id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0806.1659
Pedram Pad
K. Alishahi, F. Marvasti, V. Aref, P. Pad
Bounds on the Sum Capacity of Synchronous Binary CDMA Channels
to be published in IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2023756
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we obtain a family of lower bounds for the sum capacity of Code Division Multiple Access (CDMA) channels assuming binary inputs and binary signature codes in the presence of additive noise with an arbitrary distribution. The envelope of this family gives a relatively tight lower bound in terms of the number of users, spreading gain and the noise distribution. The derivation methods for the noiseless and the noisy channels are different but when the noise variance goes to zero, the noisy channel bound approaches the noiseless case. The behavior of the lower bound shows that for small noise power, the number of users can be much more than the spreading gain without any significant loss of information (overloaded CDMA). A conjectured upper bound is also derived under the usual assumption that the users send out equally likely binary bits in the presence of additive noise with an arbitrary distribution. As the noise level increases, and/or, the ratio of the number of users and the spreading gain increases, the conjectured upper bound approaches the lower bound. We have also derived asymptotic limits of our bounds that can be compared to a formula that Tanaka obtained using techniques from statistical physics; his bound is close to that of our conjectured upper bound for large scale systems.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 13:39:08 GMT" }, { "version": "v2", "created": "Sat, 3 Jan 2009 11:29:04 GMT" }, { "version": "v3", "created": "Thu, 7 May 2009 14:31:45 GMT" } ]
2016-11-18T00:00:00
[ [ "Alishahi", "K.", "" ], [ "Marvasti", "F.", "" ], [ "Aref", "V.", "" ], [ "Pad", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.1711
Ian Kash
Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern
The Lotus-Eater Attack
null
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many protocols for distributed and peer-to-peer systems have the feature that nodes will stop providing service for others once they have received a certain amount of service. Examples include BitTorent's unchoking policy, BAR Gossip's balanced exchanges, and threshold strategies in scrip systems. An attacker can exploit this by providing service in a targeted way to prevent chosen nodes from providing service. While such attacks cannot be prevented, we discuss techniques that can be used to limit the damage they do. These techniques presume that a certain number of processes will follow the recommended protocol, even if they could do better by ``gaming'' the system.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 17:31:42 GMT" } ]
2008-12-18T00:00:00
[ [ "Kash", "Ian A.", "" ], [ "Friedman", "Eric J.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0806.1722
Guangwu Xu
George Davida, Bruce Litow and Guangwu Xu
Fast Arithmetics Using Chinese Remaindering
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, some issues concerning the Chinese remaindering representation are discussed. Some new converting methods, including an efficient probabilistic algorithm based on a recent result of von zur Gathen and Shparlinski \cite{Gathen-Shparlinski}, are described. An efficient refinement of the NC$^1$ division algorithm of Chiu, Davida and Litow \cite{Chiu-Davida-Litow} is given, where the number of moduli is reduced by a factor of $\log n$.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 18:21:09 GMT" } ]
2008-06-11T00:00:00
[ [ "Davida", "George", "" ], [ "Litow", "Bruce", "" ], [ "Xu", "Guangwu", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0806.1724
Elena Mumford
David Eppstein and Elena Mumford
Self-overlapping Curves Revisited
13 pages, 12 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A surface embedded in space, in such a way that each point has a neighborhood within which the surface is a terrain, projects to an immersed surface in the plane, the boundary of which is a self-intersecting curve. Under what circumstances can we reverse these mappings algorithmically? Shor and van Wyk considered one such problem, determining whether a curve is the boundary of an immersed disk; they showed that the self-overlapping curves defined in this way can be recognized in polynomial time. We show that several related problems are more difficult: it is NP-complete to determine whether an immersed disk is the projection of a surface embedded in space, or whether a curve is the boundary of an immersed surface in the plane that is not constrained to be a disk. However, when a casing is supplied with a self-intersecting curve, describing which component of the curve lies above and which below at each crossing, we may determine in time linear in the number of crossings whether the cased curve forms the projected boundary of a surface in space. As a related result, we show that an immersed surface with a single boundary curve that crosses itself n times has at most 2^{n/2} combinatorially distinct spatial embeddings, and we discuss the existence of fixed-parameter tractable algorithms for related problems.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 18:50:53 GMT" } ]
2008-06-11T00:00:00
[ [ "Eppstein", "David", "" ], [ "Mumford", "Elena", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0806.1727
Laura Poplawski
Nikolaos Laoutaris, Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng
Bounded Budget Connection (BBC) Games or How to make friends and influence people, on a budget
20 pages, 10 figures, shorter version in PODC 2008
null
null
null
cs.GT cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by applications in social networks, peer-to-peer and overlay networks, we define and study the Bounded Budget Connection (BBC) game - we have a collection of n players or nodes each of whom has a budget for purchasing links; each link has a cost as well as a length and each node has a set of preference weights for each of the remaining nodes; the objective of each node is to use its budget to buy a set of outgoing links so as to minimize its sum of preference-weighted distances to the remaining nodes. We study the structural and complexity-theoretic properties of pure Nash equilibria in BBC games. We show that determining the existence of a pure Nash equilibrium in general BBC games is NP-hard. However, in a natural variant, fractional BBC games - where it is permitted to buy fractions of links - a pure Nash equilibrium always exists. A major focus is the study of (n,k)-uniform BBC games - those in which all link costs, link lengths and preference weights are equal (to 1) and all budgets are equal (to k). We show that a pure Nash equilibrium or stable graph exists for all (n,k)-uniform BBC games and that all stable graphs are essentially fair (i.e. all nodes have similar costs). We provide an explicit construction of a family of stable graphs that spans the spectrum from minimum total social cost to maximum total social cost. We also study a special family of regular graphs in which all nodes imitate the "same" buying pattern, and show that if n is sufficiently large no such regular graph can be a pure Nash equilibrium. We analyze best-response walks on the configuration defined by the uniform game. Lastly, we extend our results to the case where each node seeks to minimize its maximum distance to the other nodes.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 19:18:14 GMT" } ]
2008-06-11T00:00:00
[ [ "Laoutaris", "Nikolaos", "" ], [ "Poplawski", "Laura J.", "" ], [ "Rajaraman", "Rajmohan", "" ], [ "Sundaram", "Ravi", "" ], [ "Teng", "Shang-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.1749
Jacek Chrz{\ka}szcz
Daria Walukiewicz-Chrzaszcz and Jacek Chrzaszcz
Consistency and Completeness of Rewriting in the Calculus of Constructions
20 pages
Logical Methods in Computer Science, Volume 4, Issue 3 (September 15, 2008) lmcs:1141
10.2168/LMCS-4(3:8)2008
null
cs.LO cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Adding rewriting to a proof assistant based on the Curry-Howard isomorphism, such as Coq, may greatly improve usability of the tool. Unfortunately adding an arbitrary set of rewrite rules may render the underlying formal system undecidable and inconsistent. While ways to ensure termination and confluence, and hence decidability of type-checking, have already been studied to some extent, logical consistency has got little attention so far. In this paper we show that consistency is a consequence of canonicity, which in turn follows from the assumption that all functions defined by rewrite rules are complete. We provide a sound and terminating, but necessarily incomplete algorithm to verify this property. The algorithm accepts all definitions that follow dependent pattern matching schemes presented by Coquand and studied by McBride in his PhD thesis. It also accepts many definitions by rewriting, containing rules which depart from standard pattern matching.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 20:27:28 GMT" }, { "version": "v2", "created": "Mon, 15 Sep 2008 19:30:14 GMT" }, { "version": "v3", "created": "Mon, 15 Sep 2008 20:54:24 GMT" } ]
2015-07-01T00:00:00
[ [ "Walukiewicz-Chrzaszcz", "Daria", "" ], [ "Chrzaszcz", "Jacek", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0806.1768
Ted Herman
Ted Herman, Morten Mjelde
Local Read-Write Operations in Sensor Networks
19 pages, 16 figures (using pstricks)
null
null
TR08-02
cs.OS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Designing protocols and formulating convenient programming units of abstraction for sensor networks is challenging due to communication errors and platform constraints. This paper investigates properties and implementation reliability for a \emph{local read-write} abstraction. Local read-write is inspired by the class of read-modify-write operations defined for shared-memory multiprocessor architectures. The class of read-modify-write operations is important in solving consensus and related synchronization problems for concurrency control. Local read-write is shown to be an atomic abstraction for synchronizing neighborhood states in sensor networks. The paper compares local read-write to similar lightweight operations in wireless sensor networks, such as read-all, write-all, and a transaction-based abstraction: for some optimistic scenarios, local read-write is a more efficient neighborhood operation. A partial implementation is described, which shows that three outcomes characterize operation response: success, failure, and cancel. A failure response indicates possible inconsistency for the operation result, which is the result of a timeout event at the operation's initiator. The paper presents experimental results on operation performance with different timeout values and situations of no contention, with some tests also on various neighborhood sizes.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 00:03:00 GMT" } ]
2008-06-12T00:00:00
[ [ "Herman", "Ted", "" ], [ "Mjelde", "Morten", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0806.1796
Arnaud Martin
Arnaud Martin (E3I2), Hicham Laanaya (E3I2), Andreas Arnold-Bos (E3I2)
Evaluation for Uncertain Image Classification and Segmentation
null
Pattern Recognition 39, 11 (2006) 1987-1995
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Each year, numerous segmentation and classification algorithms are invented or reused to solve problems where machine vision is needed. Generally, the efficiency of these algorithms is compared against the results given by one or many human experts. However, in many situations, the location of the real boundaries of the objects as well as their classes are not known with certainty by the human experts. Furthermore, only one aspect of the segmentation and classification problem is generally evaluated. In this paper we present a new evaluation method for classification and segmentation of image, where we take into account both the classification and segmentation results as well as the level of certainty given by the experts. As a concrete example of our method, we evaluate an automatic seabed characterization algorithm based on sonar images.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 07:02:45 GMT" } ]
2008-12-18T00:00:00
[ [ "Martin", "Arnaud", "", "E3I2" ], [ "Laanaya", "Hicham", "", "E3I2" ], [ "Arnold-Bos", "Andreas", "", "E3I2" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.1797
Arnaud Martin
Arnaud Martin (E3I2), Christophe Osswald (E3I2)
A new generalization of the proportional conflict redistribution rule stable in terms of decision
null
Advances and Applications of DSmT for Information Fusion, Florentin Smarandache & Jean Dezert (Ed.) (2006) 69-88
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this chapter, we present and discuss a new generalized proportional conflict redistribution rule. The Dezert-Smarandache extension of the Demster-Shafer theory has relaunched the studies on the combination rules especially for the management of the conflict. Many combination rules have been proposed in the last few years. We study here different combination rules and compare them in terms of decision on didactic example and on generated data. Indeed, in real applications, we need a reliable decision and it is the final results that matter. This chapter shows that a fine proportional conflict redistribution rule must be preferred for the combination in the belief function theory.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 07:05:48 GMT" } ]
2008-12-18T00:00:00
[ [ "Martin", "Arnaud", "", "E3I2" ], [ "Osswald", "Christophe", "", "E3I2" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.1798
Arnaud Martin
Arnaud Martin (E3I2), Christophe Osswald (E3I2)
Human expert fusion for image classification
null
Information & Security. An International Journal 20 (2006) 122-141
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In image classification, merging the opinion of several human experts is very important for different tasks such as the evaluation or the training. Indeed, the ground truth is rarely known before the scene imaging. We propose here different models in order to fuse the informations given by two or more experts. The considered unit for the classification, a small tile of the image, can contain one or more kind of the considered classes given by the experts. A second problem that we have to take into account, is the amount of certainty of the expert has for each pixel of the tile. In order to solve these problems we define five models in the context of the Dempster-Shafer Theory and in the context of the Dezert-Smarandache Theory and we study the possible decisions with these models.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 07:09:15 GMT" } ]
2008-12-18T00:00:00
[ [ "Martin", "Arnaud", "", "E3I2" ], [ "Osswald", "Christophe", "", "E3I2" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.1802
Arnaud Martin
Arnaud Martin (E3I2), Christophe Osswald (E3I2)
Une nouvelle r\`egle de combinaison r\'epartissant le conflit - Applications en imagerie Sonar et classification de cibles Radar
null
Revue Traitement du Signal 24, 2 (2007) 71-82
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
These last years, there were many studies on the problem of the conflict coming from information combination, especially in evidence theory. We can summarise the solutions for manage the conflict into three different approaches: first, we can try to suppress or reduce the conflict before the combination step, secondly, we can manage the conflict in order to give no influence of the conflict in the combination step, and then take into account the conflict in the decision step, thirdly, we can take into account the conflict in the combination step. The first approach is certainly the better, but not always feasible. It is difficult to say which approach is the best between the second and the third. However, the most important is the produced results in applications. We propose here a new combination rule that distributes the conflict proportionally on the element given this conflict. We compare these different combination rules on real data in Sonar imagery and Radar target classification.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 07:31:36 GMT" } ]
2008-12-18T00:00:00
[ [ "Martin", "Arnaud", "", "E3I2" ], [ "Osswald", "Christophe", "", "E3I2" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.1806
Guido Tack
Christian Schulte and Guido Tack
Perfect Derived Propagators
17 pages, 2 tables
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When implementing a propagator for a constraint, one must decide about variants: When implementing min, should one also implement max? Should one implement linear equations both with and without coefficients? Constraint variants are ubiquitous: implementing them requires considerable (if not prohibitive) effort and decreases maintainability, but will deliver better performance. This paper shows how to use variable views, previously introduced for an implementation architecture, to derive perfect propagator variants. A model for views and derived propagators is introduced. Derived propagators are proved to be indeed perfect in that they inherit essential properties such as correctness and domain and bounds consistency. Techniques for systematically deriving propagators such as transformation, generalization, specialization, and channeling are developed for several variable domains. We evaluate the massive impact of derived propagators. Without derived propagators, Gecode would require 140000 rather than 40000 lines of code for propagators.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 08:03:35 GMT" } ]
2008-06-12T00:00:00
[ [ "Schulte", "Christian", "" ], [ "Tack", "Guido", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.1812
Vasiliki Liagkou Dr.
V. Liagkou, E. Makri, P. Spirakis and Y.C. Stamatiou
A probabilistic key agreement scheme for sensor networks without key predistribution
14 pages, 1 figure
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dynamic establishment of shared information (e.g. secret key) between two entities is particularly important in networks with no pre-determined structure such as wireless sensor networks (and in general wireless mobile ad-hoc networks). In such networks, nodes establish and terminate communication sessions dynamically with other nodes which may have never been encountered before, in order to somehow exchange information which will enable them to subsequently communicate in a secure manner. In this paper we give and theoretically analyze a series of protocols that enables two entities that have never encountered each other before to establish a shared piece of information for use as a key in setting up a secure communication session with the aid of a shared key encryption algorithm. These protocols do not require previous pre-distribution of candidate keys or some other piece of information of specialized form except a small seed value, from which the two entities can produce arbitrarily long strings with many similarities.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 08:39:04 GMT" } ]
2008-12-18T00:00:00
[ [ "Liagkou", "V.", "" ], [ "Makri", "E.", "" ], [ "Spirakis", "P.", "" ], [ "Stamatiou", "Y. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0806.1816
Michael Mrissa
M. Mrissa, Ph. Thiran, J-M. Jacquet, D. Benslimane and Z. Maamar
Cardinality heterogeneities in Web service composition: Issues and solutions
null
null
null
null
cs.SE cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data exchanges between Web services engaged in a composition raise several heterogeneities. In this paper, we address the problem of data cardinality heterogeneity in a composition. Firstly, we build a theoretical framework to describe different aspects of Web services that relate to data cardinality, and secondly, we solve this problem by developing a solution for cardinality mediation based on constraint logic programming.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 09:05:21 GMT" } ]
2008-12-18T00:00:00
[ [ "Mrissa", "M.", "" ], [ "Thiran", "Ph.", "" ], [ "Jacquet", "J-M.", "" ], [ "Benslimane", "D.", "" ], [ "Maamar", "Z.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0806.1819
Pavan Srinath
K. Pavan Srinath, B. Sundar Rajan
A Low-Complexity, Full-Rate, Full-Diversity 2 X 2 STBC with Golden Code's Coding Gain
Submitted to IEEE Globecom - 2008. 6 pages, 3 figures, 1 table
null
10.1109/GLOCOM.2008.ECP.235
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a low-ML-decoding-complexity, full-rate, full-diversity space-time block code (STBC) for a 2 transmit antenna, 2 receive antenna multiple-input multiple-output (MIMO) system, with coding gain equal to that of the best and well known Golden code for any QAM constellation. Recently, two codes have been proposed (by Paredes, Gershman and Alkhansari and by Sezginer and Sari), which enjoy a lower decoding complexity relative to the Golden code, but have lesser coding gain. The $2\times 2$ STBC presented in this paper has lesser decoding complexity for non-square QAM constellations, compared with that of the Golden code, while having the same decoding complexity for square QAM constellations. Compared with the Paredes-Gershman-Alkhansari and Sezginer-Sari codes, the proposed code has the same decoding complexity for non-rectangular QAM constellations. Simulation results, which compare the codeword error rate (CER) performance, are presented.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 09:25:09 GMT" } ]
2016-11-15T00:00:00
[ [ "Srinath", "K. Pavan", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.1827
Fritz M\"uller
Fritz M\"uller
Full Abstraction for a Recursively Typed Lambda Calculus with Parallel Conditional
54 pages
null
null
revised Report 12/1993 of SFB 124, Informatik, Universitaet des Saarlandes
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define the syntax and reduction relation of a recursively typed lambda calculus with a parallel case-function (a parallel conditional). The reduction is shown to be confluent. We interpret the recursive types as information systems in a restricted form, which we call prime systems. A denotational semantics is defined with this interpretation. We define the syntactical normal form approximations of a term and prove the Approximation Theorem: The semantics of a term equals the limit of the semantics of its approximations. The proof uses inclusive predicates (logical relations). The semantics is adequate with respect to the observation of Boolean values. It is also fully abstract in the presence of the parallel case-function.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 15:29:47 GMT" } ]
2008-06-12T00:00:00
[ [ "Müller", "Fritz", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.1834
Pavan Srinath
K. Pavan Srinath, B. Sundar Rajan
A Low-decoding-complexity, Large coding Gain, Full-rate, Full-diversity STBC for 4 X 2 MIMO System
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a low decoding complexity, full-diversity and full-rate space-time block code (STBC) for 4 transmit and 2 receive ($4\times 2$) multiple-input multiple-output (MIMO) systems. For such systems, the best code known is the DjABBA code and recently, Biglieri, Hong and Viterbo have proposed another STBC (BHV code) which has lower decoding complexity than DjABBA but does not have full-diversity like the DjABBA code. The code proposed in this paper has the same decoding complexity as the BHV code for square QAM constellations but has full-diversity as well. Compared to the best code in the DjABBA family of codes, our code has lower decoding complexity, a better coding gain and hence a better error performance as well. Simulation results confirming these are presented.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 10:37:13 GMT" } ]
2008-06-12T00:00:00
[ [ "Srinath", "K. Pavan", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.1843
Tang Ming
Huan Zhang, Zonghua Liu, Ming Tang, and P.M. Hui
An adaptive routing strategy for packet delivery in complex networks
6 pages, 4 figures
null
10.1016/j.physleta.2006.12.009
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an efficient routing approach for delivering packets in complex networks. On delivering a message from a node to a destination, a node forwards the message to a neighbor by estimating the waiting time along the shortest path from each of its neighbors to the destination. This projected waiting time is dynamical in nature and the path through which a message is delivered would be adapted to the distribution of messages in the network. Implementing the approach on scale-free networks, we show that the present approach performs better than the shortest-path approach and another approach that takes into account of the waiting time only at the neighboring nodes. Key features in numerical results are explained by a mean field theory. The approach has the merit that messages are distributed among the nodes according to the capabilities of the nodes in handling messages.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 11:18:59 GMT" } ]
2008-06-12T00:00:00
[ [ "Zhang", "Huan", "" ], [ "Liu", "Zonghua", "" ], [ "Tang", "Ming", "" ], [ "Hui", "P. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.1845
Tang Ming
Zonghua Liua, Weichuan Ma, Huan Zhang, Yin Sun, and P.M. Hui
An efficient approach of controlling traffic congestion in scale-free networks
7 pages, 5 figures
null
10.1016/j.physa.2006.02.021
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose and study a model of traffic in communication networks. The underlying network has a structure that is tunable between a scale-free growing network with preferential attachments and a random growing network. To model realistic situations where different nodes in a network may have different capabilities, the message or packet creation and delivering rates at a node are assumed to depend on the degree of the node. Noting that congestions are more likely to take place at the nodes with high degrees in networks with scale-free character, an efficient approach of selectively enhancing the message-processing capability of a small fraction (e.g. 3%) of the nodes is shown to perform just as good as enhancing the capability of all nodes. The interplay between the creation rate and the delivering rate in determining non-congested or congested traffic in a network is studied more numerically and analytically.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 11:23:29 GMT" } ]
2008-06-12T00:00:00
[ [ "Liua", "Zonghua", "" ], [ "Ma", "Weichuan", "" ], [ "Zhang", "Huan", "" ], [ "Sun", "Yin", "" ], [ "Hui", "P. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.1846
Tang Ming
Xiaoyan Zhu, Zonghua Liu, and Ming Tang
Detrended fluctuation analysis of traffic data
4 pages, 4 figures
CPL 24,7(2007)2142
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Different routing strategies may result in different behaviors of traffic on internet. We analyze the correlation of traffic data for three typical routing strategies by the detrended fluctuation analysis (DFA) and find that the degree of correlation of the data can be divided into three regions, i.e., weak, medium, and strong correlation. The DFA scalings are constants in both the regions of weak and strong correlation but monotonously increase in the region of medium correlation. We suggest that it is better to consider the traffic on complex network as three phases, i.e., the free, buffer, and congestion phase, than just as two phases believed before, i.e., the free and congestion phase.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 11:27:31 GMT" } ]
2008-06-12T00:00:00
[ [ "Zhu", "Xiaoyan", "" ], [ "Liu", "Zonghua", "" ], [ "Tang", "Ming", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.1893
Jackson Francomme
Sabri Chebira, Gilles Mercier (LATTIS), Jackson Francomme (LATTIS)
D\'efinition d'une structure adaptative de r\'eseau local sans fil \`a consommation optimis\'ee
null
3\`eme Conf\'erence internationale Sciences \'Electroniques, Technologies de l'Information et des T\'el\'ecommunications, Sousse : Tunisie (2005)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The strong growth of low rate wireless personal area networks (LR-WPAN), leads us to consider the autonomy problems, thus node lifetime in a network, knowing that the power supplies replacement is often difficult to realize. The inherent mobility in this type of equipment is an essential element. It will provide routing constraints, so a complex problem to solve. This article provides work lines to assess the performance of such a network in terms of energy consumption and mobility. The objectives are contradictory; it will necessarily find a compromise. In addition, if we want to guarantee a maximum delay for the transmitted messages, possibility offered by the IEEE 802.15-4 standard, another compromise necessitate a strictly fixed structure and a fully mobile structure. Therefore, we present a quantization of the energy cost related to the desired data rate and compared to the sleep duration of nodes in the network. Then, we open reflexion lines to find the best compromise: consumption / mobility / guaranteed deadlines, in suggesting an adaptive network structure from a concept of MANET.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 15:40:54 GMT" } ]
2008-12-18T00:00:00
[ [ "Chebira", "Sabri", "", "LATTIS" ], [ "Mercier", "Gilles", "", "LATTIS" ], [ "Francomme", "Jackson", "", "LATTIS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.1895
Jackson Francomme
Jackson Francomme (LATTIS), Gilles Mercier (LATTIS), Sabri Chebira
\'Evaluation d'une application de transmission d'images m\'edicales avec un r\'eseau sans fil
12 pages
3\`eme Conf\'erence internationale Sciences \'Electroniques, Technologies de l'Information et des T\'el\'ecommunications, Sousse : Tunisie (2005)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We offer a platform for database consultations and/or biomedical images exchanges, adapted to the low rate wireless transmission, and intended for general practitioners or specialists. The goal can be preventive, diagnostic and therapeutic. it Concerns specialties such as radiology, ultrasound, the anatomical pathology or endoscopy. The main features required in such a context are to adjust the data compression of both the specific needs of telemedicine and limited capabilities of wireless communication networks. We present our approach in which we have set out criteria on Biomedical images quality, compressed by the wavelet method to retain all the necessary information for an accurate diagnosis, and determined the characteristics of a wireless network with minimal performances for the transmission of these images within constraints related to the modality and the data flow, in this case Wifi based on the IEEE 802.11 standard. Our results will assess the capacity of this standard in terms of speed, to transmit images at a rate of 10 frames per second. It will be necessary to quantify the amount of information to add to the image datas to enable a transmission in good conditions and the appropriate modus operandi.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 15:41:59 GMT" } ]
2008-12-18T00:00:00
[ [ "Francomme", "Jackson", "", "LATTIS" ], [ "Mercier", "Gilles", "", "LATTIS" ], [ "Chebira", "Sabri", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.1918
Kristina Lerman
Kristina Lerman and Aram Galstyan
Analysis of Social Voting Patterns on Digg
null
null
null
null
cs.CY cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The social Web is transforming the way information is created and distributed. Blog authoring tools enable users to publish content, while sites such as Digg and Del.icio.us are used to distribute content to a wider audience. With content fast becoming a commodity, interest in using social networks to promote and find content has grown, both on the side of content producers (viral marketing) and consumers (recommendation). Here we study the role of social networks in promoting content on Digg, a social news aggregator that allows users to submit links to and vote on news stories. Digg's goal is to feature the most interesting stories on its front page, and it aggregates opinions of its many users to identify them. Like other social networking sites, Digg allows users to designate other users as ``friends'' and see what stories they found interesting. We studied the spread of interest in news stories submitted to Digg in June 2006. Our results suggest that pattern of the spread of interest in a story on the network is indicative of how popular the story will become. Stories that spread mainly outside of the submitter's neighborhood go on to be very popular, while stories that spread mainly through submitter's social neighborhood prove not to be very popular. This effect is visible already in the early stages of voting, and one can make a prediction about the potential audience of a story simply by analyzing where the initial votes come from.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 17:53:45 GMT" } ]
2008-12-18T00:00:00
[ [ "Lerman", "Kristina", "" ], [ "Galstyan", "Aram", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0806.1919
Eyal Lubetzky
Eyal Lubetzky, Uri Stav
Non-linear index coding outperforming the linear optimum
16 pages; Preliminary version appeared in FOCS 2007
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The following source coding problem was introduced by Birk and Kol: a sender holds a word $x\in\{0,1\}^n$, and wishes to broadcast a codeword to $n$ receivers, $R_1,...,R_n$. The receiver $R_i$ is interested in $x_i$, and has prior \emph{side information} comprising some subset of the $n$ bits. This corresponds to a directed graph $G$ on $n$ vertices, where $i j$ is an edge iff $R_i$ knows the bit $x_j$. An \emph{index code} for $G$ is an encoding scheme which enables each $R_i$ to always reconstruct $x_i$, given his side information. The minimal word length of an index code was studied by Bar-Yossef, Birk, Jayram and Kol (FOCS 2006). They introduced a graph parameter, $\minrk_2(G)$, which completely characterizes the length of an optimal \emph{linear} index code for $G$. The authors of BBJK showed that in various cases linear codes attain the optimal word length, and conjectured that linear index coding is in fact \emph{always} optimal. In this work, we disprove the main conjecture of BBJK in the following strong sense: for any $\epsilon > 0$ and sufficiently large $n$, there is an $n$-vertex graph $G$ so that every linear index code for $G$ requires codewords of length at least $n^{1-\epsilon}$, and yet a non-linear index code for $G$ has a word length of $n^\epsilon$. This is achieved by an explicit construction, which extends Alon's variant of the celebrated Ramsey construction of Frankl and Wilson. In addition, we study optimal index codes in various, less restricted, natural models, and prove several related properties of the graph parameter $\minrk(G)$.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 17:58:56 GMT" } ]
2008-06-12T00:00:00
[ [ "Lubetzky", "Eyal", "" ], [ "Stav", "Uri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.1931
Anne Broadbent
Anne Broadbent and Alain Tapp
Information-Theoretically Secure Voting Without an Honest Majority
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities. All protocols have polynomial complexity and require private channels and a simultaneous broadcast channel. Our first protocol is a basic voting scheme which allows voters to interact in order to compute the tally. Privacy of the ballot is unconditional, but any voter can cause the protocol to fail, in which case information about the tally may nevertheless transpire. Our second protocol introduces voting authorities which allow the implementation of the first protocol, while reducing the interaction and limiting it to be only between voters and authorities and among the authorities themselves. The simultaneous broadcast is also limited to the authorities. As long as a single authority is honest, the privacy is unconditional, however, a single corrupt authority or a single corrupt voter can cause the protocol to fail. Our final protocol provides a safeguard against corrupt voters by enabling a verification technique to allow the authorities to revoke incorrect votes. We also discuss the implementation of a simultaneous broadcast channel with the use of temporary computational assumptions, yielding versions of our protocols achieving everlasting security.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 18:51:04 GMT" } ]
2008-06-12T00:00:00
[ [ "Broadbent", "Anne", "" ], [ "Tapp", "Alain", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0806.1945
Ricardo Lopez-Ruiz
Jaime Sanudo and Ricardo Lopez-Ruiz
Complexity in atoms: an approach with a new analytical density
24 pages, 4 figures
null
null
null
nlin.CD cs.IT math.IT physics.atom-ph quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, the calculation of complexity on atomic systems is considered. In order to unveil the increasing of this statistical magnitude with the atomic number due to the relativistic effects, recently reported in [A. Borgoo, F. De Proft, P. Geerlings, K.D. Sen, Chem. Phys. Lett., 444 (2007) 186], a new analytical density to describe neutral atoms is proposed. This density is inspired in the Tietz potential model. The parameters of this density are determined from the normalization condition and from a variational calculation of the energy, which is a functional of the density. The density is non-singular at the origin and its specific form is selected so as to fit the results coming from non-relativistic Hartree-Fock calculations. The main ingredients of the energy functional are the non-relativistic kinetic energy, the nuclear-electron attraction energy and the classical term of the electron repulsion. The relativistic correction to the kinetic energy and the Weizsacker term are also taken into account. The Dirac and the correlation terms are shown to be less important than the other terms and they have been discarded in this study. When the statistical measure of complexity is calculated in position space with the analytical density derived from this model, the increasing trend of this magnitude as the atomic number increases is also found.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 19:44:59 GMT" } ]
2008-06-12T00:00:00
[ [ "Sanudo", "Jaime", "" ], [ "Lopez-Ruiz", "Ricardo", "" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "physics.atom-ph", "description": "Atomic and molecular structure, spectra, collisions, and data. Atoms and molecules in external fields. Molecular dynamics and coherent and optical control. Cold atoms and molecules. Cold collisions. Optical lattices.", "span": "(Atomic Physics)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0806.1948
Kai-Min Chung
Kai-Min Chung, Salil Vadhan
Tight Bounds for Hashing Block Sources
An extended abstract of this paper will appear in RANDOM08
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that if a 2-universal hash function $H$ is applied to elements of a {\em block source} $(X_1,...,X_T)$, where each item $X_i$ has enough min-entropy conditioned on the previous items, then the output distribution $(H,H(X_1),...,H(X_T))$ will be ``close'' to the uniform distribution. We provide improved bounds on how much min-entropy per item is required for this to hold, both when we ask that the output be close to uniform in statistical distance and when we only ask that it be statistically close to a distribution with small collision probability. In both cases, we reduce the dependence of the min-entropy on the number $T$ of items from $2\log T$ in previous work to $\log T$, which we show to be optimal. This leads to corresponding improvements to the recent results of Mitzenmacher and Vadhan (SODA `08) on the analysis of hashing-based algorithms and data structures when the data items come from a block source.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 19:54:14 GMT" } ]
2008-06-12T00:00:00
[ [ "Chung", "Kai-Min", "" ], [ "Vadhan", "Salil", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0806.1978
Luca Trevisan
Luca Trevisan
Max Cut and the Smallest Eigenvalue
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new approximation algorithm for Max Cut. Our algorithm runs in $\tilde O(n^2)$ time, where $n$ is the number of vertices, and achieves an approximation ratio of $.531$. On instances in which an optimal solution cuts a $1-\epsilon$ fraction of edges, our algorithm finds a solution that cuts a $1-4\sqrt{\epsilon} + 8\epsilon-o(1)$ fraction of edges. Our main result is a variant of spectral partitioning, which can be implemented in nearly linear time. Given a graph in which the Max Cut optimum is a $1-\epsilon$ fraction of edges, our spectral partitioning algorithm finds a set $S$ of vertices and a bipartition $L,R=S-L$ of $S$ such that at least a $1-O(\sqrt \epsilon)$ fraction of the edges incident on $S$ have one endpoint in $L$ and one endpoint in $R$. (This can be seen as an analog of Cheeger's inequality for the smallest eigenvalue of the adjacency matrix of a graph.) Iterating this procedure yields the approximation results stated above. A different, more complicated, variant of spectral partitioning leads to an $\tilde O(n^3)$ time algorithm that cuts $1/2 + e^{-\Omega(1/\eps)}$ fraction of edges in graphs in which the optimum is $1/2 + \epsilon$.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 17:51:02 GMT" }, { "version": "v2", "created": "Sun, 15 Jun 2008 05:09:08 GMT" }, { "version": "v3", "created": "Mon, 22 Sep 2008 23:59:20 GMT" }, { "version": "v4", "created": "Wed, 24 Sep 2008 09:39:48 GMT" }, { "version": "v5", "created": "Mon, 8 Dec 2008 19:03:46 GMT" } ]
2008-12-08T00:00:00
[ [ "Trevisan", "Luca", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0806.1984
Irina Kogan A
S. Feng, I. A. Kogan, H. Krim
Classification of curves in 2D and 3D via affine integral signatures
30 pages, 16 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a robust classification algorithm for curves in 2D and 3D, under the special and full groups of affine transformations. To each plane or spatial curve we assign a plane signature curve. Curves, equivalent under an affine transformation, have the same signature. The signatures introduced in this paper are based on integral invariants, which behave much better on noisy images than classically known differential invariants. The comparison with other types of invariants is given in the introduction. Though the integral invariants for planar curves were known before, the affine integral invariants for spatial curves are proposed here for the first time. Using the inductive variation of the moving frame method we compute affine invariants in terms of Euclidean invariants. We present two types of signatures, the global signature and the local signature. Both signatures are independent of parameterization (curve sampling). The global signature depends on the choice of the initial point and does not allow us to compare fragments of curves, and is therefore sensitive to occlusions. The local signature, although is slightly more sensitive to noise, is independent of the choice of the initial point and is not sensitive to occlusions in an image. It helps establish local equivalence of curves. The robustness of these invariants and signatures in their application to the problem of classification of noisy spatial curves extracted from a 3D object is analyzed.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 01:12:25 GMT" } ]
2008-06-13T00:00:00
[ [ "Feng", "S.", "" ], [ "Kogan", "I. A.", "" ], [ "Krim", "H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0806.2006
Arnaud Martin
Arnaud Martin (E3I2)
Fusion de classifieurs pour la classification d'images sonar
null
Revue Nationale des Technologies de l'Information E, 5 (2005) 259-268
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present some high level information fusion approaches for numeric and symbolic data. We study the interest of such method particularly for classifier fusion. A comparative study is made in a context of sea bed characterization from sonar images. The classi- fication of kind of sediment is a difficult problem because of the data complexity. We compare high level information fusion and give the obtained performance.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 06:42:07 GMT" }, { "version": "v2", "created": "Fri, 6 Jan 2012 20:39:14 GMT" } ]
2012-01-09T00:00:00
[ [ "Martin", "Arnaud", "", "E3I2" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.2007
Arnaud Martin
Arnaud Martin (E3I2), Christophe Osswald (E3I2)
Experts Fusion and Multilayer Perceptron Based on Belief Learning for Sonar Image Classification
International Conference on Information & Communication Technologies: from Theory to Applications (ICTTA), Damascus : Syrie (2008)
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sonar images provide a rapid view of the seabed in order to characterize it. However, in such as uncertain environment, real seabed is unknown and the only information we can obtain, is the interpretation of different human experts, sometimes in conflict. In this paper, we propose to manage this conflict in order to provide a robust reality for the learning step of classification algorithms. The classification is conducted by a multilayer perceptron, taking into account the uncertainty of the reality in the learning stage. The results of this seabed characterization are presented on real sonar images.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 06:44:55 GMT" } ]
2008-12-18T00:00:00
[ [ "Martin", "Arnaud", "", "E3I2" ], [ "Osswald", "Christophe", "", "E3I2" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.2008
Arnaud Martin
Arnaud Martin (E3I2), Christophe Osswald (E3I2)
Generalized proportional conflict redistribution rule applied to Sonar imagery and Radar targets classification
null
Advances and Applications of DSmT for Information Fusion, Florentin Smarandache & Jean Dezert (Ed.) (2006) 289-304
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this chapter, we present two applications in information fusion in order to evaluate the generalized proportional conflict redistribution rule presented in the chapter \cite{Martin06a}. Most of the time the combination rules are evaluated only on simple examples. We study here different combination rules and compare them in terms of decision on real data. Indeed, in real applications, we need a reliable decision and it is the final results that matter. Two applications are presented here: a fusion of human experts opinions on the kind of underwater sediments depict on sonar image and a classifier fusion for radar targets recognition.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 06:47:26 GMT" } ]
2008-12-18T00:00:00
[ [ "Martin", "Arnaud", "", "E3I2" ], [ "Osswald", "Christophe", "", "E3I2" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.2035
Francesc Rossell\'o
Gabriel Cardona, Merce Llabres, Francesc Rossello, Gabriel Valiente
Nodal distances for rooted phylogenetic trees
26 pages, Supplementary Material available at http://bioinfo.uib.es/~recerca/phylotrees/nodal/
null
null
null
q-bio.PE cs.CE cs.DM
http://creativecommons.org/licenses/by-nc-sa/3.0/
Dissimilarity measures for (possibly weighted) phylogenetic trees based on the comparison of their vectors of path lengths between pairs of taxa, have been present in the systematics literature since the early seventies. But, as far as rooted phylogenetic trees goes, these vectors can only separate non-weighted binary trees, and therefore these dissimilarity measures are metrics only on this class. In this paper we overcome this problem, by splitting in a suitable way each path length between two taxa into two lengths. We prove that the resulting splitted path lengths matrices single out arbitrary rooted phylogenetic trees with nested taxa and arcs weighted in the set of positive real numbers. This allows the definition of metrics on this general class by comparing these matrices by means of metrics in spaces of real-valued $n\times n$ matrices. We conclude this paper by establishing some basic facts about the metrics for non-weighted phylogenetic trees defined in this way using $L^p$ metrics on these spaces of matrices.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 10:17:02 GMT" } ]
2008-07-06T00:00:00
[ [ "Cardona", "Gabriel", "" ], [ "Llabres", "Merce", "" ], [ "Rossello", "Francesc", "" ], [ "Valiente", "Gabriel", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0806.2068
Fran\c{c}ois Nicolas
Francois Nicolas
A simple, polynomial-time algorithm for the matrix torsion problem
6 pages. Not intended to be submitted
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Matrix Torsion Problem (MTP) is: given a square matrix M with rational entries, decide whether two distinct powers of M are equal. It has been shown by Cassaigne and the author that the MTP reduces to the Matrix Power Problem (MPP) in polynomial time: given two square matrices A and B with rational entries, the MTP is to decide whether B is a power of A. Since the MPP is decidable in polynomial time, it is also the case of the MTP. However, the algorithm for MPP is highly non-trivial. The aim of this note is to present a simple, direct, polynomial-time algorithm for the MTP.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 13:24:46 GMT" }, { "version": "v2", "created": "Tue, 8 Jul 2008 23:51:08 GMT" }, { "version": "v3", "created": "Tue, 8 Sep 2009 19:46:11 GMT" } ]
2009-09-08T00:00:00
[ [ "Nicolas", "Francois", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0806.2084
Antonio G. Garc\'ia
A. G. Garcia, M. A. Hernandez-Medina, and G. Perez-Villalon
On the existence of compactly supported reconstruction functions in a sampling problem
24 pages
null
null
null
cs.IT math.FA math.IT math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Assume that samples of a filtered version of a function in a shift-invariant space are avalaible. This work deals with the existence of a sampling formula involving these samples and having reconstruction functions with compact support. Thus, low computational complexity is involved and truncation errors are avoided. This is done in the light of the generalized sampling theory by using the oversampling technique: more samples than strictly necessary are used. For a suitable choice of the sampling period, a necessary and sufficient condition is given in terms of the Kronecker canonical form of a matrix pencil. Comparing with other characterizations in the mathematical literature, the given here has an important advantage: it can be reliable computed by using the GUPTRI form of the matrix pencil. Finally, a practical method for computing the compactly supported reconstruction functions is given for the important case where the oversampling rate is minimum.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 14:23:20 GMT" } ]
2008-06-13T00:00:00
[ [ "Garcia", "A. G.", "" ], [ "Hernandez-Medina", "M. A.", "" ], [ "Perez-Villalon", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
0806.2090
Ralf Osbild
Domagoj Matijevi\'c and Ralf Osbild
Finding the theta-Guarded Region
21 pages, 13 figures; revised version with new results
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are given a finite set of n points (guards) G in the plane R^2 and an angle 0 < theta < 2 pi. A theta-cone is a cone with apex angle theta. We call a theta-cone empty (with respect to G) if it does not contain any point of G. A point p in R^2 is called theta-guarded if every theta-cone with its apex located at p is non-empty. Furthermore, the set of all theta-guarded points is called the theta-guarded region, or the theta-region for short. We present several results on this topic. The main contribution of our work is to describe the theta-region with O(n/theta) circular arcs, and we give an algorithm to compute it. We prove a tight O(n) worst-case bound on the complexity of the theta-region for theta >= pi/2. In case theta is bounded from below by a positive constant, we prove an almost linear bound O(n^(1+epsilon)) for any epsilon > 0 on the complexity. Moreover, we show that there is a sequence of inputs such that the asymptotic bound on the complexity of their theta-region is Omega(n^2). In addition we point out gaps in the proofs of a recent publication that claims an O(n) bound on the complexity for any constant angle theta.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 14:42:48 GMT" }, { "version": "v2", "created": "Thu, 11 Sep 2008 09:21:23 GMT" } ]
2008-09-11T00:00:00
[ [ "Matijević", "Domagoj", "" ], [ "Osbild", "Ralf", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0806.2096
Vadim E. Levit
Yulia Kempner and Vadim E. Levit
Geometry of antimatroidal point sets
14 pages, 3 figures
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notion of "antimatroid with repetition" was conceived by Bjorner, Lovasz and Shor in 1991 as a multiset extension of the notion of antimatroid. When the underlying set consists of only two elements, such two-dimensional antimatroids correspond to point sets in the plane. In this research we concentrate on geometrical properties of antimatroidal point sets in the plane and prove that these sets are exactly parallelogram polyominoes. Our results imply that two-dimensional antimatroids have convex dimension 2. The second part of the research is devoted to geometrical properties of three-dimensional antimatroids closed under intersection.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 15:24:30 GMT" } ]
2011-01-25T00:00:00
[ [ "Kempner", "Yulia", "" ], [ "Levit", "Vadim E.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0806.2139
Joseph Y. Halpern
Joseph Y. Halpern
Beyond Nash Equilibrium: Solution Concepts for the 21st Century
null
null
null
null
cs.GT cs.AI cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nash equilibrium is the most commonly-used notion of equilibrium in game theory. However, it suffers from numerous problems. Some are well known in the game theory community; for example, the Nash equilibrium of repeated prisoner's dilemma is neither normatively nor descriptively reasonable. However, new problems arise when considering Nash equilibrium from a computer science perspective: for example, Nash equilibrium is not robust (it does not tolerate ``faulty'' or ``unexpected'' behavior), it does not deal with coalitions, it does not take computation cost into account, and it does not deal with cases where players are not aware of all aspects of the game. Solution concepts that try to address these shortcomings of Nash equilibrium are discussed.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 19:23:07 GMT" } ]
2008-12-18T00:00:00
[ [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0806.2140
Joseph Y. Halpern
Joseph Y. Halpern
Defaults and Normality in Causal Structures
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A serious defect with the Halpern-Pearl (HP) definition of causality is repaired by combining a theory of causality with a theory of defaults. In addition, it is shown that (despite a claim to the contrary) a cause according to the HP condition need not be a single conjunct. A definition of causality motivated by Wright's NESS test is shown to always hold for a single conjunct. Moreover, conditions that hold for all the examples considered by HP are given that guarantee that causality according to (this version) of the NESS test is equivalent to the HP definition.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 19:27:57 GMT" } ]
2008-12-18T00:00:00
[ [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0806.2159
Julien Langou
James Demmel, Laura Grigori, Mark Hoemmen, and Julien Langou
Communication-optimal parallel and sequential QR and LU factorizations: theory and practice
null
null
null
LAPACK Working Note 204
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present parallel and sequential dense QR factorization algorithms that are both optimal (up to polylogarithmic factors) in the amount of communication they perform, and just as stable as Householder QR. Our first algorithm, Tall Skinny QR (TSQR), factors m-by-n matrices in a one-dimensional (1-D) block cyclic row layout, and is optimized for m >> n. Our second algorithm, CAQR (Communication-Avoiding QR), factors general rectangular matrices distributed in a two-dimensional block cyclic layout. It invokes TSQR for each block column factorization.
[ { "version": "v1", "created": "Thu, 12 Jun 2008 21:05:37 GMT" }, { "version": "v2", "created": "Mon, 4 Aug 2008 21:50:32 GMT" }, { "version": "v3", "created": "Fri, 29 Aug 2008 20:55:59 GMT" } ]
2008-08-29T00:00:00
[ [ "Demmel", "James", "" ], [ "Grigori", "Laura", "" ], [ "Hoemmen", "Mark", "" ], [ "Langou", "Julien", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0806.2198
Alberto Perotti
Alberto Perotti, Alberto Tarable, Sergio Benedetto and Guido Montorsi
Capacity-achieving CPM schemes
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2010.2040861
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The so obtained schemes are cascaded with an outer serially-concatenated convolutional code to form a pragmatic coded-modulation system. The resulting schemes exhibit performance very close to the CPM capacity without requiring iterations between the outer decoder and the CPM demodulator. As a result, the receiver exhibits reduced complexity and increased flexibility due to the separation of the demodulation and decoding functions.
[ { "version": "v1", "created": "Fri, 13 Jun 2008 07:40:35 GMT" } ]
2016-11-17T00:00:00
[ [ "Perotti", "Alberto", "" ], [ "Tarable", "Alberto", "" ], [ "Benedetto", "Sergio", "" ], [ "Montorsi", "Guido", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.2216
Tshilidzi Marwala
Vukosi N. Marivate, George Ssali and Tshilidzi Marwala
An Intelligent Multi-Agent Recommender System for Human Capacity Building
Proceedings of the 14th IEEE Mediterranean Electrotechnical Conference, 2008, pages 909 to 915
null
10.1109/MELCON.2008.4618553
null
cs.AI cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a Multi-Agent approach to the problem of recommending training courses to engineering professionals. The recommendation system is built as a proof of concept and limited to the electrical and mechanical engineering disciplines. Through user modelling and data collection from a survey, collaborative filtering recommendation is implemented using intelligent agents. The agents work together in recommending meaningful training courses and updating the course information. The system uses a users profile and keywords from courses to rank courses. A ranking accuracy for courses of 90% is achieved while flexibility is achieved using an agent that retrieves information autonomously using data mining techniques from websites. This manner of recommendation is scalable and adaptable. Further improvements can be made using clustering and recording user feedback.
[ { "version": "v1", "created": "Fri, 13 Jun 2008 09:56:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Marivate", "Vukosi N.", "" ], [ "Ssali", "George", "" ], [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0806.2264
Chantal Berline
Chantal Berline (PPS), Giulio Manzonetto (PPS), Antonio Salibra
Effective lambda-models vs recursively enumerable lambda-theories
34 p
null
null
null
math.LO cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A longstanding open problem is whether there exists a non syntactical model of the untyped lambda-calculus whose theory is exactly the least lambda-theory (l-beta). In this paper we investigate the more general question of whether the equational/order theory of a model of the (untyped) lambda-calculus can be recursively enumerable (r.e. for brevity). We introduce a notion of effective model of lambda-calculus calculus, which covers in particular all the models individually introduced in the literature. We prove that the order theory of an effective model is never r.e.; from this it follows that its equational theory cannot be l-beta or l-beta-eta. We then show that no effective model living in the stable or strongly stable semantics has an r.e. equational theory. Concerning Scott's semantics, we investigate the class of graph models and prove that no order theory of a graph model can be r.e., and that there exists an effective graph model whose equational/order theory is minimum among all theories of graph models. Finally, we show that the class of graph models enjoys a kind of downwards Lowenheim-Skolem theorem.
[ { "version": "v1", "created": "Fri, 13 Jun 2008 15:02:03 GMT" } ]
2008-12-18T00:00:00
[ [ "Berline", "Chantal", "", "PPS" ], [ "Manzonetto", "Giulio", "", "PPS" ], [ "Salibra", "Antonio", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.2274
Marko A. Rodriguez
Marko A. Rodriguez, Joshua Shinavier
Exposing Multi-Relational Networks to Single-Relational Network Analysis Algorithms
ISSN:1751-1577
Journal of Informetrics, volume 4, number 1, pages 29-41, 2009
10.1016/j.joi.2009.06.004
LA-UR-08-03931
cs.DM cs.DS
http://creativecommons.org/licenses/publicdomain/
Many, if not most network analysis algorithms have been designed specifically for single-relational networks; that is, networks in which all edges are of the same type. For example, edges may either represent "friendship," "kinship," or "collaboration," but not all of them together. In contrast, a multi-relational network is a network with a heterogeneous set of edge labels which can represent relationships of various types in a single data structure. While multi-relational networks are more expressive in terms of the variety of relationships they can capture, there is a need for a general framework for transferring the many single-relational network analysis algorithms to the multi-relational domain. It is not sufficient to execute a single-relational network analysis algorithm on a multi-relational network by simply ignoring edge labels. This article presents an algebra for mapping multi-relational networks to single-relational networks, thereby exposing them to single-relational network analysis algorithms.
[ { "version": "v1", "created": "Fri, 13 Jun 2008 16:07:19 GMT" }, { "version": "v2", "created": "Wed, 9 Dec 2009 16:08:02 GMT" } ]
2009-12-09T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Shinavier", "Joshua", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0806.2287
Shiva Kasiviswanathan
Martin Furer and Shiva Prasad Kasiviswanathan
Approximately Counting Embeddings into Random Graphs
Earlier version appeared in Random 2008. Fixed an typo in Definition 3.1
Combinator. Probab. Comp. 23 (2014) 1028-1056
10.1017/S0963548314000339
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let H be a graph, and let C_H(G) be the number of (subgraph isomorphic) copies of H contained in a graph G. We investigate the fundamental problem of estimating C_H(G). Previous results cover only a few specific instances of this general problem, for example, the case when H has degree at most one (monomer-dimer problem). In this paper, we present the first general subcase of the subgraph isomorphism counting problem which is almost always efficiently approximable. The results rely on a new graph decomposition technique. Informally, the decomposition is a labeling of the vertices such that every edge is between vertices with different labels and for every vertex all neighbors with a higher label have identical labels. The labeling implicitly generates a sequence of bipartite graphs which permits us to break the problem of counting embeddings of large subgraphs into that of counting embeddings of small subgraphs. Using this method, we present a simple randomized algorithm for the counting problem. For all decomposable graphs H and all graphs G, the algorithm is an unbiased estimator. Furthermore, for all graphs H having a decomposition where each of the bipartite graphs generated is small and almost all graphs G, the algorithm is a fully polynomial randomized approximation scheme. We show that the graph classes of H for which we obtain a fully polynomial randomized approximation scheme for almost all G includes graphs of degree at most two, bounded-degree forests, bounded-length grid graphs, subdivision of bounded-degree graphs, and major subclasses of outerplanar graphs, series-parallel graphs and planar graphs, whereas unbounded-length grid graphs are excluded.
[ { "version": "v1", "created": "Fri, 13 Jun 2008 17:06:01 GMT" }, { "version": "v2", "created": "Fri, 21 Jun 2013 18:40:00 GMT" } ]
2019-02-20T00:00:00
[ [ "Furer", "Martin", "" ], [ "Kasiviswanathan", "Shiva Prasad", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0806.2312
Balint Joo
Balint Joo (for the USQCD Collaboration)
Continuing Progress on a Lattice QCD Software Infrastructure
5 Pages, to appear in the Proceedings of SciDAC 2008 conference, (Seattle, July 13-17, 2008), Conference Poster Presentation Proceedings
J.Phys.Conf.Ser.125:012066,2008
10.1088/1742-6596/125/1/012066
JLAB-IT-08-02
hep-lat cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report on the progress of the software effort in the QCD Application Area of SciDAC. In particular, we discuss how the software developed under SciDAC enabled the aggressive exploitation of leadership computers, and we report on progress in the area of QCD software for multi-core architectures.
[ { "version": "v1", "created": "Fri, 13 Jun 2008 19:22:00 GMT" } ]
2019-08-13T00:00:00
[ [ "Joo", "Balint", "", "for the USQCD Collaboration" ] ]
[ { "class": "Physics", "code": "hep-lat", "description": "Lattice field theory. Phenomenology from lattice field theory. Algorithms for lattice field theory. Hardware for lattice field theory.", "span": "(High Energy Physics - Lattice)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0806.2332
Anil Hirani
Evan VanderZee, Anil N. Hirani, Damrong Guoy
Triangulation of Simple 3D Shapes with Well-Centered Tetrahedra
Accepted at the conference "17th International Meshing Roundtable", Pittsburgh, Pennsylvania, October 12-15, 2008. Will appear in proceedings of the conference, published by Springer. For this version, we fixed some typos
null
null
UIUCDCS-R-2008-2970
cs.CG cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A completely well-centered tetrahedral mesh is a triangulation of a three dimensional domain in which every tetrahedron and every triangle contains its circumcenter in its interior. Such meshes have applications in scientific computing and other fields. We show how to triangulate simple domains using completely well-centered tetrahedra. The domains we consider here are space, infinite slab, infinite rectangular prism, cube and regular tetrahedron. We also demonstrate single tetrahedra with various combinations of the properties of dihedral acuteness, 2-well-centeredness and 3-well-centeredness.
[ { "version": "v1", "created": "Fri, 13 Jun 2008 20:54:14 GMT" }, { "version": "v2", "created": "Tue, 5 Aug 2008 22:13:35 GMT" } ]
2008-08-06T00:00:00
[ [ "VanderZee", "Evan", "" ], [ "Hirani", "Anil N.", "" ], [ "Guoy", "Damrong", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0806.2351
Tao Zhou
Li Wang, Chen-Ping Zhu, Zhi-Ming Gu, Shi-Jie Xiong, Da-Ren He, and Bing-Hong Wang
Scaling of critical connectivity of mobile ad hoc communication networks
6 pages, 6 figures
null
10.1103/PhysRevE.78.066107
null
cs.NI cond-mat.dis-nn physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, critical global connectivity of mobile ad hoc communication networks (MAHCN) is investigated. We model the two-dimensional plane on which nodes move randomly with a triangular lattice. Demanding the best communication of the network, we account the global connectivity $\eta$ as a function of occupancy $\sigma$ of sites in the lattice by mobile nodes. Critical phenomena of the connectivity for different transmission ranges $r$ are revealed by numerical simulations, and these results fit well to the analysis based on the assumption of homogeneous mixing . Scaling behavior of the connectivity is found as $\eta \sim f(R^{\beta}\sigma)$, where $R=(r-r_{0})/r_{0}$, $r_{0}$ is the length unit of the triangular lattice and $\beta$ is the scaling index in the universal function $f(x)$. The model serves as a sort of site percolation on dynamic complex networks relative to geometric distance. Moreover, near each critical $\sigma_c(r)$ corresponding to certain transmission range $r$, there exists a cut-off degree $k_c$ below which the clustering coefficient of such self-organized networks keeps a constant while the averaged nearest neighbor degree exhibits a unique linear variation with the degree k, which may be useful to the designation of real MAHCN.
[ { "version": "v1", "created": "Fri, 13 Jun 2008 23:50:51 GMT" } ]
2009-11-13T00:00:00
[ [ "Wang", "Li", "" ], [ "Zhu", "Chen-Ping", "" ], [ "Gu", "Zhi-Ming", "" ], [ "Xiong", "Shi-Jie", "" ], [ "He", "Da-Ren", "" ], [ "Wang", "Bing-Hong", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0806.2356
\^Hamed \"Owladeghaffari
Hamed Owladeghaffari
Development of Hybrid Intelligent Systems and their Applications from Engineering Systems to Complex Systems
A Brief Report for 10th Young Khwarizmi Award
null
null
null
cs.AI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this study, we introduce general frame of MAny Connected Intelligent Particles Systems (MACIPS). Connections and interconnections between particles get a complex behavior of such merely simple system (system in system).Contribution of natural computing, under information granulation theory, are the main topic of this spacious skeleton. Upon this clue, we organize different algorithms involved a few prominent intelligent computing and approximate reasoning methods such as self organizing feature map (SOM)[9], Neuro- Fuzzy Inference System[10], Rough Set Theory (RST)[11], collaborative clustering, Genetic Algorithm and Ant Colony System. Upon this, we have employed our algorithms on the several engineering systems, especially emerged systems in Civil and Mineral processing. In other process, we investigated how our algorithms can be taken as a linkage of government-society interaction, where government catches various fashions of behavior: solid (absolute) or flexible. So, transition of such society, by changing of connectivity parameters (noise) from order to disorder is inferred. Add to this, one may find an indirect mapping among finical systems and eventual market fluctuations with MACIPS. In the following sections, we will mention the main topics of the suggested proposal, briefly Details of the proposed algorithms can be found in the references.
[ { "version": "v1", "created": "Sat, 14 Jun 2008 03:44:35 GMT" } ]
2008-06-17T00:00:00
[ [ "Owladeghaffari", "Hamed", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0806.2360
Alexey Tarasov S
Alexey S Tarasov
Existence of a polyhedron which does not have a non-overlapping pseudo-edge unfolding
24 pages, 20 figuers, minor grammatical changes
null
null
null
cs.CG
http://creativecommons.org/licenses/by/3.0/
There exists a surface of a convex polyhedron P and a partition L of P into geodesic convex polygons such that there are no connected "edge" unfoldings of P without self-intersections (whose spanning tree is a subset of the edge skeleton of L).
[ { "version": "v1", "created": "Sat, 14 Jun 2008 06:57:50 GMT" }, { "version": "v2", "created": "Thu, 25 Sep 2008 14:01:57 GMT" }, { "version": "v3", "created": "Mon, 6 Oct 2008 10:48:45 GMT" } ]
2008-10-06T00:00:00
[ [ "Tarasov", "Alexey S", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0806.2395
Hasan Guclu
Hasan Guclu, Durgesh Kumari, and Murat Yuksel
Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks
10 pages, 6 figures, 43 references. Proceedings of The 8th IEEE International Conference on Peer-to-Peer Computing 2008 (IEEE P2P 2008), Aachen, Germany
null
10.1109/P2P.2008.16
LA-UR 08-3219
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several protocol efficiency metrics (e.g., scalability, search success rate, routing reachability and stability) depend on the capability of preserving structure even over the churn caused by the ad-hoc nodes joining or leaving the network. Preserving the structure becomes more prohibitive due to the distributed and potentially uncooperative nature of such networks, as in the peer-to-peer (P2P) networks. Thus, most practical solutions involve unstructured approaches while attempting to maintain the structure at various levels of protocol stack. The primary focus of this paper is to investigate construction and maintenance of scale-free topologies in a distributed manner without requiring global topology information at the time when nodes join or leave. We consider the uncooperative behavior of peers by limiting the number of neighbors to a pre-defined hard cutoff value (i.e., no peer is a major hub), and the ad-hoc behavior of peers by rewiring the neighbors of nodes leaving the network. We also investigate the effect of these hard cutoffs and rewiring of ad-hoc nodes on the P2P search efficiency.
[ { "version": "v1", "created": "Sat, 14 Jun 2008 19:01:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Guclu", "Hasan", "" ], [ "Kumari", "Durgesh", "" ], [ "Yuksel", "Murat", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0806.2448
Nobuko Yoshida Dr
Nobuko Yoshida, Kohei Honda and Martin Berger
Logical Reasoning for Higher-Order Functions with Local State
68 pages
Logical Methods in Computer Science, Volume 4, Issue 4 (October 20, 2008) lmcs:830
10.2168/LMCS-4(4:2)2008
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce an extension of Hoare logic for call-by-value higher-order functions with ML-like local reference generation. Local references may be generated dynamically and exported outside their scope, may store higher-order functions and may be used to construct complex mutable data structures. This primitive is captured logically using a predicate asserting reachability of a reference name from a possibly higher-order datum and quantifiers over hidden references. We explore the logic's descriptive and reasoning power with non-trivial programming examples combining higher-order procedures and dynamically generated local state. Axioms for reachability and local invariant play a central role for reasoning about the examples.
[ { "version": "v1", "created": "Sun, 15 Jun 2008 14:43:25 GMT" }, { "version": "v2", "created": "Mon, 20 Oct 2008 08:47:19 GMT" } ]
2015-07-01T00:00:00
[ [ "Yoshida", "Nobuko", "" ], [ "Honda", "Kohei", "" ], [ "Berger", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0806.2469
Pablo A. Parrilo
Parikshit Shah and Pablo A. Parrilo
Polynomial stochastic games via sum of squares optimization
28 pages, 2 figures
null
null
null
math.OC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stochastic games are an important class of problems that generalize Markov decision processes to game theoretic scenarios. We consider finite state two-player zero-sum stochastic games over an infinite time horizon with discounted rewards. The players are assumed to have infinite strategy spaces and the payoffs are assumed to be polynomials. In this paper we restrict our attention to a special class of games for which the single-controller assumption holds. It is shown that minimax equilibria and optimal strategies for such games may be obtained via semidefinite programming.
[ { "version": "v1", "created": "Sun, 15 Jun 2008 19:46:58 GMT" } ]
2008-06-17T00:00:00
[ [ "Shah", "Parikshit", "" ], [ "Parrilo", "Pablo A.", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0806.2509
Adrien Van Den Bossche
Adrien Van Den Bossche (LATTIS), Thierry Val (LATTIS), Eric Campo (LATTIS)
Proposition of a full deterministic medium access method for wireless network in a robotic application
null
2006 IEEE 63rd Vehicular Technology Conference, Melbourne : Australie (2006)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today, many network applications require shorter react time. Robotic field is an excellent example of these needs: robot react time has a direct effect on its task's complexity. Here, we propose a full deterministic medium access method for a wireless robotic application. This contribution is based on some low-power wireless personal area networks, like ZigBee standard. Indeed, ZigBee has identified limits with Quality of Service due to non-determinist medium access and probable collisions during medium reservation requests. In this paper, two major improvements are proposed: an efficient polling of the star nodes and a temporal deterministic distribution of peer-to-peer messages. This new MAC protocol with no collision offers some QoS faculties.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 07:18:33 GMT" } ]
2008-12-18T00:00:00
[ [ "Bossche", "Adrien Van Den", "", "LATTIS" ], [ "Val", "Thierry", "", "LATTIS" ], [ "Campo", "Eric", "", "LATTIS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.2513
Olli Pottonen
Patric R. J. \"Osterg{\aa}rd and Olli Pottonen
The Perfect Binary One-Error-Correcting Codes of Length 15: Part I--Classification
6 pages. v3: made the codes available in the source of this paper
IEEE Trans. Inform. Theory 55 (2009), 4657-4660
10.1109/TIT.2009.2027525
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A complete classification of the perfect binary one-error-correcting codes of length 15 as well as their extensions of length 16 is presented. There are 5983 such inequivalent perfect codes and 2165 extended perfect codes. Efficient generation of these codes relies on the recent classification of Steiner quadruple systems of order 16. Utilizing a result of Blackmore, the optimal binary one-error-correcting codes of length 14 and the (15, 1024, 4) codes are also classified; there are 38408 and 5983 such codes, respectively.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 07:58:28 GMT" }, { "version": "v2", "created": "Mon, 22 Jun 2009 10:20:09 GMT" }, { "version": "v3", "created": "Wed, 30 Dec 2009 18:56:05 GMT" } ]
2015-03-13T00:00:00
[ [ "Östergård", "Patric R. J.", "" ], [ "Pottonen", "Olli", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.2517
Frederic Blanqui
Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA), Jean-Pierre Jouannaud (LIX, INRIA Saclay Ile de France), Albert Rubio
The computability path ordering: the end of a quest
Dans CSL'08 (2008)
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we first briefly survey automated termination proof methods for higher-order calculi. We then concentrate on the higher-order recursive path ordering, for which we provide an improved definition, the Computability Path Ordering. This new definition appears indeed to capture the essence of computability arguments \`a la Tait and Girard, therefore explaining the name of the improved ordering.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 11:39:25 GMT" } ]
2008-12-18T00:00:00
[ [ "Blanqui", "Frédéric", "", "INRIA Lorraine - LORIA" ], [ "Jouannaud", "Jean-Pierre", "", "LIX, INRIA Saclay Ile de France" ], [ "Rubio", "Albert", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.2533
Ananthanarayanan Chockalingam
Saif K. Mohammed, A. Chockalingam, and B. Sundar Rajan
Asymptotic Analysis of the Performance of LAS Algorithm for Large-MIMO Detection
This work in part was presented in IEEE PIMRC'2008, Cannes, France, September 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In our recent work, we reported an exhaustive study on the simulated bit error rate (BER) performance of a low-complexity likelihood ascent search (LAS) algorithm for detection in large multiple-input multiple-output (MIMO) systems with large number of antennas that achieve high spectral efficiencies. Though the algorithm was shown to achieve increasingly closer to near maximum-likelihood (ML) performance through simulations, no BER analysis was reported. Here, we extend our work on LAS and report an asymptotic BER analysis of the LAS algorithm in the large system limit, where $N_t,N_r \to \infty$ with $N_t=N_r$, where $N_t$ and $N_r$ are the number of transmit and receive antennas. We prove that the error performance of the LAS detector in V-BLAST with 4-QAM in i.i.d. Rayleigh fading converges to that of the ML detector as $N_t,N_r \to \infty$.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 13:14:37 GMT" }, { "version": "v2", "created": "Sat, 31 Oct 2009 08:03:16 GMT" } ]
2009-10-31T00:00:00
[ [ "Mohammed", "Saif K.", "" ], [ "Chockalingam", "A.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.2548
Frederic Goualard
Fr\'ed\'eric Goualard (LINA), Alexandre Goldsztejn (LINA)
A Data-Parallel Algorithm to Reliably Solve Systems of Nonlinear Equations
10 pages
null
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Numerical methods based on interval arithmetic are efficient means to reliably solve nonlinear systems of equations. Algorithm bc3revise is an interval method that tightens variables' domains by enforcing a property called box consistency. It has been successfully used on difficult problems whose solving eluded traditional numerical methods. We present a new algorithm to enforce box consistency that is simpler than bc3revise, faster, and easily data parallelizable. A parallel implementation with Intel SSE2 SIMD instructions shows that an increase in performance of up to an order of magnitude and more is achievable.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 11:40:07 GMT" } ]
2008-12-18T00:00:00
[ [ "Goualard", "Frédéric", "", "LINA" ], [ "Goldsztejn", "Alexandre", "", "LINA" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0806.2549
Adrien Van Den Bossche
Adrien Van Den Bossche (LATTIS), Thierry Val (LATTIS), Eric Campo (LATTIS)
Prototyping and Performance Analysis of a QoS MAC Layer for Industrial Wireless Network
7th IFAC International Conference on. Fieldbuses and nETworks in industrial and embedded systems, Toulouse : France (2007)
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today's industrial sensor networks require strong reliability and guarantees on messages delivery. These needs are even more important in real time applications like control/command, such as robotic wireless communications where strong temporal constraints are critical. For these reasons, classical random-based Medium Access Control (MAC) protocols present a non-null frame collision probability. In this paper we present an original full deterministic MAC-layer for industrial wireless network and its performance evaluation thanks to the development of a material prototype.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 11:40:57 GMT" } ]
2008-12-18T00:00:00
[ [ "Bossche", "Adrien Van Den", "", "LATTIS" ], [ "Val", "Thierry", "", "LATTIS" ], [ "Campo", "Eric", "", "LATTIS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.2550
Adrien Van Den Bossche
Adrien Van Den Bossche (LATTIS), Thierry Val (LATTIS), Eric Campo (LATTIS)
Proposition and validation of an original MAC layer with simultaneous medium accesses for low latency wireless control/command applications
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Control/command processes require a transmission system with some characteristics like high reliability, low latency and strong guarantees on messages delivery. Concerning wire networks, field buses technologies like FIP offer this kind of service (periodic tasks, real time constraints...). Unfortunately, few wireless technologies can propose a communication system which respects such constraints. Indeed, wireless transmissions must deal with medium characteristics which make impossible the direct translation of mechanisms used with wire networks. The purpose of this paper is to present an original Medium Access Control (MAC) layer for a real time Low Power-Wireless Personal Area Network (LP-WPAN). The proposed MAC-layer has been validated by several complementary methods; in this paper, we focus on the specific Simultaneous Guaranteed Time Slot (SGTS) part.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 11:41:59 GMT" } ]
2008-12-18T00:00:00
[ [ "Bossche", "Adrien Van Den", "", "LATTIS" ], [ "Val", "Thierry", "", "LATTIS" ], [ "Campo", "Eric", "", "LATTIS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.2555
Lane A. Hemaspaandra
Gabor Erdelyi, Lane A. Hemaspaandra, Joerg Rothe, Holger Spakowski
Frequency of Correctness versus Average-Case Polynomial Time and Generalized Juntas
null
null
null
URCS-TR-2008-934
cs.CC cs.GT cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that every distributional problem solvable in polynomial time on the average with respect to the uniform distribution has a frequently self-knowingly correct polynomial-time algorithm. We also study some features of probability weight of correctness with respect to generalizations of Procaccia and Rosenschein's junta distributions [PR07b].
[ { "version": "v1", "created": "Mon, 16 Jun 2008 12:03:37 GMT" } ]
2008-06-17T00:00:00
[ [ "Erdelyi", "Gabor", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ], [ "Spakowski", "Holger", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0806.2581
Doina Tatar
Doina Tatar, Gabriela Serban, Andreea Mihis, Mihaiela Lupea, Dana Lupsa and Militon Frentiu
A chain dictionary method for Word Sense Disambiguation and applications
8 pages, 5 figures
Studia Universitatis Babes-Bolyai, Special Issue, KEPT 2007, Knowledge Engineering: Principles and Technologies, Cluj-Napoca, June 6-8, 2007, pp 33-40,
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A large class of unsupervised algorithms for Word Sense Disambiguation (WSD) is that of dictionary-based methods. Various algorithms have as the root Lesk's algorithm, which exploits the sense definitions in the dictionary directly. Our approach uses the lexical base WordNet for a new algorithm originated in Lesk's, namely "chain algorithm for disambiguation of all words", CHAD. We show how translation from a language into another one and also text entailment verification could be accomplished by this disambiguation.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 13:48:55 GMT" } ]
2008-12-18T00:00:00
[ [ "Tatar", "Doina", "" ], [ "Serban", "Gabriela", "" ], [ "Mihis", "Andreea", "" ], [ "Lupea", "Mihaiela", "" ], [ "Lupsa", "Dana", "" ], [ "Frentiu", "Militon", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0806.2643
Yong Peng
Yong Peng and Dinesh Rajan
On the Capacity Equivalence with Side Information at Transmitter and Receiver
5 pages in IEEE 2 column format, submitted to IEEE Trans. Information Theory in June, 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a channel that is contaminated by two independent Gaussian noises $S ~ N(0,Q)$ and $Z_0 ~ N(0,N_0)$ is considered. The capacity of this channel is computed when independent noisy versions of $S$ are known to the transmitter and/or receiver. It is shown that the channel capacity is greater then the capacity when $S$ is completely unknown, but is less then the capacity when $S$ is perfectly known at the transmitter or receiver. For example, if there is one noisy version of $S$ known at the transmitter only, the capacity is $0.5\log(1+\frac{P}{Q(N_1/(Q+N_1))+N_0})$, where $P$ is the input power constraint and $N_1$ is the power of the noise corrupting $S$. Further, it is shown that the capacity with knowledge of any independent noisy versions of $S$ at the transmitter is equal to the capacity with knowledge of the statistically equivalent noisy versions of $S$ at the receiver.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 19:12:43 GMT" }, { "version": "v2", "created": "Wed, 18 Jun 2008 18:20:46 GMT" } ]
2008-06-18T00:00:00
[ [ "Peng", "Yong", "" ], [ "Rajan", "Dinesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.2674
Oren Somekh
Nathan Levy, Oren Somekh, Shlomo Shamai (Shitz), and Ofer Zeitouni
On Certain Large Random Hermitian Jacobi Matrices with Applications to Wireless Communications
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the spectrum of certain large random Hermitian Jacobi matrices. These matrices are known to describe certain communication setups. In particular we are interested in an uplink cellular channel which models mobile users experiencing a soft-handoff situation under joint multicell decoding. Considering rather general fading statistics we provide a closed form expression for the per-cell sum-rate of this channel in high-SNR, when an intra-cell TDMA protocol is employed. Since the matrices of interest are tridiagonal, their eigenvectors can be considered as sequences with second order linear recurrence. Therefore, the problem is reduced to the study of the exponential growth of products of two by two matrices. For the case where $K$ users are simultaneously active in each cell, we obtain a series of lower and upper bound on the high-SNR power offset of the per-cell sum-rate, which are considerably tighter than previously known bounds.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 21:03:36 GMT" } ]
2008-06-18T00:00:00
[ [ "Levy", "Nathan", "", "Shitz" ], [ "Somekh", "Oren", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ], [ "Zeitouni", "Ofer", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.2680
Joerg Endrullis
Joerg Endrullis, Clemens Grabmayer, Dimitri Hendriks
Data-Oblivious Stream Productivity
null
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are concerned with demonstrating productivity of specifications of infinite streams of data, based on orthogonal rewrite rules. In general, this property is undecidable, but for restricted formats computable sufficient conditions can be obtained. The usual analysis disregards the identity of data, thus leading to approaches that we call data-oblivious. We present a method that is provably optimal among all such data-oblivious approaches. This means that in order to improve on the algorithm in this paper one has to proceed in a data-aware fashion.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 22:02:56 GMT" }, { "version": "v2", "created": "Thu, 26 Jun 2008 16:06:16 GMT" }, { "version": "v3", "created": "Fri, 27 Jun 2008 14:18:25 GMT" }, { "version": "v4", "created": "Fri, 4 Jul 2008 15:05:51 GMT" }, { "version": "v5", "created": "Sat, 19 Jul 2008 22:45:16 GMT" } ]
2008-07-20T00:00:00
[ [ "Endrullis", "Joerg", "" ], [ "Grabmayer", "Clemens", "" ], [ "Hendriks", "Dimitri", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0806.2682
Wei Dai
Wei Dai and Olgica Milenkovic
Weighted Superimposed Codes and Constrained Integer Compressed Sensing
Submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new family of codes, termed weighted superimposed codes (WSCs). This family generalizes the class of Euclidean superimposed codes (ESCs), used in multiuser identification systems. WSCs allow for discriminating all bounded, integer-valued linear combinations of real-valued codewords that satisfy prescribed norm and non-negativity constraints. By design, WSCs are inherently noise tolerant. Therefore, these codes can be seen as special instances of robust compressed sensing schemes. The main results of the paper are lower and upper bounds on the largest achievable code rates of several classes of WSCs. These bounds suggest that with the codeword and weighting vector constraints at hand, one can improve the code rates achievable by standard compressive sensing.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 22:11:47 GMT" } ]
2008-12-18T00:00:00
[ [ "Dai", "Wei", "" ], [ "Milenkovic", "Olgica", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.2707
Pat Morin
Vida Dujmovic, John Howat, and Pat Morin
Biased Range Trees
null
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A data structure, called a biased range tree, is presented that preprocesses a set S of n points in R^2 and a query distribution D for 2-sided orthogonal range counting queries. The expected query time for this data structure, when queries are drawn according to D, matches, to within a constant factor, that of the optimal decision tree for S and D. The memory and preprocessing requirements of the data structure are O(n log n).
[ { "version": "v1", "created": "Tue, 17 Jun 2008 15:18:40 GMT" } ]
2008-06-18T00:00:00
[ [ "Dujmovic", "Vida", "" ], [ "Howat", "John", "" ], [ "Morin", "Pat", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0806.2710
Florian Huc
David Coudert (INRIA Sophia Antipolis / Laboratoire I3S), Florian Huc (INRIA Sophia Antipolis / Laboratoire I3S), Dorian Mazauric (INRIA Sophia Antipolis / Laboratoire I3S)
A distributed algorithm for computing and updating the process number of a forest
null
null
null
RR-6560
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a distributed algorithm to compute various parameters of a tree such as the process number, the edge search number or the node search number and so the pathwidth. This algorithm requires n steps, an overall computation time of O(n log(n)), and n messages of size log_3(n)+3. We then propose a distributed algorithm to update the process number (or the node search number, or the edge search number) of each component of a forest after adding or deleting an edge. This second algorithm requires O(D) steps, an overall computation time of O(D log(n)), and O(D) messages of size log_3(n)+3, where D is the diameter of the modified connected component. Finally, we show how to extend our algorithms to trees and forests of unknown size using messages of less than 2a+4+e bits, where a is the parameter to be determined and e=1 for updates algorithms.
[ { "version": "v1", "created": "Tue, 17 Jun 2008 07:06:20 GMT" }, { "version": "v2", "created": "Wed, 18 Jun 2008 07:50:55 GMT" }, { "version": "v3", "created": "Fri, 27 Jun 2008 18:57:52 GMT" } ]
2008-12-18T00:00:00
[ [ "Coudert", "David", "", "INRIA Sophia Antipolis / Laboratoire I3S" ], [ "Huc", "Florian", "", "INRIA Sophia Antipolis / Laboratoire I3S" ], [ "Mazauric", "Dorian", "", "INRIA Sophia\n Antipolis / Laboratoire I3S" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0806.2726
Matthias Hesse
Matthias Hesse (I3S), Jerome Lebrun (I3S), Luc Deneire (I3S)
L2 Orthogonal Space Time Code for Continuous Phase Modulation
null
Dans 9th IEEE International Workshop on Signal Processing Advances in Wireless Communications (2008)
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To combine the high power efficiency of Continuous Phase Modulation (CPM) with either high spectral efficiency or enhanced performance in low Signal to Noise conditions, some authors have proposed to introduce CPM in a MIMO frame, by using Space Time Codes (STC). In this paper, we address the code design problem of Space Time Block Codes combined with CPM and introduce a new design criterion based on L2 orthogonality. This L2 orthogonality condition, with the help of simplifying assumption, leads, in the 2x2 case, to a new family of codes. These codes generalize the Wang and Xia code, which was based on pointwise orthogonality. Simulations indicate that the new codes achieve full diversity and a slightly better coding gain. Moreover, one of the codes can be interpreted as two antennas fed by two conventional CPMs using the same data but with different alphabet sets. Inspection of these alphabet sets lead also to a simple explanation of the (small) spectrum broadening of Space Time Coded CPM.
[ { "version": "v1", "created": "Tue, 17 Jun 2008 08:59:18 GMT" } ]
2008-12-18T00:00:00
[ [ "Hesse", "Matthias", "", "I3S" ], [ "Lebrun", "Jerome", "", "I3S" ], [ "Deneire", "Luc", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.2730
Bob Diertens
B. Diertens
A Process Algebra Software Engineering Environment
null
null
null
prg0808
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In previous work we described how the process algebra based language PSF can be used in software engineering, using the ToolBus, a coordination architecture also based on process algebra, as implementation model. In this article we summarize that work and describe the software development process more formally by presenting the tools we use in this process in a CASE setting, leading to the PSF-ToolBus software engineering environment. We generalize the refine step in this environment towards a process algebra based software engineering workbench of which several instances can be combined to form an environment.
[ { "version": "v1", "created": "Tue, 17 Jun 2008 09:20:54 GMT" } ]
2008-06-18T00:00:00
[ [ "Diertens", "B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0806.2735
Jonathan Grattage
Jonathan Grattage
An overview of QML with a concrete implementation in Haskell
9 pages, final conference version (Quantum Physics and Logic 2008)
ENTCS: Proceedings of QPL V - DCV IV, 157-165, Reykjavik, Iceland, 2008
null
null
quant-ph cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper gives an introduction to and overview of the functional quantum programming language QML. The syntax of this language is defined and explained, along with a new QML definition of the quantum teleport algorithm. The categorical operational semantics of QML is also briefly introduced, in the form of annotated quantum circuits. This definition leads to a denotational semantics, given in terms of superoperators. Finally, an implementation in Haskell of the semantics for QML is presented as a compiler. The compiler takes QML programs as input, which are parsed into a Haskell datatype. The output from the compiler is either a quantum circuit (operational), an isometry (pure denotational) or a superoperator (impure denotational). Orthogonality judgements and problems with coproducts in QML are also discussed.
[ { "version": "v1", "created": "Tue, 17 Jun 2008 10:02:04 GMT" }, { "version": "v2", "created": "Mon, 21 Jul 2008 15:56:47 GMT" } ]
2008-07-21T00:00:00
[ [ "Grattage", "Jonathan", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0806.2738
Dmitry Lande
D.V. Lande
Identification of information tonality based on Bayesian approach and neural networks
5 pages, 2 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A model of the identification of information tonality, based on Bayesian approach and neural networks was described. In the context of this paper tonality means positive or negative tone of both the whole information and its parts which are related to particular concepts. The method, its application is presented in the paper, is based on statistic regularities connected with the presence of definite lexemes in the texts. A distinctive feature of the method is its simplicity and versatility. At present ideologically similar approaches are widely used to control spam.
[ { "version": "v1", "created": "Tue, 17 Jun 2008 09:44:43 GMT" } ]
2008-12-18T00:00:00
[ [ "Lande", "D. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.2760
Matthias Hesse
Matthias Hesse (I3S), Jerome Lebrun (I3S), Luc Deneire (I3S)
L2 OSTC-CPM: Theory and design
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The combination of space-time coding (STC) and continuous phase modulation (CPM) is an attractive field of research because both STC and CPM bring many advantages for wireless communications. Zhang and Fitz [1] were the first to apply this idea by constructing a trellis based scheme. But for these codes the decoding effort grows exponentially with the number of transmitting antennas. This was circumvented by orthogonal codes introduced by Wang and Xia [2]. Unfortunately, based on Alamouti code [3], this design is restricted to two antennas. However, by relaxing the orthogonality condition, we prove here that it is possible to design L2-orthogonal space-time codes which achieve full rate and full diversity with low decoding effort. In part one, we generalize the two-antenna code proposed by Wang and Xia [2] from pointwise to L2-orthogonality and in part two we present the first L2-orthogonal code for CPM with three antennas. In this report, we detail these results and focus on the properties of these codes. Of special interest is the optimization of the bit error rate which depends on the initial phase of the system. Our simulation results illustrate the systemic behavior of these conditions.
[ { "version": "v1", "created": "Tue, 17 Jun 2008 11:43:17 GMT" } ]
2008-12-18T00:00:00
[ [ "Hesse", "Matthias", "", "I3S" ], [ "Lebrun", "Jerome", "", "I3S" ], [ "Deneire", "Luc", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.2802
Alexei Lisitsa
Alexei Lisitsa
A logic with temporally accessible iteration
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deficiency in expressive power of the first-order logic has led to developing its numerous extensions by fixed point operators, such as Least Fixed-Point (LFP), inflationary fixed-point (IFP), partial fixed-point (PFP), etc. These logics have been extensively studied in finite model theory, database theory, descriptive complexity. In this paper we introduce unifying framework, the logic with iteration operator, in which iteration steps may be accessed by temporal logic formulae. We show that proposed logic FO+TAI subsumes all mentioned fixed point extensions as well as many other fixed point logics as natural fragments. On the other hand we show that over finite structures FO+TAI is no more expressive than FO+PFP. Further we show that adding the same machinery to the logic of monotone inductions (FO+LFP) does not increase its expressive power either.
[ { "version": "v1", "created": "Tue, 17 Jun 2008 14:36:43 GMT" } ]
2008-12-18T00:00:00
[ [ "Lisitsa", "Alexei", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.2843
Juan J. Merelo Pr.
Lourdes Araujo, Juan J. Merelo Guervos, Carlos Cotta and Francisco Fernandez de Vega
MultiKulti Algorithm: Migrating the Most Different Genotypes in an Island Model
First description of the multikulti distributed evolutionary computation migration policy
null
null
null
cs.NE cs.DC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Migration policies in distributed evolutionary algorithms has not been an active research area until recently. However, in the same way as operators have an impact on performance, the choice of migrants is due to have an impact too. In this paper we propose a new policy (named multikulti) for choosing the individuals that are going to be sent to other nodes, based on multiculturality: the individual sent should be as different as possible to the receiving population. We have checked this policy on different discrete optimization problems, and found that, in average or in median, this policy outperforms classical ones like sending the best or a random individual.
[ { "version": "v1", "created": "Tue, 17 Jun 2008 17:19:13 GMT" }, { "version": "v2", "created": "Wed, 18 Jun 2008 15:32:55 GMT" } ]
2008-06-18T00:00:00
[ [ "Araujo", "Lourdes", "" ], [ "Guervos", "Juan J. Merelo", "" ], [ "Cotta", "Carlos", "" ], [ "de Vega", "Francisco Fernandez", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0806.2850
Nick Costiris J.
N. J. Costiris, E. Mavrommatis, K. A. Gernoth, J. W. Clark
Decoding Beta-Decay Systematics: A Global Statistical Model for Beta^- Halflives
20 pages, 19 figures
Phys.Rev.C80:044332,2009
10.1103/PhysRevC.80.044332
null
nucl-th astro-ph cond-mat.dis-nn cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Statistical modeling of nuclear data provides a novel approach to nuclear systematics complementary to established theoretical and phenomenological approaches based on quantum theory. Continuing previous studies in which global statistical modeling is pursued within the general framework of machine learning theory, we implement advances in training algorithms designed to improved generalization, in application to the problem of reproducing and predicting the halflives of nuclear ground states that decay 100% by the beta^- mode. More specifically, fully-connected, multilayer feedforward artificial neural network models are developed using the Levenberg-Marquardt optimization algorithm together with Bayesian regularization and cross-validation. The predictive performance of models emerging from extensive computer experiments is compared with that of traditional microscopic and phenomenological models as well as with the performance of other learning systems, including earlier neural network models as well as the support vector machines recently applied to the same problem. In discussing the results, emphasis is placed on predictions for nuclei that are far from the stability line, and especially those involved in the r-process nucleosynthesis. It is found that the new statistical models can match or even surpass the predictive performance of conventional models for beta-decay systematics and accordingly should provide a valuable additional tool for exploring the expanding nuclear landscape.
[ { "version": "v1", "created": "Tue, 17 Jun 2008 18:23:15 GMT" } ]
2009-11-06T00:00:00
[ [ "Costiris", "N. J.", "" ], [ "Mavrommatis", "E.", "" ], [ "Gernoth", "K. A.", "" ], [ "Clark", "J. W.", "" ] ]
[ { "class": "Physics", "code": "nucl-th", "description": "Nuclear Theory Theory of nuclear structure covering wide area from models of hadron structure to neutron stars. Nuclear equation of states at different external conditions. Theory of nuclear reactions including heavy-ion reactions at low and high energies. It does not include problems of data analysis, physics of nuclear reactors, problems of safety, reactor construction", "span": "(Nuclear Theory)" }, null, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0806.2890
Julian McAuley
Tiberio S. Caetano, Julian J. McAuley, Li Cheng, Quoc V. Le and Alex J. Smola
Learning Graph Matching
10 pages, 4 figures
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As a fundamental problem in pattern recognition, graph matching has applications in a variety of fields, from computer vision to computational biology. In graph matching, patterns are modeled as graphs and pattern recognition amounts to finding a correspondence between the nodes of different graphs. Many formulations of this problem can be cast in general as a quadratic assignment problem, where a linear term in the objective function encodes node compatibility and a quadratic term encodes edge compatibility. The main research focus in this theme is about designing efficient algorithms for approximately solving the quadratic assignment problem, since it is NP-hard. In this paper we turn our attention to a different question: how to estimate compatibility functions such that the solution of the resulting graph matching problem best matches the expected solution that a human would manually provide. We present a method for learning graph matching: the training examples are pairs of graphs and the `labels' are matches between them. Our experimental results reveal that learning can substantially improve the performance of standard graph matching algorithms. In particular, we find that simple linear assignment with such a learning scheme outperforms Graduated Assignment with bistochastic normalisation, a state-of-the-art quadratic assignment relaxation algorithm.
[ { "version": "v1", "created": "Tue, 17 Jun 2008 23:28:08 GMT" } ]
2008-06-19T00:00:00
[ [ "Caetano", "Tiberio S.", "" ], [ "McAuley", "Julian J.", "" ], [ "Cheng", "Li", "" ], [ "Le", "Quoc V.", "" ], [ "Smola", "Alex J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0806.2923
Michael Luttenberger
Michael Luttenberger
Strategy Iteration using Non-Deterministic Strategies for Solving Parity Games
null
null
null
null
cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article extends the idea of solving parity games by strategy iteration to non-deterministic strategies: In a non-deterministic strategy a player restricts himself to some non-empty subset of possible actions at a given node, instead of limiting himself to exactly one action. We show that a strategy-improvement algorithm by by Bjoerklund, Sandberg, and Vorobyov can easily be adapted to the more general setting of non-deterministic strategies. Further, we show that applying the heuristic of "all profitable switches" leads to choosing a "locally optimal" successor strategy in the setting of non-deterministic strategies, thereby obtaining an easy proof of an algorithm by Schewe. In contrast to the algorithm by Bjoerklund et al., we present our algorithm directly for parity games which allows us to compare it to the algorithm by Jurdzinski and Voege: We show that the valuations used in both algorithm coincide on parity game arenas in which one player can "surrender". Thus, our algorithm can also be seen as a generalization of the one by Jurdzinski and Voege to non-deterministic strategies. Finally, using non-deterministic strategies allows us to show that the number of improvement steps is bound from above by O(1.724^n). For strategy-improvement algorithms, this bound was previously only known to be attainable by using randomization.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 08:32:17 GMT" }, { "version": "v2", "created": "Thu, 19 Jun 2008 09:37:53 GMT" }, { "version": "v3", "created": "Fri, 27 Jun 2008 08:51:51 GMT" }, { "version": "v4", "created": "Mon, 19 Mar 2012 14:26:43 GMT" } ]
2012-03-20T00:00:00
[ [ "Luttenberger", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.2924
Massimiliano Laddomada Ph.D.
Massimiliano Laddomada and Fabio Mesiti
On the Optimization of the IEEE 802.11 DCF: A Cross-Layer Perspective
Submitted to IEEE Transactions on Wireless Communications
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is focused on the problem of optimizing the aggregate throughput of the Distributed Coordination Function (DCF) employing the basic access mechanism at the data link layer of IEEE 802.11 protocols. In order to broaden the applicability of the proposed analysis, we consider general operating conditions accounting for both non-saturated and saturated traffic in the presence of transmission channel errors, as exemplified by the packet error rate $P_e$. The main clue of this work stems from the relation that links the aggregate throughput of the network to the packet rate $\lambda$ of the contending stations. In particular, we show that the aggregate throughput $S(\lambda)$ presents two clearly distinct operating regions that depend on the actual value of the packet rate $\lambda$ with respect to a critical value $\lambda_c$, theoretically derived in this work. The behavior of $S(\lambda)$ paves the way to a cross-layer optimization algorithm, which proved to be effective for maximizing the aggregate throughput in a variety of network operating conditions. A nice consequence of the proposed optimization framework relies on the fact that the aggregate throughput can be predicted quite accurately with a simple, yet effective, closed-form expression, which is also derived in the article. Finally, theoretical and simulation results are presented throughout the work in order to unveil, as well as verify, the key ideas.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 08:32:52 GMT" } ]
2008-12-18T00:00:00
[ [ "Laddomada", "Massimiliano", "" ], [ "Mesiti", "Fabio", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.2925
Dzenan Zukic
D\v{z}enan Zuki\'c, Andreas Elsner, Zikrija Avdagi\'c, Gitta Domik
Neural networks in 3D medical scan visualization
8 pages, 6 figures published on conference 3IA'2008 in Athens, Greece (http://3ia.teiath.gr)
International Conference on Computer Graphics and Artificial Intelligence, Proceedings (2008) 183-190
null
null
cs.AI cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For medical volume visualization, one of the most important tasks is to reveal clinically relevant details from the 3D scan (CT, MRI ...), e.g. the coronary arteries, without obscuring them with less significant parts. These volume datasets contain different materials which are difficult to extract and visualize with 1D transfer functions based solely on the attenuation coefficient. Multi-dimensional transfer functions allow a much more precise classification of data which makes it easier to separate different surfaces from each other. Unfortunately, setting up multi-dimensional transfer functions can become a fairly complex task, generally accomplished by trial and error. This paper explains neural networks, and then presents an efficient way to speed up visualization process by semi-automatic transfer function generation. We describe how to use neural networks to detect distinctive features shown in the 2D histogram of the volume data and how to use this information for data classification.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 08:36:15 GMT" }, { "version": "v2", "created": "Fri, 12 Jun 2009 08:25:23 GMT" } ]
2009-06-12T00:00:00
[ [ "Zukić", "Dženan", "" ], [ "Elsner", "Andreas", "" ], [ "Avdagić", "Zikrija", "" ], [ "Domik", "Gitta", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0806.2937
Claudius Gros
Gregor Kaczor and Claudius Gros
Evolving complex networks with conserved clique distributions
Physical Review E, in press
Physical Review E, Vol. 78, 016107 (2008).
10.1103/PhysRevE.78.016107
null
physics.soc-ph cond-mat.dis-nn cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose and study a hierarchical algorithm to generate graphs having a predetermined distribution of cliques, the fully connected subgraphs. The construction mechanism may be either random or incorporate preferential attachment. We evaluate the statistical properties of the graphs generated, such as the degree distribution and network diameters, and compare them to some real-world graphs.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 09:23:35 GMT" } ]
2009-11-13T00:00:00
[ [ "Kaczor", "Gregor", "" ], [ "Gros", "Claudius", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0806.2943
Jun Tanaka
Jun Tanaka
Modern Set
null
null
null
null
math.GM cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
In this paper, we intend to generalize the classical set theory as much as possible. we will do this by freeing sets from the regular properties of classical sets; e.g., the law of excluded middle, the law of non-contradiction, the distributive law, the commutative law,etc....
[ { "version": "v1", "created": "Wed, 18 Jun 2008 09:45:18 GMT" } ]
2008-06-19T00:00:00
[ [ "Tanaka", "Jun", "" ] ]
[ { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.2947
Rafee Ebrahim Kamouna Ph.D.
Rafee Ebrahim Kamouna
The Kleene-Rosser Paradox, The Liar's Paradox & A Fuzzy Logic Programming Paradox Imply SAT is (NOT) NP-complete
Submitted to the ACM Transactions on Computation Theory
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
After examining the {\bf P} versus {\bf NP} problem against the Kleene-Rosser paradox of the $\lambda$-calculus [94], it was found that it represents a counter-example to NP-completeness. We prove that it contradicts the proof of Cook's theorem. A logical formalization of the liar's paradox leads to the same result. This formalization of the liar's paradox into a computable form is a 2-valued instance of a fuzzy logic programming paradox discovered in the system of [90]. Three proofs that show that {\bf SAT} is (NOT) NP-complete are presented. The counter-example classes to NP-completeness are also counter-examples to Fagin's theorem [36] and the Immermann-Vardi theorem [89,110], the fundamental results of descriptive complexity. All these results show that {\bf ZF$\not$C} is inconsistent.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 10:00:38 GMT" }, { "version": "v2", "created": "Thu, 19 Jun 2008 12:43:26 GMT" }, { "version": "v3", "created": "Mon, 23 Jun 2008 08:56:04 GMT" }, { "version": "v4", "created": "Mon, 22 Sep 2008 20:17:33 GMT" }, { "version": "v5", "created": "Mon, 29 Sep 2008 17:13:52 GMT" }, { "version": "v6", "created": "Mon, 29 Sep 2008 21:21:30 GMT" }, { "version": "v7", "created": "Fri, 3 Oct 2008 08:36:53 GMT" }, { "version": "v8", "created": "Fri, 10 Jul 2009 16:39:59 GMT" } ]
2011-11-10T00:00:00
[ [ "Kamouna", "Rafee Ebrahim", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.2991
Nathan Levy
Nathan Levy, Ofer Zeitouni and Shlomo Shamai (Shitz)
On Information Rates of the Fading Wyner Cellular Model via the Thouless Formula for the Strip
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We apply the theory of random Schr\"odinger operators to the analysis of multi-users communication channels similar to the Wyner model, that are characterized by short-range intra-cell broadcasting. With $H$ the channel transfer matrix, $HH^\dagger$ is a narrow-band matrix and in many aspects is similar to a random Schr\"odinger operator. We relate the per-cell sum-rate capacity of the channel to the integrated density of states of a random Schr\"odinger operator; the latter is related to the top Lyapunov exponent of a random sequence of matrices via a version of the Thouless formula. Unlike related results in classical random matrix theory, limiting results do depend on the underlying fading distributions. We also derive several bounds on the limiting per-cell sum-rate capacity, some based on the theory of random Schr\"odinger operators, and some derived from information theoretical considerations. Finally, we get explicit results in the high-SNR regime for some particular cases.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 14:06:30 GMT" } ]
2008-06-19T00:00:00
[ [ "Levy", "Nathan", "", "Shitz" ], [ "Zeitouni", "Ofer", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.3015
Dennis Leventhal
D. Leventhal and A.S. Lewis
Randomized Methods for Linear Constraints: Convergence Rates and Conditioning
22 pages
null
null
null
math.OC cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study randomized variants of two classical algorithms: coordinate descent for systems of linear equations and iterated projections for systems of linear inequalities. Expanding on a recent randomized iterated projection algorithm of Strohmer and Vershynin for systems of linear equations, we show that, under appropriate probability distributions, the linear rates of convergence (in expectation) can be bounded in terms of natural linear-algebraic condition numbers for the problems. We relate these condition measures to distances to ill-posedness, and discuss generalizations to convex systems under metric regularity assumptions.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 14:29:16 GMT" } ]
2008-06-19T00:00:00
[ [ "Leventhal", "D.", "" ], [ "Lewis", "A. S.", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0806.3023
Che Lin
C. Lin, V. V. Veeravalli, and S. Meyn
A Random Search Framework for Convergence Analysis of Distributed Beamforming with Feedback
8 pages, 3 figures, presented partially at ITA '08 and PSU School of Info. Theory '08
null
null
null
cs.DC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The focus of this work is on the analysis of transmit beamforming schemes with a low-rate feedback link in wireless sensor/relay networks, where nodes in the network need to implement beamforming in a distributed manner. Specifically, the problem of distributed phase alignment is considered, where neither the transmitters nor the receiver has perfect channel state information, but there is a low-rate feedback link from the receiver to the transmitters. In this setting, a framework is proposed for systematically analyzing the performance of distributed beamforming schemes. To illustrate the advantage of this framework, a simple adaptive distributed beamforming scheme that was recently proposed by Mudambai et al. is studied. Two important properties for the received signal magnitude function are derived. Using these properties and the systematic framework, it is shown that the adaptive distributed beamforming scheme converges both in probability and in mean. Furthermore, it is established that the time required for the adaptive scheme to converge in mean scales linearly with respect to the number of sensor/relay nodes.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 15:56:19 GMT" }, { "version": "v2", "created": "Wed, 2 Jul 2008 17:12:03 GMT" }, { "version": "v3", "created": "Tue, 13 Jul 2010 07:49:15 GMT" } ]
2010-07-14T00:00:00
[ [ "Lin", "C.", "" ], [ "Veeravalli", "V. V.", "" ], [ "Meyn", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.3031
Thibaud Monteiro
Thibaud Monteiro (LGIPM, INRIA Lorraine), Daniel Roy (LGIPM, INRIA Lorraine), Didier Anciaux (LGIPM, INRIA Lorraine)
Multi Site Coordination using a Multi-Agent System
null
Computers in Industry 58, 4 (2007) pp. 367-377
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new approach of coordination of decisions in a multi site system is proposed. It is based this approach on a multi-agent concept and on the principle of distributed network of enterprises. For this purpose, each enterprise is defined as autonomous and performs simultaneously at the local and global levels. The basic component of our approach is a so-called Virtual Enterprise Node (VEN), where the enterprise network is represented as a set of tiers (like in a product breakdown structure). Within the network, each partner constitutes a VEN, which is in contact with several customers and suppliers. Exchanges between the VENs ensure the autonomy of decision, and guarantiee the consistency of information and material flows. Only two complementary VEN agents are necessary: one for external interactions, the Negotiator Agent (NA) and one for the planning of internal decisions, the Planner Agent (PA). If supply problems occur in the network, two other agents are defined: the Tier Negotiator Agent (TNA) working at the tier level only and the Supply Chain Mediator Agent (SCMA) working at the level of the enterprise network. These two agents are only active when the perturbation occurs. Otherwise, the VENs process the flow of information alone. With this new approach, managing enterprise network becomes much more transparent and looks like managing a simple enterprise in the network. The use of a Multi-Agent System (MAS) allows physical distribution of the decisional system, and procures a heterarchical organization structure with a decentralized control that guaranties the autonomy of each entity and the flexibility of the network.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 15:46:10 GMT" } ]
2008-12-18T00:00:00
[ [ "Monteiro", "Thibaud", "", "LGIPM, INRIA Lorraine" ], [ "Roy", "Daniel", "", "LGIPM, INRIA\n Lorraine" ], [ "Anciaux", "Didier", "", "LGIPM, INRIA Lorraine" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0806.3032
Thibaud Monteiro
Daniel Roy (LGIPM, Inria Lorraine - Loria), Didier Anciaux (LGIPM, Inria Lorraine - Loria), Thibaud Monteiro (LGIPM, Inria Lorraine - Loria), Latifa Ouzizi (LGIPM, Inria Lorraine - Loria)
Multi-agents architecture for supply chain management
null
Journal of Manufacturing Technology Management 15, 8 (2004) pp. 745-755
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The purpose of this paper is to propose a new approach for the supply chain management. This approach is based on the virtual enterprise paradigm and the used of multi-agent concept. Each entity (like enterprise) is autonomous and must perform local and global goals in relation with its environment. The base component of our approach is a Virtual Enterprise Node (VEN). The supply chain is viewed as a set of tiers (corresponding to the levels of production), in which each partner of the supply chain (VEN) is in relation with several customers and suppliers. Each VEN belongs to one tier. The main customer gives global objectives (quantity, cost and delay) to the supply chain. The Mediator Agent (MA) is in charge to manage the supply chain in order to respect those objectives as global level. Those objectives are taking over to Negotiator Agent at the tier level (NAT). These two agents are only active if a perturbation occurs; otherwise information flows are only exchange between VENs. This architecture allows supply chains management which is completely transparent seen from simple enterprise of the supply chain. The used of Multi-Agent System (MAS) allows physical distribution of the decisional system. Moreover, the hierarchical organizational structure with a decentralized control guaranties, in the same time, the autonomy of each entity and the whole flexibility.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 15:46:29 GMT" } ]
2008-12-18T00:00:00
[ [ "Roy", "Daniel", "", "LGIPM, Inria Lorraine - Loria" ], [ "Anciaux", "Didier", "", "LGIPM,\n Inria Lorraine - Loria" ], [ "Monteiro", "Thibaud", "", "LGIPM, Inria Lorraine - Loria" ], [ "Ouzizi", "Latifa", "", "LGIPM, Inria Lorraine - Loria" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0806.3033
Eric Sopena
Adrien Guignard (LaBRI), Eric Sopena (LaBRI)
Compound Node-Kayles on Paths
Theoretical Computer Science (2009) to appear
Theoretical Computer Science 410, 21-23 (2009) 2033-2044
10.1016/j.tcs.2008.12.053
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In his celebrated book "On Number and Games" (Academic Press, New-York, 1976), J.H. Conway introduced twelve versions of compound games. We analyze these twelve versions for the Node-Kayles game on paths. For usual disjunctive compound, Node-Kayles has been solved for a long time under normal play, while it is still unsolved under mis\`ere play. We thus focus on the ten remaining versions, leaving only one of them unsolved.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 15:47:10 GMT" }, { "version": "v2", "created": "Mon, 5 Jan 2009 20:16:06 GMT" } ]
2009-04-23T00:00:00
[ [ "Guignard", "Adrien", "", "LaBRI" ], [ "Sopena", "Eric", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0806.3099
Daniel Turner
D. Z. Turner, K. B. Nakshatrala and K. D. Hjelmstad
On the stability of bubble functions and a stabilized mixed finite element formulation for the Stokes problem
25 pages, 13 figures (The previous version was compiled by mistake with the wrong style file, the current one uses amsart, and there is no difference in the text or the figures)
null
10.1002/fld.1936
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate the relationship between stabilized and enriched finite element formulations for the Stokes problem. We also present a new stabilized mixed formulation for which the stability parameter is derived purely by the method of weighted residuals. This new formulation allows equal order interpolation for the velocity and pressure fields. Finally, we show by counterexample that a direct equivalence between subgrid-based stabilized finite element methods and Galerkin methods enriched by bubble functions cannot be constructed for quadrilateral and hexahedral elements using standard bubble functions.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 22:29:27 GMT" }, { "version": "v2", "created": "Sat, 21 Jun 2008 02:56:56 GMT" } ]
2015-05-13T00:00:00
[ [ "Turner", "D. Z.", "" ], [ "Nakshatrala", "K. B.", "" ], [ "Hjelmstad", "K. D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0806.3115
Daniel Hazel
Dan Hazel (Technology One)
Using rational numbers to key nested sets
18 pages
null
null
DocSetID-311997
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report details the generation and use of tree node ordering keys in a single relational database table. The keys for each node are calculated from the keys of its parent, in such a way that the sort order places every node in the tree before all of its descendants and after all siblings having a lower index. The calculation from parent keys to child keys is simple, and reversible in the sense that the keys of every ancestor of a node can be calculated from that node's keys without having to consult the database. Proofs of the above properties of the key encoding process and of its correspondence to a finite continued fraction form are provided.
[ { "version": "v1", "created": "Thu, 19 Jun 2008 02:06:14 GMT" } ]
2008-06-20T00:00:00
[ [ "Hazel", "Dan", "", "Technology One" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0806.3121
Julien Langou
George Bosilca, Remi Delmas, Jack Dongarra, and Julien Langou
Algorithmic Based Fault Tolerance Applied to High Performance Computing
null
null
null
null
cs.DC cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new approach to fault tolerance for High Performance Computing system. Our approach is based on a careful adaptation of the Algorithmic Based Fault Tolerance technique (Huang and Abraham, 1984) to the need of parallel distributed computation. We obtain a strongly scalable mechanism for fault tolerance. We can also detect and correct errors (bit-flip) on the fly of a computation. To assess the viability of our approach, we have developed a fault tolerant matrix-matrix multiplication subroutine and we propose some models to predict its running time. Our parallel fault-tolerant matrix-matrix multiplication scores 1.4 TFLOPS on 484 processors (cluster jacquard.nersc.gov) and returns a correct result while one process failure has happened. This represents 65% of the machine peak efficiency and less than 12% overhead with respect to the fastest failure-free implementation. We predict (and have observed) that, as we increase the processor count, the overhead of the fault tolerance drops significantly.
[ { "version": "v1", "created": "Thu, 19 Jun 2008 02:06:57 GMT" } ]
2008-06-20T00:00:00
[ [ "Bosilca", "George", "" ], [ "Delmas", "Remi", "" ], [ "Dongarra", "Jack", "" ], [ "Langou", "Julien", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0806.3133
Ori Shental
Ori Shental and Ido Kanter
Shannon Meets Carnot: Mutual Information Via Thermodynamics
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this contribution, the Gaussian channel is represented as an equivalent thermal system allowing to express its input-output mutual information in terms of thermodynamic quantities. This thermodynamic description of the mutual information is based upon a generalization of the $2^{nd}$ thermodynamic law and provides an alternative proof to the Guo-Shamai-Verd\'{u} theorem, giving an intriguing connection between this remarkable theorem and the most fundamental laws of nature - the laws of thermodynamics.
[ { "version": "v1", "created": "Thu, 19 Jun 2008 06:31:51 GMT" } ]
2008-06-20T00:00:00
[ [ "Shental", "Ori", "" ], [ "Kanter", "Ido", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.3152
Stavros Kontopoulos
Stavros Kontopoulos, Athanasios K. Tsakalidis
TRANS-Net: an Efficient Peer-to-Peer Overlay Network Based on a Full Transposition Graph
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a new practical P2P system based on a full transposition network topology named TRANS-Net. Full transposition networks achieve higher fault-tolerance and lower congestion among the class of transposition networks. TRANS-Net provides an efficient lookup service i.e. k hops with high probability, where k satisfies Theta(log_n m) less than k less than Theta(log_2 m), where m denotes the number of system nodes and n is a system parameter related to the maximum number that m can take (up to n!). Experiments show that the look-up performance achieves the lower limit of the complexity relation. TRANS-Net also preserves data locality and provides efficient look-up performance for complex queries such as multi-dimensional queries.
[ { "version": "v1", "created": "Thu, 19 Jun 2008 08:28:28 GMT" }, { "version": "v2", "created": "Sat, 30 Aug 2008 16:09:49 GMT" } ]
2008-08-30T00:00:00
[ [ "Kontopoulos", "Stavros", "" ], [ "Tsakalidis", "Athanasios K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0806.3201
Gueorgi Kossinets
Gueorgi Kossinets, Jon Kleinberg, Duncan Watts
The Structure of Information Pathways in a Social Communication Network
9 pages, 10 figures, to appear in Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'08), August 24-27, 2008, Las Vegas, Nevada, USA
null
null
null
physics.soc-ph cs.DS physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social networks are of interest to researchers in part because they are thought to mediate the flow of information in communities and organizations. Here we study the temporal dynamics of communication using on-line data, including e-mail communication among the faculty and staff of a large university over a two-year period. We formulate a temporal notion of "distance" in the underlying social network by measuring the minimum time required for information to spread from one node to another -- a concept that draws on the notion of vector-clocks from the study of distributed computing systems. We find that such temporal measures provide structural insights that are not apparent from analyses of the pure social network topology. In particular, we define the network backbone to be the subgraph consisting of edges on which information has the potential to flow the quickest. We find that the backbone is a sparse graph with a concentration of both highly embedded edges and long-range bridges -- a finding that sheds new light on the relationship between tie strength and connectivity in social networks.
[ { "version": "v1", "created": "Thu, 19 Jun 2008 14:22:25 GMT" } ]
2008-06-20T00:00:00
[ [ "Kossinets", "Gueorgi", "" ], [ "Kleinberg", "Jon", "" ], [ "Watts", "Duncan", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0806.3209
Russell O'Connor
Russell O'Connor
A Computer Verified Theory of Compact Sets
This paper is to be part of the proceedings of the Symbolic Computation in Software Science Austrian-Japanese Workshop (SCSS 2008)
null
null
RISC-Linz Report Series 08-08
cs.LO
http://creativecommons.org/licenses/publicdomain/
Compact sets in constructive mathematics capture our intuition of what computable subsets of the plane (or any other complete metric space) ought to be. A good representation of compact sets provides an efficient means of creating and displaying images with a computer. In this paper, I build upon existing work about complete metric spaces to define compact sets as the completion of the space of finite sets under the Hausdorff metric. This definition allowed me to quickly develop a computer verified theory of compact sets. I applied this theory to compute provably correct plots of uniformly continuous functions.
[ { "version": "v1", "created": "Thu, 19 Jun 2008 18:09:01 GMT" } ]
2010-08-04T00:00:00
[ [ "O'Connor", "Russell", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.3215
Xiahong Lin
Xiahong Lin, Lin Gao, Kefei Chen, and David K. Y. Chiu
MOHCS: Towards Mining Overlapping Highly Connected Subgraphs
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many networks in real-life typically contain parts in which some nodes are more highly connected to each other than the other nodes of the network. The collection of such nodes are usually called clusters, communities, cohesive groups or modules. In graph terminology, it is called highly connected graph. In this paper, we first prove some properties related to highly connected graph. Based on these properties, we then redefine the highly connected subgraph which results in an algorithm that determines whether a given graph is highly connected in linear time. Then we present a computationally efficient algorithm, called MOHCS, for mining overlapping highly connected subgraphs. We have evaluated experimentally the performance of MOHCS using real and synthetic data sets from computer-generated graph and yeast protein network. Our results show that MOHCS is effective and reliable in finding overlapping highly connected subgraphs. Keywords-component; Highly connected subgraph, clustering algorithms, minimum cut, minimum degree
[ { "version": "v1", "created": "Thu, 19 Jun 2008 15:13:38 GMT" } ]
2008-06-20T00:00:00
[ [ "Lin", "Xiahong", "" ], [ "Gao", "Lin", "" ], [ "Chen", "Kefei", "" ], [ "Chiu", "David K. Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0806.3227
Harshan Jagadeesh
J. Harshan, B. Sundar Rajan
A Non-differential Distributed Space-Time Coding for Partially-Coherent Cooperative Communication
To appear in IEEE Transactions on Wireless Communications. 06 pages, 04 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a distributed space-time coding scheme, based on the relay channel model, the relay nodes co-operate to linearly process the transmitted signal from the source and forward them to the destination such that the signal at the destination appears as a space time block code. Recently, a code design criteria for achieving full diversity in a partially-coherent environment have been proposed along with codes based on differential encoding and decoding techniques. For such a set up, in this paper, a non-differential encoding technique and construction of distributed space time block codes from unitary matrix groups at the source and a set of diagonal unitary matrices for the relays are proposed. It is shown that, the performance of our scheme is independent of the choice of unitary matrices at the relays. When the group is cyclic, a necessary and sufficient condition on the generator of the cyclic group to achieve full diversity and to minimize the pairwise error probability is proved. Various choices on the generator of cyclic group to reduce the ML decoding complexity at the destination is presented. It is also shown that, at the source, if non-cyclic abelian unitary matrix groups are used, then full-diversity can not be obtained. The presented scheme is also robust to failure of any subset of relay nodes.
[ { "version": "v1", "created": "Thu, 19 Jun 2008 16:18:32 GMT" } ]
2008-06-20T00:00:00
[ [ "Harshan", "J.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.3243
Fan Zhang
Fan Zhang and Henry D. Pfister
Analysis of Verification-based Decoding on the q-ary Symmetric Channel for Large q
This is the final version for IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss and analyze a list-message-passing decoder with verification for low-density parity-check (LDPC) codes on the q-ary symmetric channel (q-SC). Rather than passing messages consisting of symbol probabilities, this decoder passes lists of possible symbols and marks some lists as verified. The density evolution (DE) equations for this decoder are derived and used to compute decoding thresholds. If the maximum list size is unbounded, then we find that any capacity-achieving LDPC code for the binary erasure channel can be used to achieve capacity on the q-SC for large q. The decoding thresholds are also computed via DE for the case where each list is truncated to satisfy a maximum list size constraint. Simulation results are also presented to confirm the DE results. During the simulations, we observed differences between two verification-based decoding algorithms, introduced by Luby and Mitzenmacher, that were implicitly assumed to be identical. In this paper, we provide an analysis of the node-based algorithms from that paper and verify that it matches simulation results. The probability of false verification (FV) is also considered and techniques are discussed to mitigate the FV. Optimization of the degree distribution is also used to improve the threshold for a fixed maximum list size. Finally, the proposed algorithm is compared with a variety of other algorithms using both density evolution thresholds and simulation results.
[ { "version": "v1", "created": "Thu, 19 Jun 2008 17:22:02 GMT" }, { "version": "v2", "created": "Thu, 30 Jul 2009 16:45:06 GMT" }, { "version": "v3", "created": "Sat, 24 Jul 2010 03:15:47 GMT" }, { "version": "v4", "created": "Fri, 19 Nov 2010 04:44:08 GMT" }, { "version": "v5", "created": "Sat, 29 Jan 2011 18:28:17 GMT" }, { "version": "v6", "created": "Fri, 24 Jun 2011 04:37:23 GMT" } ]
2015-03-13T00:00:00
[ [ "Zhang", "Fan", "" ], [ "Pfister", "Henry D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.3246
Eyal Lubetzky
Noga Alon, Avinatan Hasidim, Eyal Lubetzky, Uri Stav, Amit Weinstein
Broadcasting with side information
19 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A sender holds a word x consisting of n blocks x_i, each of t bits, and wishes to broadcast a codeword to m receivers, R_1,...,R_m. Each receiver R_i is interested in one block, and has prior side information consisting of some subset of the other blocks. Let \beta_t be the minimum number of bits that has to be transmitted when each block is of length t, and let \beta be the limit \beta = \lim_{t \to \infty} \beta_t/t. In words, \beta is the average communication cost per bit in each block (for long blocks). Finding the coding rate \beta, for such an informed broadcast setting, generalizes several coding theoretic parameters related to Informed Source Coding on Demand, Index Coding and Network Coding. In this work we show that usage of large data blocks may strictly improve upon the trivial encoding which treats each bit in the block independently. To this end, we provide general bounds on \beta_t, and prove that for any constant C there is an explicit broadcast setting in which \beta = 2 but \beta_1 > C. One of these examples answers a question of Lubetzky and Stav. In addition, we provide examples with the following counterintuitive direct-sum phenomena. Consider a union of several mutually independent broadcast settings. The optimal code for the combined setting may yield a significant saving in communication over concatenating optimal encodings for the individual settings. This result also provides new non-linear coding schemes which improve upon the largest known gap between linear and non-linear Network Coding, thus improving the results of Dougherty, Freiling, and Zeger. The proofs use ideas related to Witsenhausen's rate, OR graph products, colorings of Cayley graphs and the chromatic numbers of Kneser graphs.
[ { "version": "v1", "created": "Thu, 19 Jun 2008 17:42:34 GMT" } ]
2008-06-20T00:00:00
[ [ "Alon", "Noga", "" ], [ "Hasidim", "Avinatan", "" ], [ "Lubetzky", "Eyal", "" ], [ "Stav", "Uri", "" ], [ "Weinstein", "Amit", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]