under high latency conditions. We consider a mix of
directed and undirected network models, as well as one real world case study --
the LiveJournal friendship network topology. Our analysis indicates that
mix-networks based on scale-free and small-world topologies have, firstly,
mix-route lengths that are roughly comparable to those in expander graphs;
second, that compromise of the most central nodes has little effect on
anonymization properties, and third, batch sizes required for warding off
intersection attacks need to be an order of magnitude higher in unstructured
networks in comparison with expander graph topologies.
| [
{
"version": "v1",
"created": "Mon, 4 Jun 2007 13:11:07 GMT"
}
] | 2007-06-05T00:00:00 | [
[
"Nagaraja",
"Shishir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.0431 | Wolfgang Steiner | Emilie Charlier, Michel Rigo, Wolfgang Steiner (LIAFA) | Abstract numeration systems on bounded languages and multiplication by a
constant | null | Integers: Electronic Journal of Combinatorial Number Theory 8, 1
(2008) #35 | null | null | cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A set of integers is $S$-recognizable in an abstract numeration system $S$ if
the language made up of the representations of its elements is accepted by a
finite automaton. For abstract numeration systems built over bounded languages
with at least three letters, we show that multiplication by an integer
$\lambda\ge2$ does not preserve $S$-recognizability, meaning that there always
exists a $S$-recognizable set $X$ such that $\lambda X$ is not
$S$-recognizable. The main tool is a bijection between the representation of an
integer over a bounded language and its decomposition as a sum of binomial
coefficients with certain properties, the so-called combinatorial numeration
system.
| [
{
"version": "v1",
"created": "Mon, 4 Jun 2007 13:12:37 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Sep 2008 10:13:27 GMT"
}
] | 2008-09-16T00:00:00 | [
[
"Charlier",
"Emilie",
"",
"LIAFA"
],
[
"Rigo",
"Michel",
"",
"LIAFA"
],
[
"Steiner",
"Wolfgang",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0706.0447 | Francois Rodier | Fran\c{c}ois Rodier (IML), Eric F\'erard (GAATI) | Non lin\'earit\'e des fonctions bool\'eennes donn\'ees par des traces de
polyn\^omes de degr\'e binaire 3 | null | null | null | null | math.NT cs.CR cs.DM math.AG | null | Nous \'etudions la non lin\'earit\'e des fonctions d\'efinies sur F_{2^m}
o\`u $m$ est un entier impair, associ\'ees aux polyn\^omes de degr\'e 7 ou \`a
des polyn\^omes plus g\'en\'eraux.
-----
We study the nonlinearity of the functions defined on F_{2^m} where $m$ is an
odd integer, associated to the polynomials of degree 7 or more general
polynomials.
| [
{
"version": "v1",
"created": "Mon, 4 Jun 2007 14:37:29 GMT"
}
] | 2007-06-05T00:00:00 | [
[
"Rodier",
"François",
"",
"IML"
],
[
"Férard",
"Eric",
"",
"GAATI"
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
0706.0457 | Donald Sofge | D. A. Sofge, M. A. Potter, M. D. Bugajska, A. C. Schultz | Challenges and Opportunities of Evolutionary Robotics | 6 pages | D.A. Sofge, M.A. Potter, M.D. Bugajska, and A.C. Schultz,
"Challenges and Opportunities of Evolutionary Robotics." In Proc. 2nd Int'l
Conf. on Computational Intelligence, Robotics, and Autonomous Systems, 2003 | null | null | cs.NE cs.RO | null | Robotic hardware designs are becoming more complex as the variety and number
of on-board sensors increase and as greater computational power is provided in
ever-smaller packages on-board robots. These advances in hardware, however, do
not automatically translate into better software for controlling complex
robots. Evolutionary techniques hold the potential to solve many difficult
problems in robotics which defy simple conventional approaches, but present
many challenges as well. Numerous disciplines including artificial life,
cognitive science and neural networks, rule-based systems, behavior-based
control, genetic algorithms and other forms of evolutionary computation have
contributed to shaping the current state of evolutionary robotics. This paper
provides an overview of developments in the emerging field of evolutionary
robotics, and discusses some of the opportunities and challenges which
currently face practitioners in the field.
| [
{
"version": "v1",
"created": "Mon, 4 Jun 2007 16:08:22 GMT"
}
] | 2007-06-05T00:00:00 | [
[
"Sofge",
"D. A.",
""
],
[
"Potter",
"M. A.",
""
],
[
"Bugajska",
"M. D.",
""
],
[
"Schultz",
"A. C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0706.0465 | Donald Sofge | D. A. Sofge | Virtual Sensor Based Fault Detection and Classification on a Plasma Etch
Reactor | 7 pages | D. Sofge, "Virtual Sensor Based Fault Detection and Classification
on a Plasma Etch Reactor," The 2nd Joint Mexico-US Int'l. Workshop on Neural
Networks and Neurocontrol (poster), 1997 | null | null | cs.AI cs.CV | null | The SEMATECH sponsored J-88-E project teaming Texas Instruments with
NeuroDyne (et al.) focused on Fault Detection and Classification (FDC) on a Lam
9600 aluminum plasma etch reactor, used in the process of semiconductor
fabrication. Fault classification was accomplished by implementing a series of
virtual sensor models which used data from real sensors (Lam Station sensors,
Optical Emission Spectroscopy, and RF Monitoring) to predict recipe setpoints
and wafer state characteristics. Fault detection and classification were
performed by comparing predicted recipe and wafer state values with expected
values. Models utilized include linear PLS, Polynomial PLS, and Neural Network
PLS. Prediction of recipe setpoints based upon sensor data provides a
capability for cross-checking that the machine is maintaining the desired
setpoints. Wafer state characteristics such as Line Width Reduction and
Remaining Oxide were estimated on-line using these same process sensors (Lam,
OES, RFM). Wafer-to-wafer measurement of these characteristics in a production
setting (where typically this information may be only sparsely available, if at
all, after batch processing runs with numerous wafers have been completed)
would provide important information to the operator that the process is or is
not producing wafers within acceptable bounds of product quality. Production
yield is increased, and correspondingly per unit cost is reduced, by providing
the operator with the opportunity to adjust the process or machine before
etching more wafers.
| [
{
"version": "v1",
"created": "Mon, 4 Jun 2007 15:55:27 GMT"
}
] | 2007-06-05T00:00:00 | [
[
"Sofge",
"D. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0706.0484 | David Wright | David R. Wright | Motivation, Design, and Ubiquity: A Discussion of Research Ethics and
Computer Science | Written as central essay for the Computer Science module of the
LANGURE model curriculum in Research Ethics | null | null | null | cs.GL | null | Modern society is permeated with computers, and the software that controls
them can have latent, long-term, and immediate effects that reach far beyond
the actual users of these systems. This places researchers in Computer Science
and Software Engineering in a critical position of influence and
responsibility, more than any other field because computer systems are vital
research tools for other disciplines. This essay presents several key ethical
concerns and responsibilities relating to research in computing. The goal is to
promote awareness and discussion of ethical issues among computer science
researchers. A hypothetical case study is provided, along with questions for
reflection and discussion.
| [
{
"version": "v1",
"created": "Mon, 4 Jun 2007 17:17:44 GMT"
}
] | 2007-06-05T00:00:00 | [
[
"Wright",
"David R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0706.0489 | Markus Jalsenius | Markus Jalsenius | Sampling Colourings of the Triangular Lattice | 42 pages. Added appendix that describes implementation. Added
ancillary files | null | null | null | math-ph cs.DM cs.DS math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that the Glauber dynamics on proper 9-colourings of the triangular
lattice is rapidly mixing, which allows for efficient sampling. Consequently,
there is a fully polynomial randomised approximation scheme (FPRAS) for
counting proper 9-colourings of the triangular lattice. Proper colourings
correspond to configurations in the zero-temperature anti-ferromagnetic Potts
model. We show that the spin system consisting of proper 9-colourings of the
triangular lattice has strong spatial mixing. This implies that there is a
unique infinite-volume Gibbs distribution, which is an important property
studied in statistical physics. Our results build on previous work by Goldberg,
Martin and Paterson, who showed similar results for 10 colours on the
triangular lattice. Their work was preceded by Salas and Sokal's 11-colour
result. Both proofs rely on computational assistance, and so does our 9-colour
proof. We have used a randomised heuristic to guide us towards rigourous
results.
| [
{
"version": "v1",
"created": "Mon, 4 Jun 2007 17:49:25 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Mar 2010 17:49:43 GMT"
},
{
"version": "v3",
"created": "Tue, 26 Oct 2010 02:09:02 GMT"
}
] | 2010-10-27T00:00:00 | [
[
"Jalsenius",
"Markus",
""
]
] | [
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
0706.0502 | Eugen Zalinescu | Veronique Cortier, Michael Rusinovitch, Eugen Zalinescu | Relating two standard notions of secrecy | 29 pages, published in LMCS | Logical Methods in Computer Science, Volume 3, Issue 3 (July 6,
2007) lmcs:1093 | 10.2168/LMCS-3(3:2)2007 | null | cs.CR cs.LO | null | Two styles of definitions are usually considered to express that a security
protocol preserves the confidentiality of a data s. Reachability-based secrecy
means that s should never be disclosed while equivalence-based secrecy states
that two executions of a protocol with distinct instances for s should be
indistinguishable to an attacker. Although the second formulation ensures a
higher level of security and is closer to cryptographic notions of secrecy,
decidability results and automatic tools have mainly focused on the first
definition so far.
This paper initiates a systematic investigation of the situations where
syntactic secrecy entails strong secrecy. We show that in the passive case,
reachability-based secrecy actually implies equivalence-based secrecy for
digital signatures, symmetric and asymmetric encryption provided that the
primitives are probabilistic. For active adversaries, we provide sufficient
(and rather tight) conditions on the protocol for this implication to hold.
| [
{
"version": "v1",
"created": "Mon, 4 Jun 2007 19:30:33 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Jul 2007 09:06:10 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Cortier",
"Veronique",
""
],
[
"Rusinovitch",
"Michael",
""
],
[
"Zalinescu",
"Eugen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0706.0507 | Hichem Geryville | Hichem Geryville (LIESP), Yacine Ouzrout (LIESP), Abdelaziz Bouras
(LIESP), Nikolaos Sapidis | A collaborative framework to exchange and share product information
within a supply chain context | null | null | null | null | cs.HC | null | The new requirement for "collaboration" between multidisciplinary
collaborators induces to exchange and share adequate information on the
product, processes throughout the products' lifecycle. Thus, effective capture
of information, and also its extraction, recording, exchange, sharing, and
reuse become increasingly critical. These lead companies to adopt new improved
methodologies in managing the exchange and sharing of information. The aim of
this paper is to describe a collaborative framework system to exchange and
share information, which is based on: (i) The Product Process Collaboration
Organization model (PPCO) which defines product and process information, and
the various collaboration methods for the organizations involved in the supply
chain. (ii) Viewpoint model describes relationships between each actor and the
comprehensive Product/Process model, defining each actor's "domain of interest"
within the evolving product definition. (iii) A layer which defines the
comprehensive organization and collaboration relationships between the actors
within the supply chain. (iv) Based on the above relationships, the last layer
proposes a typology of exchanged messages. A communication method, based on
XML, is developed that supports optimal exchange/sharing of information. To
illustrate the proposed framework system, an example is presented related to
collaborative design of a new piston for an automotive engine. The focus is on
user-viewpoint integration to ensure that the adequate information is retrieved
from the PPCO.
| [
{
"version": "v1",
"created": "Mon, 4 Jun 2007 19:48:07 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Geryville",
"Hichem",
"",
"LIESP"
],
[
"Ouzrout",
"Yacine",
"",
"LIESP"
],
[
"Bouras",
"Abdelaziz",
"",
"LIESP"
],
[
"Sapidis",
"Nikolaos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0706.0523 | Ranjit Jhala | Ranjit Jhala, Kenneth L. McMillan | Interpolant-Based Transition Relation Approximation | Conference Version at CAV 2005. 17 Pages, 9 Figures | Logical Methods in Computer Science, Volume 3, Issue 4 (November
1, 2007) lmcs:1152 | 10.2168/LMCS-3(4:1)2007 | null | cs.LO cs.PL cs.SE | null | In predicate abstraction, exact image computation is problematic, requiring
in the worst case an exponential number of calls to a decision procedure. For
this reason, software model checkers typically use a weak approximation of the
image. This can result in a failure to prove a property, even given an adequate
set of predicates. We present an interpolant-based method for strengthening the
abstract transition relation in case of such failures. This approach guarantees
convergence given an adequate set of predicates, without requiring an exact
image computation. We show empirically that the method converges more rapidly
than an earlier method based on counterexample analysis.
| [
{
"version": "v1",
"created": "Mon, 4 Jun 2007 20:07:54 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Nov 2007 17:00:23 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Jhala",
"Ranjit",
""
],
[
"McMillan",
"Kenneth L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0706.0534 | Shuheng Zhou | Shuheng Zhou, John Lafferty, Larry Wasserman | Compressed Regression | 59 pages, 5 figure, Submitted for review | IEEE Transactions on Information Theory, Volume 55, No.2, pp
846--866, 2009 | null | null | stat.ML cs.IT math.IT | null | Recent research has studied the role of sparsity in high dimensional
regression and signal reconstruction, establishing theoretical limits for
recovering sparse models from sparse data. This line of work shows that
$\ell_1$-regularized least squares regression can accurately estimate a sparse
linear model from $n$ noisy examples in $p$ dimensions, even if $p$ is much
larger than $n$. In this paper we study a variant of this problem where the
original $n$ input variables are compressed by a random linear transformation
to $m \ll n$ examples in $p$ dimensions, and establish conditions under which a
sparse linear model can be successfully recovered from the compressed data. A
primary motivation for this compression procedure is to anonymize the data and
preserve privacy by revealing little information about the original data. We
characterize the number of random projections that are required for
$\ell_1$-regularized compressed regression to identify the nonzero coefficients
in the true model with probability approaching one, a property called
``sparsistence.'' In addition, we show that $\ell_1$-regularized compressed
regression asymptotically predicts as well as an oracle linear model, a
property called ``persistence.'' Finally, we characterize the privacy
properties of the compression procedure in information-theoretic terms,
establishing upper bounds on the mutual information between the compressed and
uncompressed data that decay to zero.
| [
{
"version": "v1",
"created": "Mon, 4 Jun 2007 20:42:54 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Jan 2008 06:33:58 GMT"
}
] | 2012-01-11T00:00:00 | [
[
"Zhou",
"Shuheng",
""
],
[
"Lafferty",
"John",
""
],
[
"Wasserman",
"Larry",
""
]
] | [
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.0564 | Josephine Yu | Bernd Sturmfels and Josephine Yu | Tropical Implicitization and Mixed Fiber Polytopes | 21 pages, 2 figures; Typo fixed in Theorem 5.2 | Software for algebraic geometry, 111--131, IMA Vol. Math. Appl.,
148, Springer, New York, 2008 | null | null | cs.SC math.AG math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The software TrIm offers implementations of tropical implicitization and
tropical elimination, as developed by Tevelev and the authors. Given a
polynomial map with generic coefficients, TrIm computes the tropical variety of
the image. When the image is a hypersurface, the output is the Newton polytope
of the defining polynomial. TrIm can thus be used to compute mixed fiber
polytopes, including secondary polytopes.
| [
{
"version": "v1",
"created": "Tue, 5 Jun 2007 00:53:37 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Jun 2010 22:57:11 GMT"
}
] | 2010-06-22T00:00:00 | [
[
"Sturmfels",
"Bernd",
""
],
[
"Yu",
"Josephine",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0706.0580 | Yoo Chung | Yoo Chung | Efficient Batch Update of Unique Identifiers in a Distributed Hash Table
for Resources in a Mobile Host | To be presented at the 2010 International Workshop on Cloud
Computing, Applications and Technologies | null | 10.1109/ISPA.2010.73 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Resources in a distributed system can be identified using identifiers based
on random numbers. When using a distributed hash table to resolve such
identifiers to network locations, the straightforward approach is to store the
network location directly in the hash table entry associated with an
identifier. When a mobile host contains a large number of resources, this
requires that all of the associated hash table entries must be updated when its
network address changes.
We propose an alternative approach where we store a host identifier in the
entry associated with a resource identifier and the actual network address of
the host in a separate host entry. This can drastically reduce the time
required for updating the distributed hash table when a mobile host changes its
network address. We also investigate under which circumstances our approach
should or should not be used. We evaluate and confirm the usefulness of our
approach with experiments run on top of OpenDHT.
| [
{
"version": "v1",
"created": "Tue, 5 Jun 2007 05:28:54 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Jun 2010 02:51:05 GMT"
}
] | 2011-04-07T00:00:00 | [
[
"Chung",
"Yoo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.0585 | Zhendong Zhao | Zhendong Zhao, Lei Yuan, Yuxuan Wang, Forrest Sheng Bao, Shunyi Zhang
Yanfei Sun | A Novel Model of Working Set Selection for SMO Decomposition Methods | 8 pages, 12 figures, it was submitted to IEEE International
conference of Tools on Artificial Intelligence | null | 10.1109/ICTAI.2007.99 | null | cs.LG cs.AI | null | In the process of training Support Vector Machines (SVMs) by decomposition
methods, working set selection is an important technique, and some exciting
schemes were employed into this field. To improve working set selection, we
propose a new model for working set selection in sequential minimal
optimization (SMO) decomposition methods. In this model, it selects B as
working set without reselection. Some properties are given by simple proof, and
experiments demonstrate that the proposed method is in general faster than
existing methods.
| [
{
"version": "v1",
"created": "Tue, 5 Jun 2007 05:55:07 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Zhao",
"Zhendong",
""
],
[
"Yuan",
"Lei",
""
],
[
"Wang",
"Yuxuan",
""
],
[
"Bao",
"Forrest Sheng",
""
],
[
"Sun",
"Shunyi Zhang Yanfei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0706.0682 | Marat Burnashev V. | Marat V. Burnashev | Code spectrum and reliability function: Gaussian channel | 24 pages, 1 figure | Problems of Information Transmission, vol. 43, no. 2, pp. 3-24,
2007 | null | null | cs.IT math.IT | null | A new approach for upper bounding the channel reliability function using the
code spectrum is described. It allows to treat both low and high rate cases in
a unified way. In particular, the earlier known upper bounds are improved, and
a new derivation of the sphere-packing bound is presented.
| [
{
"version": "v1",
"created": "Tue, 5 Jun 2007 19:08:59 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Burnashev",
"Marat V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.0685 | Ye Wang | Ye Wang, Prakash Ishwar | Non-Parametric Field Estimation using Randomly Deployed, Noisy, Binary
Sensors | 10 pages, 1 figure. Significantly expanded version with consideration
of general deployment distribution models and new results ragarding almost
sure convergence and minimax convergence rates. Submitted to Transactions on
Signal Processing | null | null | null | cs.IT math.IT | null | The reconstruction of a deterministic data field from binary-quantized noisy
observations of sensors which are randomly deployed over the field domain is
studied. The study focuses on the extremes of lack of deterministic control in
the sensor deployment, lack of knowledge of the noise distribution, and lack of
sensing precision and reliability. Such adverse conditions are motivated by
possible real-world scenarios where a large collection of low-cost, crudely
manufactured sensors are mass-deployed in an environment where little can be
assumed about the ambient noise. A simple estimator that reconstructs the
entire data field from these unreliable, binary-quantized, noisy observations
is proposed. Technical conditions for the almost sure and integrated mean
squared error (MSE) convergence of the estimate to the data field, as the
number of sensors tends to infinity, are derived and their implications are
discussed. For finite-dimensional, bounded-variation, and
Sobolev-differentiable function classes, specific integrated MSE decay rates
are derived. For the first and third function classes these rates are found to
be minimax order optimal with respect to infinite precision sensing and known
noise distribution.
| [
{
"version": "v1",
"created": "Tue, 5 Jun 2007 15:20:26 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Dec 2007 21:40:41 GMT"
}
] | 2007-12-13T00:00:00 | [
[
"Wang",
"Ye",
""
],
[
"Ishwar",
"Prakash",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.0692 | Dimitar Guelev | Dimitar P. Guelev | Probabilistic Interval Temporal Logic and Duration Calculus with
Infinite Intervals: Complete Proof Systems | 43 pages | Logical Methods in Computer Science, Volume 3, Issue 3 (July 19,
2007) lmcs:947 | 10.2168/LMCS-3(3:3)2007 | null | cs.LO | null | The paper presents probabilistic extensions of interval temporal logic (ITL)
and duration calculus (DC) with infinite intervals and complete Hilbert-style
proof systems for them. The completeness results are a strong completeness
theorem for the system of probabilistic ITL with respect to an abstract
semantics and a relative completeness theorem for the system of probabilistic
DC with respect to real-time semantics. The proposed systems subsume
probabilistic real-time DC as known from the literature. A correspondence
between the proposed systems and a system of probabilistic interval temporal
logic with finite intervals and expanding modalities is established too.
| [
{
"version": "v1",
"created": "Tue, 5 Jun 2007 15:46:09 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Jul 2007 08:34:50 GMT"
}
] | 2019-03-14T00:00:00 | [
[
"Guelev",
"Dimitar P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0706.0720 | Martin Wainwright | Ram Rajagopal, Martin J. Wainwright | Universal Quantile Estimation with Feedback in the
Communication-Constrained Setting | Work presented in part at the International Symposium on Information
Theory, Seattle, WA, in July 2006 | null | null | null | cs.IT math.IT | null | We consider the following problem of decentralized statistical inference:
given i.i.d. samples from an unknown distribution, estimate an arbitrary
quantile subject to limits on the number of bits exchanged. We analyze a
standard fusion-based architecture, in which each of $m$ sensors transmits a
single bit to the fusion center, which in turn is permitted to send some number
$k$ bits of feedback. Supposing that each of $\nodenum$ sensors receives $n$
observations, the optimal centralized protocol yields mean-squared error
decaying as $\order(1/[n m])$. We develop and analyze the performance of
various decentralized protocols in comparison to this centralized
gold-standard. First, we describe a decentralized protocol based on $k =
\log(\nodenum)$ bits of feedback that is strongly consistent, and achieves the
same asymptotic MSE as the centralized optimum. Second, we describe and analyze
a decentralized protocol based on only a single bit ($k=1$) of feedback. For
step sizes independent of $m$, it achieves an asymptotic MSE of order
$\order[1/(n \sqrt{m})]$, whereas for step sizes decaying as $1/\sqrt{m}$, it
achieves the same $\order(1/[n m])$ decay in MSE as the centralized optimum.
Our theoretical results are complemented by simulations, illustrating the
tradeoffs between these different protocols.
| [
{
"version": "v1",
"created": "Tue, 5 Jun 2007 19:00:17 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Rajagopal",
"Ram",
""
],
[
"Wainwright",
"Martin J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.0869 | Edward Aboufadel | Edward Aboufadel, Timothy Armstrong, Elizabeth Smietana | Position Coding | 14 pages, 7 figures | null | null | null | cs.IT math.CO math.IT | null | A position coding pattern is an array of symbols in which subarrays of a
certain fixed size appear at most once. So, each subarray uniquely identifies a
location in the larger array, which means there is a bijection of some sort
from this set of subarrays to a set of coordinates. The key to Fly Pentop
Computer paper and other examples of position codes is a method to read the
subarray and then convert it to coordinates. Position coding makes use of ideas
from discrete mathematics and number theory. In this paper, we will describe
the underlying mathematics of two position codes, one being the Anoto code that
is the basis of "Fly paper". Then, we will present two new codes, one which
uses binary wavelets as part of the bijection.
| [
{
"version": "v1",
"created": "Wed, 6 Jun 2007 17:09:21 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Aboufadel",
"Edward",
""
],
[
"Armstrong",
"Timothy",
""
],
[
"Smietana",
"Elizabeth",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.0870 | Nachi Gupta | Nachi Gupta, Raphael Hauser, and Neil F. Johnson | Inferring the Composition of a Trader Population in a Financial Market | 15 pages, 2 figures, to appear as a chapter in "Econophysics and
Sociophysics of Markets and Networks", Springer-Verlag | null | 10.1007/978-88-470-0665-2_7 | null | cs.CE nlin.AO | null | We discuss a method for predicting financial movements and finding pockets of
predictability in the price-series, which is built around inferring the
heterogeneity of trading strategies in a multi-agent trader population. This
work explores extensions to our previous framework (arXiv:physics/0506134).
Here we allow for more intelligent agents possessing a richer strategy set, and
we no longer constrain the estimate for the heterogeneity of the agents to a
probability space. We also introduce a scheme which allows the incorporation of
models with a wide variety of agent types, and discuss a mechanism for the
removal of bias from relevant parameters.
| [
{
"version": "v1",
"created": "Wed, 6 Jun 2007 17:29:42 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Gupta",
"Nachi",
""
],
[
"Hauser",
"Raphael",
""
],
[
"Johnson",
"Neil F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
0706.0903 | Georgy Karev | Faina Berezovskaya, Artem Novozhilov, Georgy Karev | Families of traveling impulses and fronts in some models with
cross-diffusion | 20 pages, 9 figures; submitted to Journal of Nonlinear Analysis: Real
World Applications | null | null | null | cs.NA | null | An analysis of traveling wave solutions of partial differential equation
(PDE) systems with cross-diffusion is presented. The systems under study fall
in a general class of the classical Keller-Segel models to describe chemotaxis.
The analysis is conducted using the theory of the phase plane analysis of the
corresponding wave systems without a priory restrictions on the boundary
conditions of the initial PDE. Special attention is paid to families of
traveling wave solutions. Conditions for existence of front-impulse,
impulse-front, and front-front traveling wave solutions are formulated. In
particular, the simplest mathematical model is presented that has an
impulse-impulse solution; we also show that a non-isolated singular point in
the ordinary differential equation (ODE) wave system implies existence of
free-boundary fronts. The results can be used for construction and analysis of
different mathematical models describing systems with chemotaxis.
| [
{
"version": "v1",
"created": "Wed, 6 Jun 2007 20:19:20 GMT"
}
] | 2007-06-08T00:00:00 | [
[
"Berezovskaya",
"Faina",
""
],
[
"Novozhilov",
"Artem",
""
],
[
"Karev",
"Georgy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0706.1001 | Krzysztof R. Apt | Krzysztof R. Apt | Epistemic Analysis of Strategic Games with Arbitrary Strategy Sets | 8 pages Proc. of the 11th Conference on Theoretical Aspects of
Rationality and Knowledge (TARK XI), 2007. To appear | null | null | null | cs.GT cs.AI | null | We provide here an epistemic analysis of arbitrary strategic games based on
the possibility correspondences. Such an analysis calls for the use of
transfinite iterations of the corresponding operators. Our approach is based on
Tarski's Fixpoint Theorem and applies both to the notions of rationalizability
and the iterated elimination of strictly dominated strategies.
| [
{
"version": "v1",
"created": "Thu, 7 Jun 2007 12:57:21 GMT"
}
] | 2007-06-08T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0706.1002 | Alexander Wolff | Xavier Goaoc, Jan Kratochvil, Yoshio Okamoto, Chan-Su Shin, Alexander
Wolff | Moving Vertices to Make Drawings Plane | This paper has been merged with http://arxiv.org/abs/0709.0170 | null | null | null | cs.CG cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A straight-line drawing $\delta$ of a planar graph $G$ need not be plane, but
can be made so by moving some of the vertices. Let shift$(G,\delta)$ denote the
minimum number of vertices that need to be moved to turn $\delta$ into a plane
drawing of $G$. We show that shift$(G,\delta)$ is NP-hard to compute and to
approximate, and we give explicit bounds on shift$(G,\delta)$ when $G$ is a
tree or a general planar graph. Our hardness results extend to
1BendPointSetEmbeddability, a well-known graph-drawing problem.
| [
{
"version": "v1",
"created": "Thu, 7 Jun 2007 13:57:52 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Nov 2007 13:14:51 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Nov 2008 21:57:09 GMT"
}
] | 2008-11-06T00:00:00 | [
[
"Goaoc",
"Xavier",
""
],
[
"Kratochvil",
"Jan",
""
],
[
"Okamoto",
"Yoshio",
""
],
[
"Shin",
"Chan-Su",
""
],
[
"Wolff",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0706.1019 | Flavio Garcia | Flavio D. Garcia, Peter van Rossum, and Ana Sokolova | Probabilistic Anonymity and Admissible Schedulers | null | null | null | null | cs.CR | null | When studying safety properties of (formal) protocol models, it is customary
to view the scheduler as an adversary: an entity trying to falsify the safety
property. We show that in the context of security protocols, and in particular
of anonymizing protocols, this gives the adversary too much power; for
instance, the contents of encrypted messages and internal computations by the
parties should be considered invisible to the adversary.
We restrict the class of schedulers to a class of admissible schedulers which
better model adversarial behaviour. These admissible schedulers base their
decision solely on the past behaviour of the system that is visible to the
adversary.
Using this, we propose a definition of anonymity: for all admissible
schedulers the identity of the users and the observations of the adversary are
independent stochastic variables. We also develop a proof technique for typical
cases that can be used to proof anonymity: a system is anonymous if it is
possible to `exchange' the behaviour of two users without the adversary
`noticing'.
| [
{
"version": "v1",
"created": "Thu, 7 Jun 2007 15:17:52 GMT"
}
] | 2007-06-08T00:00:00 | [
[
"Garcia",
"Flavio D.",
""
],
[
"van Rossum",
"Peter",
""
],
[
"Sokolova",
"Ana",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
Subsets and Splits