id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0806.3258 | Daniel Karapetyan | Gregory Gutin, Daniel Karapetyan | Local Search Heuristics For The Multidimensional Assignment Problem | 30 pages. A preliminary version is published in volume 5420 of
Lecture Notes Comp. Sci., pages 100-115, 2009 | Journal of Heuristics 17(3) (2011), 201--249 | 10.1007/s10732-010-9133-3 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Multidimensional Assignment Problem (MAP) (abbreviated s-AP in the case
of s dimensions) is an extension of the well-known assignment problem. The most
studied case of MAP is 3-AP, though the problems with larger values of s also
have a large number of applications. We consider several known neighborhoods,
generalize them and propose some new ones. The heuristics are evaluated both
theoretically and experimentally and dominating algorithms are selected. We
also demonstrate a combination of two neighborhoods may yield a heuristics
which is superior to both of its components.
| [
{
"version": "v1",
"created": "Thu, 19 Jun 2008 18:31:51 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Jul 2008 22:18:26 GMT"
},
{
"version": "v3",
"created": "Fri, 5 Sep 2008 19:57:41 GMT"
},
{
"version": "v4",
"created": "Mon, 20 Oct 2008 05:41:16 GMT"
},
{
"version": "v5",
"created": "Tue, 14 Apr 2009 14:22:13 GMT"
},
{
"version": "v6",
"created": "Sat, 25 Jul 2009 11:25:38 GMT"
}
]
| 2015-02-24T00:00:00 | [
[
"Gutin",
"Gregory",
""
],
[
"Karapetyan",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0806.3277 | Stephan Foldes | Stephan Foldes | On McMillan's theorem about uniquely decipherable codes | null | null | null | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Karush's proof of McMillan's theorem is recast as an argument involving
polynomials with non-commuting indeterminates certain evaluations of which
yield the Kraft sums of codes, proving a strengthened version of McMillan's
theorem.
| [
{
"version": "v1",
"created": "Thu, 19 Jun 2008 20:28:40 GMT"
},
{
"version": "v2",
"created": "Sat, 21 Jun 2008 21:51:48 GMT"
}
]
| 2008-06-23T00:00:00 | [
[
"Foldes",
"Stephan",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3284 | Daniel M. Gordon | Daniel M. Gordon, Victor Miller and Peter Ostapenko | Optimal hash functions for approximate closest pairs on the n-cube | IEEE Transactions on Information Theory, to appear | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One way to find closest pairs in large datasets is to use hash functions. In
recent years locality-sensitive hash functions for various metrics have been
given: projecting an n-cube onto k bits is simple hash function that performs
well. In this paper we investigate alternatives to projection. For various
parameters hash functions given by complete decoding algorithms for codes work
better, and asymptotically random codes perform better than projection.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 17:19:44 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Oct 2009 15:40:02 GMT"
}
]
| 2009-10-15T00:00:00 | [
[
"Gordon",
"Daniel M.",
""
],
[
"Miller",
"Victor",
""
],
[
"Ostapenko",
"Peter",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3301 | Ryan Tibshirani | Ryan J. Tibshirani | Fast computation of the median by successive binning | 14 pages, 1 Postscript figure | null | null | null | stat.CO cs.DS stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a new median algorithm and a median approximation
algorithm. The former has O(n) average running time and the latter has O(n)
worst-case running time. These algorithms are highly competitive with the
standard algorithm when computing the median of a single data set, but are
significantly faster in updating the median when more data is added.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 00:44:53 GMT"
},
{
"version": "v2",
"created": "Tue, 12 May 2009 04:46:56 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Tibshirani",
"Ryan J.",
""
]
]
| [
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
]
|
0806.3317 | Chau Yuen | Chau Yuen, Yong Liang Guan, Tjeng Thiang Tjhung | Differential Transmit Diversity Based on Quasi-Orthogonal Space-Time
Block Code | null | Globecom 2004 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | By using joint modulation and customized constellation set, we show that
Quasi-Orthogonal Space-Time Block Code (QO-STBC) can be used to form a new
differential space-time modulation (DSTM) scheme to provide full transmit
diversity with non-coherent detection. Our new scheme can provide higher code
rate than existing DSTM schemes based on Orthogonal STBC. It also has a lower
decoding complexity than the other DSTM schemes, such as those based on Group
Codes, because it only requires a joint detection of two complex symbols. We
derive the design criteria for the customized constellation set and use them to
construct a constellation set that provides a wide range of spectral efficiency
with full diversity and maximum coding gain.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 06:15:38 GMT"
}
]
| 2008-06-23T00:00:00 | [
[
"Yuen",
"Chau",
""
],
[
"Guan",
"Yong Liang",
""
],
[
"Tjhung",
"Tjeng Thiang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3320 | Chau Yuen | Chau Yuen, Yong Liang Guan, T. T. Tjhung | Unitary Differential Space-Time Modulation with Joint Modulation | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop two new designs of unitary differential space-time modulation
(DSTM) with low decoding complexity. Their decoder can be separated into a few
parallel decoders, each of which has a decoding search space of less than
sqrt(N) if the DSTM codebook contains N codewords. Both designs are based on
the concept of joint modulation, which means that several information symbols
are jointly modulated, unlike the conventional symbol-by-symbol modulation. The
first design is based on Orthogonal Space-Time Block Code (O-STBC) with joint
constellation constructed from spherical codes. The second design is based on
Quasi-Orthogonal Space-Time Block Code (QO-STBC) with specially designed
pair-wise constellation sets. Both the proposed unitary DSTM schemes have
considerably lower decoding complexity than many prior DSTM schemes, including
those based on Group Codes and Sp(2) which generally have a decoding search
space of N for a codebook size of N codewords, and much better decoding
performance than the existing O-STBC DSTM scheme. Between two designs, the
proposed DSTM based on O-STBC generally has better decoding performance, while
the proposed DSTM based on QO-STBC has lower decoding complexity when 8
transmit antennas.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 06:26:10 GMT"
}
]
| 2008-06-23T00:00:00 | [
[
"Yuen",
"Chau",
""
],
[
"Guan",
"Yong Liang",
""
],
[
"Tjhung",
"T. T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3321 | Chau Yuen | Chau Yuen, Bertrand M. Hochwald | Achieving Near-Capacity at Low SNR on a Multiple-Antenna Multiple-User
Channel | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the sensitivity of the capacity of a multi-antenna multi-user
system to the number of users being served. We show analytically that, for a
given desired sum-rate, the extra power needed to serve a subset of the users
at low SNR (signal-to-noise ratio) can be very small, and is generally much
smaller than the extra power needed to serve the same subset at high SNR. The
advantages of serving only subsets of the users are many: multi-user algorithms
have lower complexity, reduced channel-state information requirements, and,
often, better performance. We provide guidelines on how many users to serve to
get near-capacity performance with low complexity. For example, we show how in
an eight-antenna eight-user system we can serve only four users and still be
approximately 2 dB from capacity at very low SNR.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 06:29:17 GMT"
}
]
| 2008-06-23T00:00:00 | [
[
"Yuen",
"Chau",
""
],
[
"Hochwald",
"Bertrand M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3322 | Chau Yuen | Chau Yuen, Yong Liang Guan, Tjeng Thiang Tjhung | Power-Balanced Orthogonal Space-Time Block Code | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose two new systematic ways to construct amicable
orthogonal designs (AOD), with an aim to facilitate the construction of
power-balanced orthogonal spacetime block codes (O-STBC) with favorable
practical attributes. We also show that an AOD can be constructed from an
Amicable Family (AF), and such a construction is crucial for achieving a
power-balanced O-STBC. In addition, we develop design guidelines on how to
select the "type" parameter of an AOD so that the resultant O-STBC will have
better power-distribution and code-coefficient attributes. Among the new
O-STBCs obtained, one is shown to be optimal in terms of power distribution
attributes. In addition, one of the proposed construction methods is shown to
generalize some other construction methods proposed in the literature.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 06:34:12 GMT"
}
]
| 2008-06-23T00:00:00 | [
[
"Yuen",
"Chau",
""
],
[
"Guan",
"Yong Liang",
""
],
[
"Tjhung",
"Tjeng Thiang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3324 | Chau Yuen | Chau Yuen, Yong Liang Guan, Tjeng Thiang Tjhung | Optimizing Quasi-Orthogonal STBC Through Group-Constrained Linear
Transformation | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we first derive the generic algebraic structure of a
Quasi-Orthogonal STBC (QO-STBC). Next we propose Group-Constrained Linear
Transformation (GCLT) as a means to optimize the diversity and coding gains of
a QO-STBC with square or rectangular QAM constellations. Compared with QO-STBC
with constellation rotation (CR), we show that QO-STBC with GCLT requires only
half the number of symbols for joint detection, hence lower maximum-likelihood
decoding complexity. We also derive analytically the optimum GCLT parameters
for QO-STBC with square QAM constellation. The optimized QO-STBCs with GCLT are
able to achieve full transmit diversity, and have negligible performance loss
compared with QO-STBCs with CR at the same code rate.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 06:36:56 GMT"
}
]
| 2008-06-23T00:00:00 | [
[
"Yuen",
"Chau",
""
],
[
"Guan",
"Yong Liang",
""
],
[
"Tjhung",
"Tjeng Thiang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3325 | Chau Yuen | Chau Yuen, Yong Liang Guan, Tjeng Thiang Tjhung | On the Search for High-Rate Quasi-Orthogonal Space-Time Block Code | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Quasi-Orthogonal Space-Time Block Code (QO-STBC) is attractive because it
achieves higher code rate than Orthogonal STBC and lower decoding complexity
than nonorthogonal STBC. In this paper, we first derive the algebraic structure
of QO-STBC, then we apply it in a novel graph-based search algorithm to find
high-rate QO-STBCs with code rates greater than 1. From the four-antenna codes
found using this approach, it is found that the maximum code rate is limited to
5/4 with symbolwise diversity level of four, and 4 with symbolwise diversity
level of two. The maximum likelihood decoding of these high-rate QO-STBCs can
be performed on two separate sub-groups of symbols. The rate-5/4 codes are the
first known QO-STBCs with code rate greater 1 that has full symbolwise
diversity level.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 06:38:56 GMT"
}
]
| 2008-06-23T00:00:00 | [
[
"Yuen",
"Chau",
""
],
[
"Guan",
"Yong Liang",
""
],
[
"Tjhung",
"Tjeng Thiang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3328 | Chau Yuen | Wee Seng Chua, Chau Yuen, Yong Liang Guan, Francois Chin | Limited Feedback for Multi-Antenna Multi-user Communications with
Generalized Multi-Unitary Decomposition | PIMRC 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a decomposition method called Generalized
Multi-Unitary Decomposition (GMUD) which is useful in multi-user MIMO
precoding. This decomposition transforms a complex matrix H into PRQ, where R
is a special matrix whose first row contains only a non-zero user defined value
at the left-most position, P and Q are a pair of unitary matrices. The major
attraction of our proposed GMUD is we can obtain multiple solutions of P and Q
>. With GMUD, we propose a precoding method for a MIMO multi-user system that
does not require full channel state information (CSI) at the transmitter. The
proposed precoding method uses the multiple unitary matrices property to
compensate the inaccurate feedback information as the transmitter can steer the
transmission beams of individual users such that the inter-user interference is
kept minimum.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 07:08:08 GMT"
}
]
| 2008-06-23T00:00:00 | [
[
"Chua",
"Wee Seng",
""
],
[
"Yuen",
"Chau",
""
],
[
"Guan",
"Yong Liang",
""
],
[
"Chin",
"Francois",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3329 | Chau Yuen | Chau Yuen, Sumei Sun, Mel Meau Shin Ho | Beamforming Matrix Quantization with Variable Feedback Rate | PIMRC 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an improved beamforming matrix compression by Givens Rotation with
the use of variable feedback rate. The variable feedback rate means that the
number of bits used to represent the quantized beamforming matrix is based on
the value of the matrix. Compared with the fixed feedback rate scheme, the
proposed method has better performance without additional feedback bandwidth.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 07:10:03 GMT"
}
]
| 2008-06-23T00:00:00 | [
[
"Yuen",
"Chau",
""
],
[
"Sun",
"Sumei",
""
],
[
"Ho",
"Mel Meau Shin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3332 | Yonina C. Eldar | Yonina C. Eldar | Compressed Sensing of Analog Signals in Shift-Invariant Spaces | to appear in IEEE Trans. on Signal Processing | null | 10.1109/TSP.2009.2020750 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A traditional assumption underlying most data converters is that the signal
should be sampled at a rate exceeding twice the highest frequency. This
statement is based on a worst-case scenario in which the signal occupies the
entire available bandwidth. In practice, many signals are sparse so that only
part of the bandwidth is used. In this paper, we develop methods for low-rate
sampling of continuous-time sparse signals in shift-invariant (SI) spaces,
generated by m kernels with period T. We model sparsity by treating the case in
which only k out of the m generators are active, however, we do not know which
k are chosen. We show how to sample such signals at a rate much lower than m/T,
which is the minimal sampling rate without exploiting sparsity. Our approach
combines ideas from analog sampling in a subspace with a recently developed
block diagram that converts an infinite set of sparse equations to a finite
counterpart. Using these two components we formulate our problem within the
framework of finite compressed sensing (CS) and then rely on algorithms
developed in that context. The distinguishing feature of our results is that in
contrast to standard CS, which treats finite-length vectors, we consider
sampling of analog signals for which no underlying finite-dimensional model
exists. The proposed framework allows to extend much of the recent literature
on CS to the analog domain.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 07:33:20 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Mar 2009 19:00:23 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Eldar",
"Yonina C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3437 | Hang Dinh | Hang Dinh and Alexander Russell | Quantum and Randomized Lower Bounds for Local Search on
Vertex-Transitive Graphs | null | null | null | null | quant-ph cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of \emph{local search} on a graph. Given a real-valued
black-box function f on the graph's vertices, this is the problem of
determining a local minimum of f--a vertex v for which f(v) is no more than f
evaluated at any of v's neighbors. In 1983, Aldous gave the first strong lower
bounds for the problem, showing that any randomized algorithm requires
$\Omega(2^{n/2 - o(1)})$ queries to determine a local minima on the
n-dimensional hypercube. The next major step forward was not until 2004 when
Aaronson, introducing a new method for query complexity bounds, both
strengthened this lower bound to $\Omega(2^{n/2}/n^2)$ and gave an analogous
lower bound on the quantum query complexity. While these bounds are very
strong, they are known only for narrow families of graphs (hypercubes and
grids). We show how to generalize Aaronson's techniques in order to give
randomized (and quantum) lower bounds on the query complexity of local search
for the family of vertex-transitive graphs. In particular, we show that for any
vertex-transitive graph G of N vertices and diameter d, the randomized and
quantum query complexities for local search on G are $\Omega(N^{1/2}/d\log N)$
and $\Omega(N^{1/4}/\sqrt{d\log N})$, respectively.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 18:46:50 GMT"
}
]
| 2008-06-23T00:00:00 | [
[
"Dinh",
"Hang",
""
],
[
"Russell",
"Alexander",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0806.3456 | Hans Raj Tiwary | Khaled Elbassioni and Hans Raj Tiwary | On Computing the Vertex Centroid of a Polyhedron | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $\mathcal{P}$ be an $\mathcal{H}$-polytope in $\mathbb{R}^d$ with vertex
set $V$. The vertex centroid is defined as the average of the vertices in $V$.
We prove that computing the vertex centroid of an $\mathcal{H}$-polytope is
#P-hard. Moreover, we show that even just checking whether the vertex centroid
lies in a given halfspace is already #P-hard for $\mathcal{H}$-polytopes. We
also consider the problem of approximating the vertex centroid by finding a
point within an $\epsilon$ distance from it and prove this problem to be
#P-easy by showing that given an oracle for counting the number of vertices of
an $\mathcal{H}$-polytope, one can approximate the vertex centroid in
polynomial time. We also show that any algorithm approximating the vertex
centroid to \emph{any} ``sufficiently'' non-trivial (for example constant)
distance, can be used to construct a fully polynomial approximation scheme for
approximating the centroid and also an output-sensitive polynomial algorithm
for the Vertex Enumeration problem. Finally, we show that for unbounded
polyhedra the vertex centroid can not be approximated to a distance of
$d^{{1/2}-\delta}$ for any fixed constant $\delta>0$.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 20:56:19 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Elbassioni",
"Khaled",
""
],
[
"Tiwary",
"Hans Raj",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0806.3471 | Maria Gradinariu Potop-Butucaru | Davide Canepa and Maria Gradinariu Potop-Butucaru | Stabilizing Tiny Interaction Protocols | null | null | null | null | cs.DC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present the self-stabilizing implementation of a class of
token based algorithms. In the current work we only consider interactions
between weak nodes. They are uniform, they do not have unique identifiers, are
static and their interactions are restricted to a subset of nodes called
neighbours. While interacting, a pair of neighbouring nodes may create mobile
agents (that materialize in the current work the token abstraction) that
perform traversals of the network and accelerate the system stabilization. In
this work we only explore the power of oblivious stateless agents.
Our work shows that the agent paradigm is an elegant distributed tool for
achieving self-stabilization in Tiny Interaction Protocols (TIP). Nevertheless,
in order to reach the full power of classical self-stabilizing algorithms more
complex classes of agents have to be considered (e.g. agents with memory,
identifiers or communication skills). Interestingly, our work proposes for the
first time a model that unifies the recent studies in mobile robots(agents)
that evolve in a discrete space and the already established population
protocols paradigm.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 21:01:52 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Jun 2010 11:39:09 GMT"
}
]
| 2010-06-16T00:00:00 | [
[
"Canepa",
"Davide",
""
],
[
"Potop-Butucaru",
"Maria Gradinariu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0806.3474 | Torsten Ensslin | Torsten A. Ensslin, Mona Frommert, Francisco S. Kitaura | Information field theory for cosmological perturbation reconstruction
and non-linear signal analysis | 38 pages, 6 figures, LaTeX; version accepted by PRD | null | 10.1103/PhysRevD.80.105005 | J-MPA2270e | astro-ph cs.IT hep-th math.IT physics.data-an stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop information field theory (IFT) as a means of Bayesian inference on
spatially distributed signals, the information fields. A didactical approach is
attempted. Starting from general considerations on the nature of measurements,
signals, noise, and their relation to a physical reality, we derive the
information Hamiltonian, the source field, propagator, and interaction terms.
Free IFT reproduces the well known Wiener-filter theory. Interacting IFT can be
diagrammatically expanded, for which we provide the Feynman rules in position-,
Fourier-, and spherical harmonics space, and the Boltzmann-Shannon information
measure. The theory should be applicable in many fields. However, here, two
cosmological signal recovery problems are discussed in their IFT-formulation.
1) Reconstruction of the cosmic large-scale structure matter distribution from
discrete galaxy counts in incomplete galaxy surveys within a simple model of
galaxy formation. We show that a Gaussian signal, which should resemble the
initial density perturbations of the Universe, observed with a strongly
non-linear, incomplete and Poissonian-noise affected response, as the processes
of structure and galaxy formation and observations provide, can be
reconstructed thanks to the virtue of a response-renormalization flow equation.
2) We design a filter to detect local non-linearities in the cosmic microwave
background, which are predicted from some Early-Universe inflationary
scenarios, and expected due to measurement imperfections. This filter is the
optimal Bayes' estimator up to linear order in the non-linearity parameter and
can be used even to construct sky maps of non-linearities in the data.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 21:24:25 GMT"
},
{
"version": "v2",
"created": "Wed, 6 May 2009 18:30:53 GMT"
},
{
"version": "v3",
"created": "Tue, 29 Sep 2009 07:57:21 GMT"
}
]
| 2013-05-29T00:00:00 | [
[
"Ensslin",
"Torsten A.",
""
],
[
"Frommert",
"Mona",
""
],
[
"Kitaura",
"Francisco S.",
""
]
]
| [
null,
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "hep-th",
"description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.",
"span": "(High Energy Physics - Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
}
]
|
0806.3480 | Alena Aleksenko I | Oleg German, Evgeny Lakshtanov | "Minesweeper" and spectrum of discrete Laplacians | We add consideration of tables based on the triangle tiling of the
plane. Its paper version encounters situations typical for the computer
"Minesweeper" game | Applicable Analysis, Vol. 89, No. 12, December 2010, 1907-1916 | 10.1080/00036811.2010.505189 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper is devoted to a problem inspired by the "Minesweeper" computer
game. It is shown that certain configurations of open cells guarantee the
existence and the uniqueness of solution. Mathematically the problem is reduced
to some spectral properties of discrete differential operators. It is shown how
the uniqueness can be used to create a new game which preserves the spirit of
"Minesweeper" but does not require a computer.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2008 22:00:56 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Feb 2009 15:10:08 GMT"
},
{
"version": "v3",
"created": "Mon, 14 Dec 2009 00:16:59 GMT"
}
]
| 2010-11-09T00:00:00 | [
[
"German",
"Oleg",
""
],
[
"Lakshtanov",
"Evgeny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0806.3514 | Daniel Turner | D. Z. Turner and K. B. Nakshatrala and K. D. Hjelmstad | Consistent Newton-Raphson vs. fixed-point for variational multiscale
formulations for incompressible Navier-Stokes | 32 pages, 17 figures | null | null | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The following paper compares a consistent Newton-Raphson and fixed-point
iteration based solution strategy for a variational multiscale finite element
formulation for incompressible Navier-Stokes. The main contributions of this
work include a consistent linearization of the Navier-Stokes equations, which
provides an avenue for advanced algorithms that require origins in a consistent
method. We also present a comparison between formulations that differ only in
their linearization, but maintain all other equivalences. Using the variational
multiscale concept, we construct a stabilized formulation (that may be
considered an extension of the MINI element to nonlinear Navier-Stokes). We
then linearize the problem using fixed-point iteration and by deriving a
consistent tangent matrix for the update equation to obtain the solution via
Newton-Raphson iterations. We show that the consistent formulation converges in
fewer iterations, as expected, for several test problems. We also show that the
consistent formulation converges for problems for which fixed-point iteration
diverges. We present the results of both methods for problems of Reynold's
number up to 5000.
| [
{
"version": "v1",
"created": "Sat, 21 Jun 2008 14:43:31 GMT"
}
]
| 2008-06-24T00:00:00 | [
[
"Turner",
"D. Z.",
""
],
[
"Nakshatrala",
"K. B.",
""
],
[
"Hjelmstad",
"K. D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0806.3536 | Grenville Croll | Grenville J. Croll | In Pursuit of Spreadsheet Excellence | 7 pages, 2 tables. To Appear Proc. European Spreadsheet Risks
Interest Group, 2008 | null | null | null | cs.SE cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The first fully-documented study into the quantitative impact of errors in
operational spreadsheets identified an interesting anomaly. One of the five
participating organisations involved in the study contributed a set of five
spreadsheets of such quality that they set the organisation apart in a
statistical sense. This virtuoso performance gave rise to a simple sampling
test - The Clean Sheet Test - which can be used to objectively evaluate if an
organisation is in control of the spreadsheets it is using in important
processes such as financial reporting.
| [
{
"version": "v1",
"created": "Sun, 22 Jun 2008 00:14:09 GMT"
}
]
| 2008-06-24T00:00:00 | [
[
"Croll",
"Grenville J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0806.3537 | David Soloveichik | David Soloveichik | Statistical Learning of Arbitrary Computable Classifiers | Expanded the section on prior work and added references | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Statistical learning theory chiefly studies restricted hypothesis classes,
particularly those with finite Vapnik-Chervonenkis (VC) dimension. The
fundamental quantity of interest is the sample complexity: the number of
samples required to learn to a specified level of accuracy. Here we consider
learning over the set of all computable labeling functions. Since the
VC-dimension is infinite and a priori (uniform) bounds on the number of samples
are impossible, we let the learning algorithm decide when it has seen
sufficient samples to have learned. We first show that learning in this setting
is indeed possible, and develop a learning algorithm. We then show, however,
that bounding sample complexity independently of the distribution is
impossible. Notably, this impossibility is entirely due to the requirement that
the learning algorithm be computable, and not due to the statistical nature of
the problem.
| [
{
"version": "v1",
"created": "Sun, 22 Jun 2008 01:28:14 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Jul 2008 02:51:05 GMT"
}
]
| 2008-07-10T00:00:00 | [
[
"Soloveichik",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0806.3542 | Jiwoong Lee | Jiwoong Lee, Jean C. Walrand | Design and Analysis of an Asynchronous Zero Collision MAC Protocol | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes and analyzes a distributed MAC protocol that achieves
zero collision with no control message exchange nor synchronization. ZC
(ZeroCollision) is neither reservation-based nor dynamic TDMA; the protocol
supports variable-length packets and does not lose efficiency when some of the
stations do not transmit. At the same time, ZC is not a CSMA; in its steady
state, it is completely collision-free. The stations transmit repeatedly in a
round-robin order once the convergence state is reached. If some stations skip
their turn, their transmissions are replaced by idle $20 \mu$-second mini-slots
that enable the other stations to keep track of their order. Because of its
short medium access delay and its efficiency, the protocol supports both
real-time and elastic applications. The protocol allows for nodes leaving and
joining the network; it can allocate more throughput to specific nodes (such as
an access point). The protocol is robust against carrier sensing errors or
clock drift. While collision avoidance is guaranteed in a single collision
domain, it is not the case in a multiple collision one. However, experiments
show ZC supports a comparable amount of goodput to CSMA in a multiple collision
domain environment. The paper presents an analysis and extensive simulations of
the protocol, confirming that ZC outperforms both CSMA and TDMA at high and low
load.
| [
{
"version": "v1",
"created": "Sun, 22 Jun 2008 03:11:28 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Lee",
"Jiwoong",
""
],
[
"Walrand",
"Jean C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0806.3626 | Maciej Dziemianczuk | M. Dziemianczuk | On multi F-nomial coefficients and Inversion formula for F-nomial
coefficients | 11 pages, 2 figures | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In response to [6], we discover the looked for inversion formula for F-nomial
coefficients. Before supplying its proof, we generalize F-nomial coefficients
to multi F-nomial coefficients and we give their combinatorial interpretation
in cobweb posets language, as the number of maximal-disjoint blocks of the form
sP_{k_1,k_2,...,k_s} of layer <Phi_1-->Phi_n>. Then we present inversion
formula for F-nomial coefficients using multi F-nomial coefficients for all
cobweb-admissible sequences. To this end we infer also some identities as
conclusions of that inversion formula for the case of binomial, Gaussian and
Fibonomial coefficients.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 07:40:07 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Dec 2008 02:35:13 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Dziemianczuk",
"M.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0806.3628 | Chau Yuen | Su Kiang Kuek, Chau Yuen, Woon Hau Chin | Four-node Relay Network with Bi-directional Traffic Employing Wireless
Network Coding with Pre-cancellation | null | VTC Spring 2008 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network coding has the potential to improve the overall throughput of a
network by combining different streams of data and forwarding them. In wireless
networks, the wireless channel provide an excellent medium for physical layer
network coding as signals from different transmitters are combined
automatically by the wireless channel. In such scenarios, it would be
interesting to investigate protocols and algorithms which can optimally relay
information. In this paper, we look at a four-node two-way or bidirectional
relay network, and propose a relay protocol which can relay information
efficiently in this network.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 07:49:29 GMT"
}
]
| 2008-06-24T00:00:00 | [
[
"Kuek",
"Su Kiang",
""
],
[
"Yuen",
"Chau",
""
],
[
"Chin",
"Woon Hau",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3629 | Chau Yuen | Chau Yuen, Woon Hau Chin, Yong Liang Guan, Wenhua Chen, Taoyi Tee | Bi-Directional Multi-Antenna Relay Communications with Wireless Network
Coding | null | VTC Spring 2008 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider a two-way or bidirectional communications system
with a relay equipped with multiple antennas. We show that when the downlink
channel state information is not known at the relay, the benefit of having
additional antennas at the relay can only be obtained by using decode and
forward (DF) but not amplify and forward (AF). The gain becomes significant
when we employ transmit diversity together with wireless network coding. We
also demonstrate how the performance of such system can be improved by
performing antenna selection at the relay. Our results show that if downlink
channel state information is known at the relay, network coding may not provide
additional gain than simple antenna selection scheme.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 07:52:35 GMT"
}
]
| 2008-06-24T00:00:00 | [
[
"Yuen",
"Chau",
""
],
[
"Chin",
"Woon Hau",
""
],
[
"Guan",
"Yong Liang",
""
],
[
"Chen",
"Wenhua",
""
],
[
"Tee",
"Taoyi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3630 | Chau Yuen | Chau Yuen, Sumei Sun, Jian-Kang Zhang | Comparative Study of SVD and QRS in Closed-Loop Beamforming Systems | Milcom 2007 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We compare two closed-loop beamforming algorithms, one based on singular
value decomposition (SVD) and the other based on equal diagonal QR
decomposition (QRS). SVD has the advantage of parallelizing the MIMO channel,
but each of the sub-channels has different gain. QRS has the advantage of
having equal diagonal value for the decomposed channel, but the subchannels are
not fully parallelized, hence requiring successive interference cancellation or
other techniques to perform decoding. We consider a closed-loop system where
the feedback information is a unitary beamforming matrix. Due to the discrete
and limited modulation set, SVD may have inferior performance to QRS when no
modulation set selection is performed. However, if the selection of modulation
set is performed optimally, we show that SVD can outperform QRS.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 07:54:55 GMT"
}
]
| 2008-06-24T00:00:00 | [
[
"Yuen",
"Chau",
""
],
[
"Sun",
"Sumei",
""
],
[
"Zhang",
"Jian-Kang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3631 | Chau Yuen | Chau Yuen, Yan Wu, Sumei Sun | Comparative Study of Open-loop Transmit Diversity Schemes for Four
Transmit Antennas in Coded OFDM Systems | null | VTC Fall 2007 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We compare four open-loop transmit diversity schemes in a coded Orthogonal
Frequency Division Multiplexing (OFDM) system with four transmit antennas,
namely cyclic delay diversity (CDD), Space-Time Block Code (STBC, Alamouti code
is used) with CDD, Quasi-Orthogonal STBC (QO-STBC) and
Minimum-Decoding-Complexity QOSTBC (MDC-QOSTBC). We show that in a coded system
with low code rate, a scheme with spatial transmit diversity of second order
can achieve similar performance to that with spatial transmit diversity of
fourth order due to the additional diversity provided by the phase shift
diversity with channel coding. In addition, we also compare the decoding
complexity and other features of the above four mentioned schemes, such as the
requirement for the training signals, hybrid automatic retransmission request
(HARQ), etc. The discussions in this paper can be readily applied to future
wireless communication systems, such as mobile systems beyond 3G, IEEE 802.11
wireless LAN, or IEEE 802.16 WiMAX, that employ more than two transmit antennas
and OFDM.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 07:56:57 GMT"
}
]
| 2008-06-24T00:00:00 | [
[
"Yuen",
"Chau",
""
],
[
"Wu",
"Yan",
""
],
[
"Sun",
"Sumei",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3633 | Chau Yuen | Wee Seng Chua, Chau Yuen, Francois Chin | A Continuous Vector-Perturbation for Multi-Antenna Multi-User
Communication | null | VTC Spring 2007 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The sum-rate of the broadcast channel in a multi-antenna multi-user
communication system can be achieved by using precoding and adding a regular
perturbation to the data vector. The perturbation can be removed by the modulus
function, thus transparent to the receiver, but the information of the
precoding matrix is needed to decode the symbols. This paper proposes a new
technique to improve the multi-antenna multi-user system, by adding a
continuous perturbation to the data vector without the need of information on
the precoding matrix to be known at the receiver. The perturbation vector will
be treated as interference at the receiver, thus it will be transparent to the
receiver. The derivation of the continuous vector perturbation is provided by
maximizing the signal-to-interference plus noise ratio or minimizing the
minimum mean square error of the received signal.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 08:01:25 GMT"
}
]
| 2008-06-24T00:00:00 | [
[
"Chua",
"Wee Seng",
""
],
[
"Yuen",
"Chau",
""
],
[
"Chin",
"Francois",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3646 | George Eskander MSc | George S. Eskander, Amir Atiya, Kil To Chong, Hyongsuk Kim, Sung Goo
Yoo | Round Trip Time Prediction Using the Symbolic Function Network Approach | null | ISITC, pp. 3-7, 2007 International Symposium on Information
Technology Convergence (ISITC 2007), 2007 | null | null | cs.NE cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we develop a novel approach to model the Internet round trip
time using a recently proposed symbolic type neural network model called
symbolic function network. The developed predictor is shown to have good
generalization performance and simple representation compared to the multilayer
perceptron based predictors.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 10:04:14 GMT"
},
{
"version": "v2",
"created": "Sat, 9 Aug 2008 21:45:53 GMT"
}
]
| 2008-08-11T00:00:00 | [
[
"Eskander",
"George S.",
""
],
[
"Atiya",
"Amir",
""
],
[
"Chong",
"Kil To",
""
],
[
"Kim",
"Hyongsuk",
""
],
[
"Yoo",
"Sung Goo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0806.3650 | Vitaly Skachek | Vitaly Skachek | Recursive Code Construction for Random Networks | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2039163 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A modification of Koetter-Kschischang codes for random networks is presented
(these codes were also studied by Wang et al. in the context of authentication
problems). The new codes have higher information rate, while maintaining the
same error-correcting capabilities. An efficient error-correcting algorithm is
proposed for these codes.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 10:58:53 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jul 2008 18:24:31 GMT"
},
{
"version": "v3",
"created": "Fri, 16 Oct 2009 08:01:50 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Skachek",
"Vitaly",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3653 | Samir Medina Perlaza | Samir Medina Perlaza, Merouane Debbah, Samson Lasaulce and Jean-Marie
Chaufray | Opportunistic Interference Alignment in MIMO Interference Channels | To appear in proc. IEEE PIMRC 2008 - Workshop in Emerging Network
Perspectives in Multiuser and Cooperative MIMO (NWMIMO). 5 pages and 4
figures | null | 10.1109/PIMRC.2008.4699872 | null | cs.GT cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present two interference alignment techniques such that an opportunistic
point-to-point multiple input multiple output (MIMO) link can reuse, without
generating any additional interference, the same frequency band of a similar
pre-existing primary link. In this scenario, we exploit the fact that under
power constraints, although each radio maximizes independently its rate by
water-filling on their channel transfer matrix singular values, frequently, not
all of them are used. Therefore, by aligning the interference of the
opportunistic radio it is possible to transmit at a significant rate while
insuring zero-interference on the pre-existing link. We propose a linear
pre-coder for a perfect interference alignment and a power allocation scheme
which maximizes the individual data rate of the secondary link. Our numerical
results show that significant data rates are achieved even for a reduced number
of antennas.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 11:20:18 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Jun 2008 12:31:55 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Perlaza",
"Samir Medina",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Lasaulce",
"Samson",
""
],
[
"Chaufray",
"Jean-Marie",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3668 | Bodo Manthey | Markus Bl\"aser, Bodo Manthey, Oliver Putz | Approximating Multi-Criteria Max-TSP | An extended abstract of this worl will appear in Proc. of the 16th
Ann. European Symposium on Algorithms (ESA 2008) | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present randomized approximation algorithms for multi-criteria Max-TSP.
For Max-STSP with k > 1 objective functions, we obtain an approximation ratio
of $1/k - \eps$ for arbitrarily small $\eps > 0$. For Max-ATSP with k objective
functions, we obtain an approximation ratio of $1/(k+1) - \eps$.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 12:28:10 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Bläser",
"Markus",
""
],
[
"Manthey",
"Bodo",
""
],
[
"Putz",
"Oliver",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0806.3681 | Alessandro Nordio | Alessandro Nordio, Carla-Fabiana Chiasserini, Emanuele Viterbo | On the d-dimensional Quasi-Equally Spaced Sampling | submitted to IEEE Transactions on Signal Processing | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a class of random matrices that appear in several communication and
signal processing applications, and whose asymptotic eigenvalue distribution is
closely related to the reconstruction error of an irregularly sampled
bandlimited signal. We focus on the case where the random variables
characterizing these matrices are d-dimensional vectors, independent, and
quasi-equally spaced, i.e., they have an arbitrary distribution and their
averages are vertices of a d-dimensional grid. Although a closed form
expression of the eigenvalue distribution is still unknown, under these
conditions we are able (i) to derive the distribution moments as the matrix
size grows to infinity, while its aspect ratio is kept constant, and (ii) to
show that the eigenvalue distribution tends to the Marcenko-Pastur law as
d->infinity. These results can find application in several fields, as an
example we show how they can be used for the estimation of the mean square
error provided by linear reconstruction techniques.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 13:20:10 GMT"
}
]
| 2008-06-24T00:00:00 | [
[
"Nordio",
"Alessandro",
""
],
[
"Chiasserini",
"Carla-Fabiana",
""
],
[
"Viterbo",
"Emanuele",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3708 | Jocelyne Troccaz | S\'ebastien Martin (TIMC), Vincent Daanen (TIMC), Jocelyne Troccaz
(TIMC) | Atlas-Based Prostate Segmentation Using an Hybrid Registration | International Journal of Computer Assisted Radiology and Surgery
(2008) 000-999 | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Purpose: This paper presents the preliminary results of a semi-automatic
method for prostate segmentation of Magnetic Resonance Images (MRI) which aims
to be incorporated in a navigation system for prostate brachytherapy. Methods:
The method is based on the registration of an anatomical atlas computed from a
population of 18 MRI exams onto a patient image. An hybrid registration
framework which couples an intensity-based registration with a robust
point-matching algorithm is used for both atlas building and atlas
registration. Results: The method has been validated on the same dataset that
the one used to construct the atlas using the "leave-one-out method". Results
gives a mean error of 3.39 mm and a standard deviation of 1.95 mm with respect
to expert segmentations. Conclusions: We think that this segmentation tool may
be a very valuable help to the clinician for routine quantitative image
exploitation.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 15:43:28 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Martin",
"Sébastien",
"",
"TIMC"
],
[
"Daanen",
"Vincent",
"",
"TIMC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0806.3710 | Stevan Harnad | A. Blondin Masse, G. Chicoisne, Y. Gargouri, S. Harnad, O. Picard, O.
Marcotte | How Is Meaning Grounded in Dictionary Definitions? | 8 pages, 3 figures, TextGraphs-3 Workshop at the 22nd International
Conference on Computational Linguistics, Coling 2008, Manchester, 18-22
August, 2008 | null | null | null | cs.CL cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Meaning cannot be based on dictionary definitions all the way down: at some
point the circularity of definitions must be broken in some way, by grounding
the meanings of certain words in sensorimotor categories learned from
experience or shaped by evolution. This is the "symbol grounding problem." We
introduce the concept of a reachable set -- a larger vocabulary whose meanings
can be learned from a smaller vocabulary through definition alone, as long as
the meanings of the smaller vocabulary are themselves already grounded. We
provide simple algorithms to compute reachable sets for any given dictionary.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 15:53:05 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Jul 2008 01:59:09 GMT"
}
]
| 2008-07-15T00:00:00 | [
[
"Masse",
"A. Blondin",
""
],
[
"Chicoisne",
"G.",
""
],
[
"Gargouri",
"Y.",
""
],
[
"Harnad",
"S.",
""
],
[
"Picard",
"O.",
""
],
[
"Marcotte",
"O.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0806.3765 | Philipp Mayr | Philipp Mayr, Vivien Petras | Cross-concordances: terminology mapping and its effectiveness for
information retrieval | 19 pages, 4 figures, 11 tables, IFLA conference 2008 | null | null | null | cs.DL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The German Federal Ministry for Education and Research funded a major
terminology mapping initiative, which found its conclusion in 2007. The task of
this terminology mapping initiative was to organize, create and manage
'cross-concordances' between controlled vocabularies (thesauri, classification
systems, subject heading lists) centred around the social sciences but quickly
extending to other subject areas. 64 crosswalks with more than 500,000
relations were established. In the final phase of the project, a major
evaluation effort to test and measure the effectiveness of the vocabulary
mappings in an information system environment was conducted. The paper reports
on the cross-concordance work and evaluation results.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 20:37:10 GMT"
}
]
| 2008-06-25T00:00:00 | [
[
"Mayr",
"Philipp",
""
],
[
"Petras",
"Vivien",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0806.3787 | Ted Pedersen | Ted Pedersen (University of Minnesota, Duluth) | Computational Approaches to Measuring the Similarity of Short Contexts :
A Review of Applications and Methods | 23 pages | University of Minnesota Supercomputing Institute Research Report
UMSI 2010/118, October 2010 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Measuring the similarity of short written contexts is a fundamental problem
in Natural Language Processing. This article provides a unifying framework by
which short context problems can be categorized both by their intended
application and proposed solution. The goal is to show that various problems
and methodologies that appear quite different on the surface are in fact very
closely related. The axes by which these categorizations are made include the
format of the contexts (headed versus headless), the way in which the contexts
are to be measured (first-order versus second-order similarity), and the
information used to represent the features in the contexts (micro versus macro
views). The unifying thread that binds together many short context applications
and methods is the fact that similarity decisions must be made between contexts
that share few (if any) words in common.
| [
{
"version": "v1",
"created": "Mon, 23 Jun 2008 23:27:20 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Oct 2010 19:08:13 GMT"
}
]
| 2010-10-19T00:00:00 | [
[
"Pedersen",
"Ted",
"",
"University of Minnesota, Duluth"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0806.3799 | Sina Jafarpour | Robert Calderbank, Stephen Howard, Sina Jafarpour | A Sublinear Algorithm for Sparse Reconstruction with l2/l2 Recovery
Guarantees | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressed Sensing aims to capture attributes of a sparse signal using very
few measurements. Cand\`{e}s and Tao showed that sparse reconstruction is
possible if the sensing matrix acts as a near isometry on all
$\boldsymbol{k}$-sparse signals. This property holds with overwhelming
probability if the entries of the matrix are generated by an iid Gaussian or
Bernoulli process. There has been significant recent interest in an alternative
signal processing framework; exploiting deterministic sensing matrices that
with overwhelming probability act as a near isometry on $\boldsymbol{k}$-sparse
vectors with uniformly random support, a geometric condition that is called the
Statistical Restricted Isometry Property or StRIP. This paper considers a
family of deterministic sensing matrices satisfying the StRIP that are based on
\srm codes (binary chirps) and a $\boldsymbol{k}$-sparse reconstruction
algorithm with sublinear complexity. In the presence of stochastic noise in the
data domain, this paper derives bounds on the $\boldsymbol{\ell_2}$ accuracy of
approximation in terms of the $\boldsymbol{\ell_2}$ norm of the measurement
noise and the accuracy of the best $\boldsymbol{k}$-sparse approximation, also
measured in the $\boldsymbol{\ell_2}$ norm. This type of $\boldsymbol{\ell_2
/\ell_2}$ bound is tighter than the standard $\boldsymbol{\ell_2 /\ell_1}$ or
$\boldsymbol{\ell_1/ \ell_1}$ bounds.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 02:16:08 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Oct 2009 22:54:03 GMT"
}
]
| 2009-10-18T00:00:00 | [
[
"Calderbank",
"Robert",
""
],
[
"Howard",
"Stephen",
""
],
[
"Jafarpour",
"Sina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3802 | Sina Jafarpour | Sina Jafarpour, Weiyu Xu, Babak Hassibi, Robert Calderbank | Efficient and Robust Compressed Sensing using High-Quality Expander
Graphs | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Expander graphs have been recently proposed to construct efficient compressed
sensing algorithms. In particular, it has been shown that any $n$-dimensional
vector that is $k$-sparse (with $k\ll n$) can be fully recovered using
$O(k\log\frac{n}{k})$ measurements and only $O(k\log n)$ simple recovery
iterations. In this paper we improve upon this result by considering expander
graphs with expansion coefficient beyond 3/4 and show that, with the same
number of measurements, only $O(k)$ recovery iterations are required, which is
a significant improvement when $n$ is large. In fact, full recovery can be
accomplished by at most $2k$ very simple iterations. The number of iterations
can be made arbitrarily close to $k$, and the recovery algorithm can be
implemented very efficiently using a simple binary search tree. We also show
that by tolerating a small penalty on the number of measurements, and not on
the number of recovery iterations, one can use the efficient construction of a
family of expander graphs to come up with explicit measurement matrices for
this method. We compare our result with other recently developed
expander-graph-based methods and argue that it compares favorably both in terms
of the number of required measurements and in terms of the recovery time
complexity. Finally we will show how our analysis extends to give a robust
algorithm that finds the position and sign of the $k$ significant elements of
an almost $k$-sparse signal and then, using very simple optimization
techniques, finds in sublinear time a $k$-sparse signal which approximates the
original signal with very high precision.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 03:07:00 GMT"
}
]
| 2008-06-25T00:00:00 | [
[
"Jafarpour",
"Sina",
""
],
[
"Xu",
"Weiyu",
""
],
[
"Hassibi",
"Babak",
""
],
[
"Calderbank",
"Robert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.3827 | Mugurel Ionut Andreica | Mugurel Ionut Andreica | Optimal Scheduling of File Transfers with Divisible Sizes on Multiple
Disjoint Paths | The algorithmic techniques presented in this paper (particularly the
block partitioning framework) were used as part of the official solutions for
several tasks proposed by the author in the 2012 Romanian National Olympiad
in Informatics (the statements and solutions for these tasks can be found in
the attached zip archive) | Proceedings of the IEEE Romania International Conference
"Communications", 2008. (ISBN: 978-606-521-008-0), Bucharest : Romania (2008) | null | null | cs.DS cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper I investigate several offline and online data transfer
scheduling problems and propose efficient algorithms and techniques for
addressing them. In the offline case, I present a novel, heuristic, algorithm
for scheduling files with divisible sizes on multiple disjoint paths, in order
to maximize the total profit (the problem is equivalent to the multiple
knapsack problem with divisible item sizes). I then consider a cost
optimization problem for transferring a sequence of identical files, subject to
time constraints imposed by the data transfer providers. For the online case I
propose an algorithmic framework based on the block partitioning method, which
can speed up the process of resource allocation and reservation.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 07:16:26 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Dec 2012 08:42:41 GMT"
}
]
| 2012-12-21T00:00:00 | [
[
"Andreica",
"Mugurel Ionut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0806.3849 | Etienne Lozes | Daniel Hirschkoff, Etienne Lozes, Davide Sangiorgi | Separability in the Ambient Logic | logical methods in computer science, 44 pages | Logical Methods in Computer Science, Volume 4, Issue 3 (September
4, 2008) lmcs:682 | 10.2168/LMCS-4(3:4)2008 | null | cs.LO cs.MA cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The \it{Ambient Logic} (AL) has been proposed for expressing properties of
process mobility in the calculus of Mobile Ambients (MA), and as a basis for
query languages on semistructured data. We study some basic questions
concerning the discriminating power of AL, focusing on the equivalence on
processes induced by the logic $(=_L>)$. As underlying calculi besides MA we
consider a subcalculus in which an image-finiteness condition holds and that we
prove to be Turing complete. Synchronous variants of these calculi are studied
as well. In these calculi, we provide two operational characterisations of
$_=L$: a coinductive one (as a form of bisimilarity) and an inductive one
(based on structual properties of processes). After showing $_=L$ to be stricly
finer than barbed congruence, we establish axiomatisations of $_=L$ on the
subcalculus of MA (both the asynchronous and the synchronous version), enabling
us to relate $_=L$ to structural congruence. We also present some
(un)decidability results that are related to the above separation properties
for AL: the undecidability of $_=L$ on MA and its decidability on the
subcalculus.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 10:00:00 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Sep 2008 07:13:38 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Hirschkoff",
"Daniel",
""
],
[
"Lozes",
"Etienne",
""
],
[
"Sangiorgi",
"Davide",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0806.3885 | Vincent Tariel | Vincent Tariel | Conceptualization of seeded region growing by pixels aggregation. Part
1: the framework | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Adams and Bishop have proposed in 1994 a novel region growing algorithm
called seeded region growing by pixels aggregation (SRGPA). This paper
introduces a framework to implement an algorithm using SRGPA. This framework is
built around two concepts: localization and organization of applied action.
This conceptualization gives a quick implementation of algorithms, a direct
translation between the mathematical idea and the numerical implementation, and
an improvement of algorithms efficiency.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 13:43:06 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Tariel",
"Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0806.3887 | Vincent Tariel | Vincent Tariel | Conceptualization of seeded region growing by pixels aggregation. Part
2: how to localize a final partition invariant about the seeded region
initialisation order | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the previous paper, we have conceptualized the localization and the
organization of seeded region growing by pixels aggregation (SRGPA) but we do
not give the issue when there is a collision between two distinct regions
during the growing process. In this paper, we propose two implementations to
manage two classical growing processes: one without a boundary region region to
divide the other regions and another with. Unfortunately, as noticed by Mehnert
and Jakway (1997), this partition depends on the seeded region initialisation
order (SRIO). We propose a growing process, invariant about SRIO such as the
boundary region is the set of ambiguous pixels.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 13:34:15 GMT"
}
]
| 2008-06-25T00:00:00 | [
[
"Tariel",
"Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0806.3906 | Jessica Langner | Werner Kirsch and Jessica Langner | Power Indices and minimal winning Coalitions | null | null | null | null | math.CO cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Penrose-Banzhaf index and the Shapley-Shubik index are the best-known and
the most used tools to measure political power of voters in simple voting
games. Most methods to calculate these power indices are based on counting
winning coalitions, in particular those coalitions a voter is decisive for. We
present a new combinatorial formula how to calculate both indices solely using
the set of minimal winning coalitions.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 14:36:46 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Feb 2009 16:05:07 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Feb 2009 13:52:55 GMT"
},
{
"version": "v4",
"created": "Thu, 5 Feb 2009 07:27:29 GMT"
},
{
"version": "v5",
"created": "Mon, 16 Mar 2009 13:46:07 GMT"
}
]
| 2009-03-16T00:00:00 | [
[
"Kirsch",
"Werner",
""
],
[
"Langner",
"Jessica",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0806.3928 | Vincent Tariel | Vincent Tariel | Conceptualization of seeded region growing by pixels aggregation. Part
3: a wide range of algorithms | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the two previous papers of this serie, we have created a library, called
Population, dedicated to seeded region growing by pixels aggregation and we
have proposed different growing processes to get a partition with or without a
boundary region to divide the other regions or to get a partition invariant
about the seeded region initialisation order. Using this work, we implement
some algorithms belonging to the field of SRGPA using this library and these
growing processes.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 17:02:47 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Tariel",
"Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0806.3938 | Haluk Bingol | Ilker Yildirim and Haluk Bingol | Cooperation with Complement is Better | 9 pages | null | null | null | cs.MA physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a setting where heterogeneous agents interact to accomplish a given set of
goals, cooperation is of utmost importance, especially when agents cannot
achieve their individual goals by exclusive use of their own efforts. Even when
we consider friendly environments and benevolent agents, cooperation involves
several issues: with whom to cooperate, reciprocation, how to address credit
assignment and complex division of gains, etc. We propose a model where
heterogeneous agents cooperate by forming groups and formation of larger groups
is promoted. Benefit of agents is proportional to the performance and the size
of the group. There is a time pressure to form a group. We investigate how
preferring similar or complement agents in group formation affects an agent's
success. Preferring complement in group formation is found to be better, yet
there is no need to push the strategy to the extreme since the effect of
complementing partners is saturated.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 17:38:05 GMT"
}
]
| 2008-06-25T00:00:00 | [
[
"Yildirim",
"Ilker",
""
],
[
"Bingol",
"Haluk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0806.3939 | Vincent Tariel | Vincent Tariel | Conceptualization of seeded region growing by pixels aggregation. Part
4: Simple, generic and robust extraction of grains in granular materials
obtained by X-ray tomography | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a simple, generic and robust method to extract the grains
from experimental tridimensionnal images of granular materials obtained by
X-ray tomography. This extraction has two steps: segmentation and splitting.
For the segmentation step, if there is a sufficient contrast between the
different components, a classical threshold procedure followed by a succession
of morphological filters can be applied. If not, and if the boundary needs to
be localized precisely, a watershed transformation controlled by labels is
applied. The basement of this transformation is to localize a label included in
the component and another label in the component complementary. A "soft"
threshold following by an opening is applied on the initial image to localize a
label in a component. For any segmentation procedure, the visualisation shows a
problem: some groups of two grains, close one to each other, become connected.
So if a classical cluster procedure is applied on the segmented binary image,
these numerical connected grains are considered as a single grain. To overcome
this problem, we applied a procedure introduced by L. Vincent in 1993. This
grains extraction is tested for various complexes porous media and granular
material, to predict various properties (diffusion, electrical conductivity,
deformation field) in a good agreement with experiment data.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 17:40:25 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jul 2008 15:09:43 GMT"
}
]
| 2008-07-23T00:00:00 | [
[
"Tariel",
"Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0806.3949 | Robert R. Tucci | Robert R. Tucci | Use of a Quantum Computer and the Quick Medical Reference To Give an
Approximate Diagnosis | v1:14 pages (files: 1 .tex, 1 .sty, 5 .eps);v2:19 pages (files: 1
.tex, 1 .sty, 5 .eps)added stuff about likelihood weighting | null | null | null | quant-ph cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Quick Medical Reference (QMR) is a compendium of statistical knowledge
connecting diseases to findings (symptoms). The information in QMR can be
represented as a Bayesian network. The inference problem (or, in more medical
language, giving a diagnosis) for the QMR is to, given some findings, find the
probability of each disease. Rejection sampling and likelihood weighted
sampling (a.k.a. likelihood weighting) are two simple algorithms for making
approximate inferences from an arbitrary Bayesian net (and from the QMR
Bayesian net in particular). Heretofore, the samples for these two algorithms
have been obtained with a conventional "classical computer". In this paper, we
will show that two analogous algorithms exist for the QMR Bayesian net, where
the samples are obtained with a quantum computer. We expect that these two
algorithms, implemented on a quantum computer, can also be used to make
inferences (and predictions) with other Bayesian nets.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 18:29:13 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Jul 2008 15:48:12 GMT"
}
]
| 2008-07-29T00:00:00 | [
[
"Tucci",
"Robert R.",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0806.3963 | Daniel Turner | D. Z. Turner and K. B. Nakshatrala and K. D. Hjelmstad | A stabilized finite element formulation for advection-diffusion using
the generalized finite element framework | 24 pages, 11 figures | null | null | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The following work presents a generalized (extended) finite element
formulation for the advection-diffusion equation. Using enrichment functions
that represent the exponential nature of the exact solution, smooth numerical
solutions are obtained for problems with steep gradients and high Peclet
numbers (up to Pe = 25) in one and two-dimensions. As opposed to traditional
stabilized methods that require the construction of stability parameters and
stabilization terms, the present work avoids numerical instabilities by
improving the classical Galerkin solution with an enrichment function. To
contextualize this method among other stabilized methods, we show by
decomposition of the solution (in a multiscale manner) an equivalence to both
Galerkin/least-squares type methods and those that use bubble functions. This
work also presents a strategy for constructing the enrichment function for
problems with complex geometries by employing a global-local approach.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 19:56:38 GMT"
}
]
| 2008-06-25T00:00:00 | [
[
"Turner",
"D. Z.",
""
],
[
"Nakshatrala",
"K. B.",
""
],
[
"Hjelmstad",
"K. D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0806.3978 | Vincent Vu | Vincent Q. Vu, Bin Yu, Robert E. Kass | Information In The Non-Stationary Case | null | null | null | null | q-bio.NC cs.IT math.IT q-bio.QM stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Information estimates such as the ``direct method'' of Strong et al. (1998)
sidestep the difficult problem of estimating the joint distribution of response
and stimulus by instead estimating the difference between the marginal and
conditional entropies of the response. While this is an effective estimation
strategy, it tempts the practitioner to ignore the role of the stimulus and the
meaning of mutual information. We show here that, as the number of trials
increases indefinitely, the direct (or ``plug-in'') estimate of marginal
entropy converges (with probability 1) to the entropy of the time-averaged
conditional distribution of the response, and the direct estimate of the
conditional entropy converges to the time-averaged entropy of the conditional
distribution of the response. Under joint stationarity and ergodicity of the
response and stimulus, the difference of these quantities converges to the
mutual information. When the stimulus is deterministic or non-stationary the
direct estimate of information no longer estimates mutual information, which is
no longer meaningful, but it remains a measure of variability of the response
distribution across time.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2008 20:13:08 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Jul 2008 23:29:00 GMT"
}
]
| 2008-07-19T00:00:00 | [
[
"Vu",
"Vincent Q.",
""
],
[
"Yu",
"Bin",
""
],
[
"Kass",
"Robert E.",
""
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
}
]
|
0806.4020 | Agus Budiyono PhD | Muljowidodo, Said D. Jenie, Agus Budiyono, Sapto A. Nugroho | Design, Development and Testing of Underwater Vehicles: ITB Experience | 6 pages, 8 figures, 1 table; The International Conference on
Underwater System Technology: Theory and Application, Penang, Malaysia, 18-21
July 2006 | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The last decade has witnessed increasing worldwide interest in the research
of underwater robotics with particular focus on the area of autonomous
underwater vehicles (AUVs). The underwater robotics technology has enabled
human to access the depth of the ocean to conduct environmental surveys,
resources mapping as well as scientific and military missions. This capability
is especially valuable for countries with major water or oceanic resources. As
an archipelagic nation with more than 13,000 islands, Indonesia has one of the
most abundant living and non-organic oceanic resources. The needs for the
mapping, exploration, and environmental preservation of the vast marine
resources are therefore imperative. The challenge of the deep water exploration
has been the complex issues associated with hazardous and unstructured undersea
and sea-bed environments. The paper reports the design, development and testing
efforts of underwater vehicle that have been conducted at Institut Teknologi
Bandung. Key technology areas have been identified and step-by-step development
is presented in conjunction with the need to meet the challenge of underwater
vehicle operation. A number of future research directions are also highlighted.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2008 03:56:40 GMT"
}
]
| 2008-06-26T00:00:00 | [
[
"Muljowidodo",
"",
""
],
[
"Jenie",
"Said D.",
""
],
[
"Budiyono",
"Agus",
""
],
[
"Nugroho",
"Sapto A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0806.4021 | Agus Budiyono PhD | Agus Budiyono, H.Y Sutarto | Linear Parameter Varying Model Identification for Control of
Rotorcraft-based UAV | 6 pages, 6 figures; Fifth Indonesia-Taiwan Workshop on Aeronautical
Science, Technology and Industry, Tainan, Taiwan, November 13-16, 2006 | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A rotorcraft-based unmanned aerial vehicle exhibits more complex properties
compared to its full-size counterparts due to its increased sensitivity to
control inputs and disturbances and higher bandwidth of its dynamics. As an
aerial vehicle with vertical take-off and landing capability, the helicopter
specifically poses a difficult problem of transition between forward flight and
unstable hover and vice versa. The LPV control technique explicitly takes into
account the change in performance due to the real-time parameter variations.
The technique therefore theoretically guarantees the performance and robustness
over the entire operating envelope. In this study, we investigate a new
approach implementing model identification for use in the LPV control
framework. The identification scheme employs recursive least square technique
implemented on the LPV system represented by dynamics of helicopter during a
transition. The airspeed as the scheduling of parameter trajectory is not
assumed to vary slowly. The exclusion of slow parameter change requirement
allows for the application of the algorithm for aggressive maneuvering
capability without the need of expensive computation. The technique is tested
numerically and will be validated in the autonomous flight of a small scale
helicopter.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2008 04:09:29 GMT"
}
]
| 2008-06-26T00:00:00 | [
[
"Budiyono",
"Agus",
""
],
[
"Sutarto",
"H. Y",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0806.4034 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | Data linkage dynamics with shedding | 22 pages; introduction improved. arXiv admin note: substantial text
overlap with arXiv:0804.4565 | Fundamenta Informaticae, 103(1--4):31--52, 2010 | 10.3233/FI-2010-317 | PRG0809 | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study shedding in the setting of data linkage dynamics, a simple model of
computation that bears on the use of dynamic data structures in programming.
Shedding is complementary to garbage collection. With shedding, each time a
link to a data object is updated by a program, it is determined whether or not
the link will possibly be used once again by the program, and if not the link
is automatically removed. Thus, everything is made garbage as soon as it can be
viewed as garbage. By that, the effectiveness of garbage collection becomes
maximal.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2008 07:15:35 GMT"
},
{
"version": "v2",
"created": "Fri, 7 May 2010 15:11:57 GMT"
}
]
| 2012-10-20T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0806.4073 | Frank Gurski | Frank Gurski | A comparison of two approaches for polynomial time algorithms computing
basic graph parameters | 25 pages, 3 figures | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we compare and illustrate the algorithmic use of graphs of
bounded tree-width and graphs of bounded clique-width. For this purpose we give
polynomial time algorithms for computing the four basic graph parameters
independence number, clique number, chromatic number, and clique covering
number on a given tree structure of graphs of bounded tree-width and graphs of
bounded clique-width in polynomial time. We also present linear time algorithms
for computing the latter four basic graph parameters on trees, i.e. graphs of
tree-width 1, and on co-graphs, i.e. graphs of clique-width at most 2.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2008 11:26:47 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Gurski",
"Frank",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0806.4112 | Lenka Zdeborova | Lenka Zdeborov\'a | Statistical Physics of Hard Optimization Problems | PhD thesis | Acta Physica Slovaca 59, No.3, 169-303 (2009) | null | null | cond-mat.stat-mech cond-mat.dis-nn cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Optimization is fundamental in many areas of science, from computer science
and information theory to engineering and statistical physics, as well as to
biology or social sciences. It typically involves a large number of variables
and a cost function depending on these variables. Optimization problems in the
NP-complete class are particularly difficult, it is believed that the number of
operations required to minimize the cost function is in the most difficult
cases exponential in the system size. However, even in an NP-complete problem
the practically arising instances might, in fact, be easy to solve. The
principal question we address in this thesis is: How to recognize if an
NP-complete constraint satisfaction problem is typically hard and what are the
main reasons for this? We adopt approaches from the statistical physics of
disordered systems, in particular the cavity method developed originally to
describe glassy systems. We describe new properties of the space of solutions
in two of the most studied constraint satisfaction problems - random
satisfiability and random graph coloring. We suggest a relation between the
existence of the so-called frozen variables and the algorithmic hardness of a
problem. Based on these insights, we introduce a new class of problems which we
named "locked" constraint satisfaction, where the statistical description is
easily solvable, but from the algorithmic point of view they are even more
challenging than the canonical satisfiability.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2008 14:40:11 GMT"
}
]
| 2009-07-08T00:00:00 | [
[
"Zdeborová",
"Lenka",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0806.4127 | Marc Dohm | Marc Dohm (JAD, INRIA Sophia Antipolis), Severinas Zube | The implicit equation of a canal surface | 26 pages, to be published in Journal of Symbolic Computation | null | 10.1016/j.jsc.2008.06.001 | null | math.AG cs.SC math.AC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A canal surface is an envelope of a one parameter family of spheres. In this
paper we present an efficient algorithm for computing the implicit equation of
a canal surface generated by a rational family of spheres. By using Laguerre
and Lie geometries, we relate the equation of the canal surface to the equation
of a dual variety of a certain curve in 5-dimensional projective space. We
define the \mu-basis for arbitrary dimension and give a simple algorithm for
its computation. This is then applied to the dual variety, which allows us to
deduce the implicit equations of the the dual variety, the canal surface and
any offset to the canal surface.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2008 15:22:16 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Dohm",
"Marc",
"",
"JAD, INRIA Sophia Antipolis"
],
[
"Zube",
"Severinas",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
]
|
0806.4130 | Thomas Schneider | Martin Mundhenk (1), Thomas Schneider (2), Thomas Schwentick (3),
Volker Weber (3) ((1) University of Jena, (2) University of Manchester, (3)
University of Dortmund) | Complexity of Hybrid Logics over Transitive Frames | 21 pages, 6 figures (only 2 thereof are in external files) | Workshop "Methods for Modalities" (M4M-4), Informatik-Berichte,
194, pp. 62-78, 2005. ISSN 0863-095X | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper examines the complexity of hybrid logics over transitive frames,
transitive trees, and linear frames. We show that satisfiability over
transitive frames for the hybrid language extended with the downarrow operator
is NEXPTIME-complete. This is in contrast to undecidability of satisfiability
over arbitrary frames for this language (Areces, Blackburn, Marx 1999). It is
also shown that adding the @ operator or the past modality leads to
undecidability over transitive frames. This is again in contrast to the case of
transitive trees and linear frames, where we show these languages to be
nonelementarily decidable. Moreover, we establish 2EXPTIME and EXPTIME upper
bounds for satisfiability over transitive frames and transitive trees,
respectively, for the hybrid Until/Since language. An EXPTIME lower bound is
shown to hold for the modal Until language over both frame classes.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2008 15:38:43 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Mundhenk",
"Martin",
""
],
[
"Schneider",
"Thomas",
""
],
[
"Schwentick",
"Thomas",
""
],
[
"Weber",
"Volker",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0806.4168 | Paul Slater | Paul B. Slater | Established Clustering Procedures for Network Analysis | 8 pages | null | null | null | physics.soc-ph cs.SI physics.data-an stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In light of the burgeoning interest in network analysis in the new millenium,
we bring to the attention of contemporary network theorists, a two-stage
double-standarization and hierarchical clustering (single-linkage-like)
procedure devised in 1974. In its many applications over the next
decade--primarily to the migration flows between geographic subdivisions within
nations--the presence was often revealed of ``hubs''. These are, typically,
``cosmopolitan/non-provincial'' areas--such as the French capital, Paris--which
send and receive people relatively broadly across their respective nations.
Additionally, this two-stage procedure--which ``might very well be the most
successful application of cluster analysis'' (R. C. Dubes)--has detected many
(physically or socially) isolated groups (regions) of areas, such as those
forming the southern islands, Shikoku and Kyushu, of Japan, the Italian islands
of Sardinia and Sicily, and the New England region of the United States.
Further, we discuss a (complementary) approach developed in 1976, involving the
application of the max-flow/min-cut theorem to raw/non-standardized flows.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2008 18:20:57 GMT"
}
]
| 2012-07-03T00:00:00 | [
[
"Slater",
"Paul B.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
]
|
0806.4200 | Ghadamali Bagherikaram | Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani | The Secrecy Rate Region of the Broadcast Channel | 12 pages, 4 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider a scenario where a source node wishes to broadcast
two confidential messages for two respective receivers, while a wire-tapper
also receives the transmitted signal. This model is motivated by wireless
communications, where individual secure messages are broadcast over open media
and can be received by any illegitimate receiver. The secrecy level is measured
by equivocation rate at the eavesdropper. We first study the general
(non-degraded) broadcast channel with confidential messages. We present an
inner bound on the secrecy capacity region for this model. The inner bound
coding scheme is based on a combination of random binning and the
Gelfand-Pinsker bining. This scheme matches the Marton's inner bound on the
broadcast channel without confidentiality constraint. We further study the
situation where the channels are degraded. For the degraded broadcast channel
with confidential messages, we present the secrecy capacity region. Our
achievable coding scheme is based on Cover's superposition scheme and random
binning. We refer to this scheme as Secret Superposition Scheme. In this
scheme, we show that randomization in the first layer increases the secrecy
rate of the second layer. This capacity region matches the capacity region of
the degraded broadcast channel without security constraint. It also matches the
secrecy capacity for the conventional wire-tap channel. Our converse proof is
based on a combination of the converse proof of the conventional degraded
broadcast channel and Csiszar lemma. Finally, we assume that the channels are
Additive White Gaussian Noise (AWGN) and show that secret superposition scheme
with Gaussian codebook is optimal. The converse proof is based on the
generalized entropy power inequality.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2008 21:05:41 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jul 2008 16:35:17 GMT"
},
{
"version": "v3",
"created": "Thu, 17 Jul 2008 22:22:40 GMT"
},
{
"version": "v4",
"created": "Wed, 30 Jul 2008 19:13:48 GMT"
}
]
| 2008-07-30T00:00:00 | [
[
"Bagherikaram",
"Ghadamali",
""
],
[
"Motahari",
"Abolfazl S.",
""
],
[
"Khandani",
"Amir K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.4210 | Jan Arpe | Jan Arpe and Elchanan Mossel | Agnostically Learning Juntas from Random Walks | 12 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that the class of functions g:{-1,+1}^n -> {-1,+1} that only depend
on an unknown subset of k<<n variables (so-called k-juntas) is agnostically
learnable from a random walk in time polynomial in n, 2^{k^2}, epsilon^{-k},
and log(1/delta). In other words, there is an algorithm with the claimed
running time that, given epsilon, delta > 0 and access to a random walk on
{-1,+1}^n labeled by an arbitrary function f:{-1,+1}^n -> {-1,+1}, finds with
probability at least 1-delta a k-junta that is (opt(f)+epsilon)-close to f,
where opt(f) denotes the distance of a closest k-junta to f.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2008 23:18:44 GMT"
}
]
| 2008-06-27T00:00:00 | [
[
"Arpe",
"Jan",
""
],
[
"Mossel",
"Elchanan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0806.4221 | Mirela Damian | Mirela Damian and Sriram V. Pemmaraju | Localized Spanners for Wireless Networks | 21 pages | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new efficient localized algorithm to construct, for any given
quasi-unit disk graph G=(V,E) and any e > 0, a (1+e)-spanner for G of maximum
degree O(1) and total weight O(w(MST)), where w(MST) denotes the weight of a
minimum spanning tree for V. We further show that similar localized techniques
can be used to construct, for a given unit disk graph G = (V, E), a planar
Cdel(1+e)(1+pi/2)-spanner for G of maximum degree O(1) and total weight
O(w(MST)). Here Cdel denotes the stretch factor of the unit Delaunay
triangulation for V. Both constructions can be completed in O(1) communication
rounds, and require each node to know its own coordinates.
| [
{
"version": "v1",
"created": "Thu, 26 Jun 2008 02:09:17 GMT"
}
]
| 2008-06-27T00:00:00 | [
[
"Damian",
"Mirela",
""
],
[
"Pemmaraju",
"Sriram V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0806.4264 | Jay Kumar Sundararajan | Jay Kumar Sundararajan, Devavrat Shah, Muriel M\'edard | Online network coding for optimal throughput and delay -- the
three-receiver case | This is the final version. The content has been changed to
incorporate reviewer comments and recent results | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a packet erasure broadcast channel with three receivers, we propose a new
coding algorithm that makes use of feedback to dynamically adapt the code. Our
algorithm is throughput optimal, and we conjecture that it also achieves an
asymptotically optimal average decoding delay at the receivers. We consider
heavy traffic asymptotics, where the load factor \rho approaches 1 from below
with either the arrival rate (\lambda) or the channel parameter (\mu) being
fixed at a number less than 1. We verify through simulations that our algorithm
achieves an asymptotically optimal decoding delay of O(1/(1-\rho)).
| [
{
"version": "v1",
"created": "Thu, 26 Jun 2008 09:15:54 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Sep 2008 16:14:10 GMT"
}
]
| 2008-09-29T00:00:00 | [
[
"Sundararajan",
"Jay Kumar",
""
],
[
"Shah",
"Devavrat",
""
],
[
"Médard",
"Muriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.4286 | Maxim Arnold | M.D. Arnold and A.V. Khokhlov | Implementation for blow up of tornado-type solutions for complex version
of 3D Navier-Stokes system | null | null | null | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider Cauchy problem for Fourier transformation of 3-dimensional
Navier-Stokes system with zero external force. Using initial data purposed by
Dong Li and Ya.G.Sinai we implement self-similar regime producing fast growing
behavior of the energy of solution while time tends to critical value.
| [
{
"version": "v1",
"created": "Thu, 26 Jun 2008 11:03:49 GMT"
}
]
| 2008-06-27T00:00:00 | [
[
"Arnold",
"M. D.",
""
],
[
"Khokhlov",
"A. V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0806.4293 | Boris Kudryashov D. | Boris D. Kudryashov, Anton V. Porov, and Eunmi L. Oh | Scalar Quantization for Audio Data Coding | null | null | null | null | cs.MM cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is concerned with scalar quantization of transform coefficients in
an audio codec. The generalized Gaussian distribution (GGD) is used as an
approximation of one-dimensional probability density function for transform
coefficients obtained by modulated lapped transform (MLT) or modified cosine
transform (MDCT) filterbank. The rationale of the model is provided in
comparison with theoretically achievable rate-distortion function. The
rate-distortion function computed for the random sequence obtained from a real
sequence of samples from a large database is compared with that computed for
random sequence obtained by a GGD random generator. A simple algorithm of
constructing the Extended Zero Zone (EZZ) quantizer is proposed. Simulation
results show that the EZZ quantizer yields a negligible loss in terms of coding
efficiency compared to optimal scalar quantizers. Furthermore, we describe an
adaptive version of the EZZ quantizer which works efficiently with low bitrate
requirements for transmitting side information
| [
{
"version": "v1",
"created": "Thu, 26 Jun 2008 12:19:27 GMT"
}
]
| 2008-06-27T00:00:00 | [
[
"Kudryashov",
"Boris D.",
""
],
[
"Porov",
"Anton V.",
""
],
[
"Oh",
"Eunmi L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.4326 | Jeff M Phillips | Pankaj K. Agarwal and Jeff M. Phillips | An Efficient Algorithm for 2D Euclidean 2-Center with Outliers | 19 pages, 6 figures. Longer version of paper in ESA08. Adds section
on l_\infty (p,k)-center | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a set P of n points in R^2, the Euclidean 2-center problem computes a
pair of congruent disks of the minimal radius that cover P. We extend this to
the (2,k)-center problem where we compute the minimal radius pair of congruent
disks to cover n-k points of P. We present a randomized algorithm with O(n k^7
log^3 n) expected running time for the (2,k)-center problem. We also study the
(p,k)-center problem in R}^2 under the \ell_\infty-metric. We give solutions
for p=4 in O(k^{O(1)} n log n) time and for p=5 in O(k^{O(1)} n log^5 n) time.
| [
{
"version": "v1",
"created": "Thu, 26 Jun 2008 15:10:28 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Sep 2008 02:07:21 GMT"
}
]
| 2008-09-13T00:00:00 | [
[
"Agarwal",
"Pankaj K.",
""
],
[
"Phillips",
"Jeff M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0806.4341 | Vladimir Vyugin | Vladimir V. V'yugin | On Sequences with Non-Learnable Subsequences | null | LNCS 5010, pp. 302-313, 2008 | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The remarkable results of Foster and Vohra was a starting point for a series
of papers which show that any sequence of outcomes can be learned (with no
prior knowledge) using some universal randomized forecasting algorithm and
forecast-dependent checking rules. We show that for the class of all
computationally efficient outcome-forecast-based checking rules, this property
is violated. Moreover, we present a probabilistic algorithm generating with
probability close to one a sequence with a subsequence which simultaneously
miscalibrates all partially weakly computable randomized forecasting
algorithms. %subsequences non-learnable by each randomized algorithm.
According to the Dawid's prequential framework we consider partial recursive
randomized algorithms.
| [
{
"version": "v1",
"created": "Thu, 26 Jun 2008 15:21:00 GMT"
}
]
| 2008-06-27T00:00:00 | [
[
"V'yugin",
"Vladimir V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0806.4344 | Peter Bro Miltersen | Kristoffer Arnsfelt Hansen, Thomas Dueholm Hansen, Peter Bro
Miltersen, Troels Bjerre S{\o}rensen | Approximability and parameterized complexity of minmax values | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider approximating the minmax value of a multi-player game in
strategic form. Tightening recent bounds by Borgs et al., we observe that
approximating the value with a precision of epsilon log n digits (for any
constant epsilon>0 is NP-hard, where n is the size of the game. On the other
hand, approximating the value with a precision of c log log n digits (for any
constant c >= 1) can be done in quasi-polynomial time. We consider the
parameterized complexity of the problem, with the parameter being the number of
pure strategies k of the player for which the minmax value is computed. We show
that if there are three players, k=2 and there are only two possible rational
payoffs, the minmax value is a rational number and can be computed exactly in
linear time. In the general case, we show that the value can be approximated
with any polynomial number of digits of accuracy in time n^(O(k)). On the other
hand, we show that minmax value approximation is W[1]-hard and hence not likely
to be fixed parameter tractable. Concretely, we show that if k-CLIQUE requires
time n^(Omega(k)) then so does minmax value computation.
| [
{
"version": "v1",
"created": "Thu, 26 Jun 2008 15:31:53 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Hansen",
"Kristoffer Arnsfelt",
""
],
[
"Hansen",
"Thomas Dueholm",
""
],
[
"Miltersen",
"Peter Bro",
""
],
[
"Sørensen",
"Troels Bjerre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0806.4361 | Yakov Nekrich | Marek Karpinski, Yakov Nekrich | Space Efficient Multi-Dimensional Range Reporting | null | null | null | null | cs.DS cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a data structure that supports three-dimensional range reporting
queries in $O(\log \log U + (\log \log n)^3+k)$ time and uses $O(n\log^{1+\eps}
n)$ space, where $U$ is the size of the universe, $k$ is the number of points
in the answer,and $\eps$ is an arbitrary constant. This result improves over
the data structure of Alstrup, Brodal, and Rauhe (FOCS 2000) that uses
$O(n\log^{1+\eps} n)$ space and supports queries in $O(\log n+k)$ time,the data
structure of Nekrich (SoCG'07) that uses $O(n\log^{3} n)$ space and supports
queries in $O(\log \log U + (\log \log n)^2 + k)$ time, and the data structure
of Afshani (ESA'08) that uses $O(n\log^{3} n)$ space and also supports queries
in $O(\log \log U + (\log \log n)^2 + k)$ time but relies on randomization
during the preprocessing stage. Our result allows us to significantly reduce
the space usage of the fastest previously known static and incremental
$d$-dimensional data structures, $d\geq 3$, at a cost of increasing the query
time by a negligible $O(\log \log n)$ factor.
| [
{
"version": "v1",
"created": "Thu, 26 Jun 2008 16:32:57 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Apr 2009 12:08:08 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Karpinski",
"Marek",
""
],
[
"Nekrich",
"Yakov",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0806.4372 | Stavros Nikolopoulos D. | Katerina Asdre and Stavros D. Nikolopoulos | The 1-fixed-endpoint Path Cover Problem is Polynomial on Interval Graph | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a variant of the path cover problem, namely, the
$k$-fixed-endpoint path cover problem, or kPC for short, on interval graphs.
Given a graph $G$ and a subset $\mathcal{T}$ of $k$ vertices of $V(G)$, a
$k$-fixed-endpoint path cover of $G$ with respect to $\mathcal{T}$ is a set of
vertex-disjoint paths $\mathcal{P}$ that covers the vertices of $G$ such that
the $k$ vertices of $\mathcal{T}$ are all endpoints of the paths in
$\mathcal{P}$. The kPC problem is to find a $k$-fixed-endpoint path cover of
$G$ of minimum cardinality; note that, if $\mathcal{T}$ is empty the stated
problem coincides with the classical path cover problem. In this paper, we
study the 1-fixed-endpoint path cover problem on interval graphs, or 1PC for
short, generalizing the 1HP problem which has been proved to be NP-complete
even for small classes of graphs. Motivated by a work of Damaschke, where he
left both 1HP and 2HP problems open for the class of interval graphs, we show
that the 1PC problem can be solved in polynomial time on the class of interval
graphs. The proposed algorithm is simple, runs in $O(n^2)$ time, requires
linear space, and also enables us to solve the 1HP problem on interval graphs
within the same time and space complexity.
| [
{
"version": "v1",
"created": "Thu, 26 Jun 2008 18:13:31 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Asdre",
"Katerina",
""
],
[
"Nikolopoulos",
"Stavros D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0806.4391 | Vladimir Vyugin | Vladimir V. V'yugin | Prediction with Expert Advice in Games with Unbounded One-Step Gains | 16 pages | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The games of prediction with expert advice are considered in this paper. We
present some modification of Kalai and Vempala algorithm of following the
perturbed leader for the case of unrestrictedly large one-step gains. We show
that in general case the cumulative gain of any probabilistic prediction
algorithm can be much worse than the gain of some expert of the pool.
Nevertheless, we give the lower bound for this cumulative gain in general case
and construct a universal algorithm which has the optimal performance; we also
prove that in case when one-step gains of experts of the pool have ``limited
deviations'' the performance of our algorithm is close to the performance of
the best expert.
| [
{
"version": "v1",
"created": "Thu, 26 Jun 2008 20:21:06 GMT"
}
]
| 2008-06-30T00:00:00 | [
[
"V'yugin",
"Vladimir V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0806.4415 | Chandra Nair | Chandra Nair, Vincent Wang Zizhou | On the inner and outer bounds of 3-receiver broadcast channels with
2-degraded message sets | 5 pages, | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a broadcast channel with 3 receivers and 2 messages (M0, M1)
where two of the three receivers need to decode messages (M0, M1) while the
remaining one just needs to decode the message M0. We study the best known
inner and outer bounds under this setting, in an attempt to find the
deficiencies with the current techniques of establishing the bounds. We produce
a simple example where we are able to explicitly evaluate the inner bound and
show that it differs from the general outer bound. For a class of channels
where the general inner and outer bounds differ, we use a new argument to show
that the inner bound is tight.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2008 01:50:27 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Jan 2009 06:15:07 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Nair",
"Chandra",
""
],
[
"Zizhou",
"Vincent Wang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.4422 | Ping Li | Ping Li | Computationally Efficient Estimators for Dimension Reductions Using
Stable Random Projections | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The method of stable random projections is a tool for efficiently computing
the $l_\alpha$ distances using low memory, where $0<\alpha \leq 2$ is a tuning
parameter. The method boils down to a statistical estimation task and various
estimators have been proposed, based on the geometric mean, the harmonic mean,
and the fractional power etc.
This study proposes the optimal quantile estimator, whose main operation is
selecting, which is considerably less expensive than taking fractional power,
the main operation in previous estimators. Our experiments report that the
optimal quantile estimator is nearly one order of magnitude more
computationally efficient than previous estimators. For large-scale learning
tasks in which storing and computing pairwise distances is a serious
bottleneck, this estimator should be desirable.
In addition to its computational advantages, the optimal quantile estimator
exhibits nice theoretical properties. It is more accurate than previous
estimators when $\alpha>1$. We derive its theoretical error bounds and
establish the explicit (i.e., no hidden constants) sample complexity bound.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2008 05:19:19 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Li",
"Ping",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0806.4423 | Ping Li | Ping Li | On Approximating the Lp Distances for p>2 | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Applications in machine learning and data mining require computing pairwise
Lp distances in a data matrix A. For massive high-dimensional data, computing
all pairwise distances of A can be infeasible. In fact, even storing A or all
pairwise distances of A in the memory may be also infeasible. This paper
proposes a simple method for p = 2, 4, 6, ... We first decompose the l_p (where
p is even) distances into a sum of 2 marginal norms and p-1 ``inner products''
at different orders. Then we apply normal or sub-Gaussian random projections to
approximate the resultant ``inner products,'' assuming that the marginal norms
can be computed exactly by a linear scan. We propose two strategies for
applying random projections. The basic projection strategy requires only one
projection matrix but it is more difficult to analyze, while the alternative
projection strategy requires p-1 projection matrices but its theoretical
analysis is much easier. In terms of the accuracy, at least for p=4, the basic
strategy is always more accurate than the alternative strategy if the data are
non-negative, which is common in reality.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2008 05:36:09 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Li",
"Ping",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0806.4451 | MinJi Kim | MinJi Kim, Muriel Medard, Joao Barros | Counteracting Byzantine Adversaries with Network Coding: An Overhead
Analysis | 7 pages, 5 figures, MILCOM 2008 | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network coding increases throughput and is robust against failures and
erasures. However, since it allows mixing of information within the network, a
single corrupted packet generated by a Byzantine attacker can easily
contaminate the information to multiple destinations.
In this paper, we study the transmission overhead associated with three
different schemes for detecting Byzantine adversaries at a node using network
coding: end-to-end error correction, packet-based Byzantine detection scheme,
and generation-based Byzantine detection scheme. In end-to-end error
correction, it is known that we can correct up to the min-cut between the
source and destinations. However, if we use Byzantine detection schemes, we can
detect polluted data, drop them, and therefore, only transmit valid data. For
the dropped data, the destinations perform erasure correction, which is
computationally lighter than error correction. We show that, with enough
attackers present in the network, Byzantine detection schemes may improve the
throughput of the network since we choose to forward only reliable information.
When the probability of attack is high, a packet-based detection scheme is the
most bandwidth efficient; however, when the probability of attack is low, the
overhead involved with signing each packet becomes costly, and the
generation-based scheme may be preferred. Finally, we characterize the tradeoff
between generation size and overhead of detection in bits as the probability of
attack increases in the network.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2008 08:41:59 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Sep 2008 04:04:44 GMT"
},
{
"version": "v3",
"created": "Fri, 27 Mar 2009 04:42:24 GMT"
}
]
| 2009-03-27T00:00:00 | [
[
"Kim",
"MinJi",
""
],
[
"Medard",
"Muriel",
""
],
[
"Barros",
"Joao",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.4468 | Rui Zhang | Rui Zhang, Shuguang Cui, and Ying-Chang Liang | On Ergodic Sum Capacity of Fading Cognitive Multiple-Access and
Broadcast Channels | To appear in IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2030449 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the information-theoretic limits of a secondary or
cognitive radio (CR) network under spectrum sharing with an existing primary
radio network. In particular, the fading cognitive multiple-access channel
(C-MAC) is first studied, where multiple secondary users transmit to the
secondary base station (BS) under both individual transmit-power constraints
and a set of interference-power constraints each applied at one of the primary
receivers. This paper considers the long-term (LT) or the short-term (ST)
transmit-power constraint over the fading states at each secondary transmitter,
combined with the LT or ST interference-power constraint at each primary
receiver. In each case, the optimal power allocation scheme is derived for the
secondary users to achieve the ergodic sum capacity of the fading C-MAC, as
well as the conditions for the optimality of the dynamic
time-division-multiple-access (D-TDMA) scheme in the secondary network. The
fading cognitive broadcast channel (C-BC) that models the downlink transmission
in the secondary network is then studied under the LT/ST transmit-power
constraint at the secondary BS jointly with the LT/ST interference-power
constraint at each of the primary receivers. It is shown that D-TDMA is indeed
optimal for achieving the ergodic sum capacity of the fading C-BC for all
combinations of transmit-power and interference-power constraints.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2008 09:32:01 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Aug 2009 05:59:45 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Zhang",
"Rui",
""
],
[
"Cui",
"Shuguang",
""
],
[
"Liang",
"Ying-Chang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.4484 | Vladimir Vyugin | Vladimir V'yugin | On empirical meaning of randomness with respect to a real parameter | 14 pages | LNCS 4649, pp. 387-396, 2007 | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the empirical meaning of randomness with respect to a family of
probability distributions $P_\theta$, where $\theta$ is a real parameter, using
algorithmic randomness theory. In the case when for a computable probability
distribution $P_\theta$ an effectively strongly consistent estimate exists, we
show that the Levin's a priory semicomputable semimeasure of the set of all
$P_\theta$-random sequences is positive if and only if the parameter $\theta$
is a computable real number. The different methods for generating
``meaningful'' $P_\theta$-random sequences with noncomputable $\theta$ are
discussed.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2008 10:49:33 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Jun 2009 20:07:47 GMT"
}
]
| 2009-06-25T00:00:00 | [
[
"V'yugin",
"Vladimir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0806.4510 | Casper Thomsen | Olav Geil, Ryutaroh Matsumoto, Casper Thomsen | On Field Size and Success Probability in Network Coding | 16 pages, 3 figures, 2 tables. Accepted for publication at
International Workshop on the Arithmetic of Finite Fields, WAIFI 2008 | Proceedings of the 2nd International Workshop on the Arithmetic of
Finite Fields, WAIFI 2008, pp. 157-173 | 10.1007/978-3-540-69499-1_14 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using tools from algebraic geometry and Groebner basis theory we solve two
problems in network coding. First we present a method to determine the smallest
field size for which linear network coding is feasible. Second we derive
improved estimates on the success probability of random linear network coding.
These estimates take into account which monomials occur in the support of the
determinant of the product of Edmonds matrices. Therefore we finally
investigate which monomials can occur in the determinant of the Edmonds matrix.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2008 13:05:32 GMT"
}
]
| 2008-09-04T00:00:00 | [
[
"Geil",
"Olav",
""
],
[
"Matsumoto",
"Ryutaroh",
""
],
[
"Thomsen",
"Casper",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.4511 | Konstantin Wishnevsky Mr. | Konstantin P. Wishnevsky | The model of quantum evolution | This paper has been withdrawn | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn by the author due to extremely unscientific
errors.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2008 12:59:45 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Aug 2008 17:42:24 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Sep 2008 17:26:10 GMT"
},
{
"version": "v4",
"created": "Mon, 16 Feb 2009 16:25:45 GMT"
},
{
"version": "v5",
"created": "Wed, 23 Oct 2013 04:21:06 GMT"
}
]
| 2013-10-24T00:00:00 | [
[
"Wishnevsky",
"Konstantin P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0806.4526 | Thomas Claveirole | Thomas Claveirole and Marcelo Dias de Amorim | WiPal: Efficient Offline Merging of IEEE 802.11 Traces | 6 pages | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Merging wireless traces is a fundamental step in measurement-based studies
involving multiple packet sniffers. Existing merging tools either require a
wired infrastructure or are limited in their usability. We propose WiPal, an
offline merging tool for IEEE 802.11 traces that has been designed to be
efficient and simple to use. WiPal is flexible in the sense that it does not
require any specific services, neither from monitors (like synchronization,
access to a wired network, or embedding specific software) nor from its
software environment (e.g. an SQL server). We present WiPal's operation and
show how its features - notably, its modular design - improve both ease of use
and efficiency. Experiments on real traces show that WiPal is an order of
magnitude faster than other tools providing the same features. To our
knowledge, WiPal is the only offline trace merger that can be used by the
research community in a straightforward fashion.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2008 13:54:10 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Dec 2008 14:34:30 GMT"
}
]
| 2008-12-23T00:00:00 | [
[
"Claveirole",
"Thomas",
""
],
[
"de Amorim",
"Marcelo Dias",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0806.4553 | Viorica Sofronie-Stokkermans | Viorica Sofronie-Stokkermans | Interpolation in local theory extensions | 31 pages, 1 figure | Logical Methods in Computer Science, Volume 4, Issue 4 (October
17, 2008) lmcs:1143 | 10.2168/LMCS-4(4:1)2008 | null | cs.LO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study interpolation in local extensions of a base theory. We
identify situations in which it is possible to obtain interpolants in a
hierarchical manner, by using a prover and a procedure for generating
interpolants in the base theory as black-boxes. We present several examples of
theory extensions in which interpolants can be computed this way, and discuss
applications in verification, knowledge representation, and modular reasoning
in combinations of local theories.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2008 15:51:02 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Oct 2008 22:01:02 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Sofronie-Stokkermans",
"Viorica",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0806.4572 | Vladimir Vyugin | V.V.V'yugin | Problems of robustness for universal coding schemes | 23 pages | Problems of Information Transmission, 39 (2003), pp. 32-46 | null | null | cs.IT cs.OH math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Lempel-Ziv universal coding scheme is asymptotically optimal for the
class of all stationary ergodic sources. A problem of robustness of this
property under small violations of ergodicity is studied. A notion of
deficiency of algorithmic randomness is used as a measure of disagreement
between data sequence and probability measure. We prove that universal
compressing schemes from a large class are non-robust in the following sense:
if the randomness deficiency grows arbitrarily slowly on initial fragments of
an infinite sequence then the property of asymptotic optimality of any
universal compressing algorithm can be violated. Lempel-Ziv compressing
algorithms are robust on infinite sequences generated by ergodic Markov chains
when the randomness deficiency of its initial fragments of length $n$ grows as
$o(n)$.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2008 17:13:00 GMT"
}
]
| 2008-06-30T00:00:00 | [
[
"V'yugin",
"V. V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.4627 | Thomas Hornung | Michael Schmidt, Thomas Hornung, Georg Lausen, Christoph Pinkel | SP2Bench: A SPARQL Performance Benchmark | Conference paper to appear in Proc. ICDE'09 | null | null | null | cs.DB cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, the SPARQL query language for RDF has reached the W3C
recommendation status. In response to this emerging standard, the database
community is currently exploring efficient storage techniques for RDF data and
evaluation strategies for SPARQL queries. A meaningful analysis and comparison
of these approaches necessitates a comprehensive and universal benchmark
platform. To this end, we have developed SP^2Bench, a publicly available,
language-specific SPARQL performance benchmark. SP^2Bench is settled in the
DBLP scenario and comprises both a data generator for creating arbitrarily
large DBLP-like documents and a set of carefully designed benchmark queries.
The generated documents mirror key characteristics and social-world
distributions encountered in the original DBLP data set, while the queries
implement meaningful requests on top of this data, covering a variety of SPARQL
operator constellations and RDF access patterns. As a proof of concept, we
apply SP^2Bench to existing engines and discuss their strengths and weaknesses
that follow immediately from the benchmark results.
| [
{
"version": "v1",
"created": "Mon, 30 Jun 2008 15:31:26 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Oct 2008 14:44:17 GMT"
}
]
| 2008-10-21T00:00:00 | [
[
"Schmidt",
"Michael",
""
],
[
"Hornung",
"Thomas",
""
],
[
"Lausen",
"Georg",
""
],
[
"Pinkel",
"Christoph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0806.4631 | Anton Salikhmetov | Anton Salikhmetov | The Heap Lambda Machine | 14 pages, 4 figures, source code appendix | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a new machine architecture for evaluating lambda
expressions using the normal-order reduction, which guarantees that every
lambda expression will be evaluated if the expression has its normal form and
the system has enough memory. The architecture considered here operates using
heap memory only. Lambda expressions are represented as graphs, and all
algorithms used in the processing unit of this machine are non-recursive.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2008 23:22:38 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Nov 2010 18:10:02 GMT"
}
]
| 2010-11-05T00:00:00 | [
[
"Salikhmetov",
"Anton",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0806.4648 | Icius Committee | A. Budiyono, and T. Sudiyanto | An Algebraic Approach for the MIMO Control of Small Scale Helicopter | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 9 pages, 11 figures | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-A014 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The control of small-scale helicopter is a MIMO problem. To use of classical
control approach to formally solve a MIMO problem, one needs to come up with
multidimensional Root Locus diagram to tune the control parameters. The problem
with the required dimension of the RL diagram for MIMO design has forced the
design procedure of classical approach to be conducted in cascaded multi-loop
SISO system starting from the innermost loop outward. To implement this control
approach for a helicopter, a pitch and roll attitude control system is often
subordinated to a, respectively, longitudinal and lateral velocity control
system in a nested architecture. The requirement for this technique to work is
that the inner attitude control loop must have a higher bandwidth than the
outer velocity control loop which is not the case for high performance mini
helicopter. To address the above problems, an algebraic design approach is
proposed in this work. The designed control using s-CDM approach is
demonstrated for hovering control of small-scale helicopter simultaneously
subjected to plant parameter uncertainties and wind disturbances.
| [
{
"version": "v1",
"created": "Sat, 28 Jun 2008 04:36:03 GMT"
}
]
| 2008-07-01T00:00:00 | [
[
"Budiyono",
"A.",
""
],
[
"Sudiyanto",
"T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0806.4650 | Icius Committee | Ismoyo Haryanto, Joga Dharma Setiawan, and Agus Budiyono | Structural Damage Detection Using Randomized Trained Neural Networks | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 5 pages, 9 figures, and 4 tables | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-C022 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A computationally method on damage detection problems in structures was
conducted using neural networks. The problem that is considered in this works
consists of estimating the existence, location and extent of stiffness
reduction in structure which is indicated by the changes of the structural
static parameters such as deflection and strain. The neural network was trained
to recognize the behaviour of static parameter of the undamaged structure as
well as of the structure with various possible damage extent and location which
were modelled as random states. The proposed techniques were applied to detect
damage in a simply supported beam. The structure was analyzed using
finite-element-method (FEM) and the damage identification was conducted by a
back-propagation neural network using the change of the structural strain and
displacement. The results showed that using proposed method the strain is more
efficient for identification of damage than the displacement.
| [
{
"version": "v1",
"created": "Sat, 28 Jun 2008 04:43:40 GMT"
}
]
| 2008-07-01T00:00:00 | [
[
"Haryanto",
"Ismoyo",
""
],
[
"Setiawan",
"Joga Dharma",
""
],
[
"Budiyono",
"Agus",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0806.4652 | Yong Gao | Yong Gao | A Fixed-Parameter Algorithm for Random Instances of Weighted d-CNF
Satisfiability | 13 pages | null | null | null | cs.DS cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study random instances of the weighted $d$-CNF satisfiability problem
(WEIGHTED $d$-SAT), a generic W[1]-complete problem. A random instance of the
problem consists of a fixed parameter $k$ and a random $d$-CNF formula
$\weicnf{n}{p}{k, d}$ generated as follows: for each subset of $d$ variables
and with probability $p$, a clause over the $d$ variables is selected uniformly
at random from among the $2^d - 1$ clauses that contain at least one negated
literals.
We show that random instances of WEIGHTED $d$-SAT can be solved in $O(k^2n +
n^{O(1)})$-time with high probability, indicating that typical instances of
WEIGHTED $d$-SAT under this instance distribution are fixed-parameter
tractable. The result also hold for random instances from the model
$\weicnf{n}{p}{k,d}(d')$ where clauses containing less than $d' (1 < d' < d)$
negated literals are forbidden, and for random instances of the renormalized
(miniaturized) version of WEIGHTED $d$-SAT in certain range of the random
model's parameter $p(n)$. This, together with our previous results on the
threshold behavior and the resolution complexity of unsatisfiable instances of
$\weicnf{n}{p}{k, d}$, provides an almost complete characterization of the
typical-case behavior of random instances of WEIGHTED $d$-SAT.
| [
{
"version": "v1",
"created": "Sat, 28 Jun 2008 05:03:47 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Gao",
"Yong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0806.4667 | Kaibin Huang | Kaibin Huang, Yan Chen, Bin Chen, Xia Yang, and Vincent K. N. Lau | Overlaid Cellular and Mobile Ad Hoc Networks | 5 pages; submitted to IEEE ICCS 2008 (Guangzhou, P.R.China) | null | 10.1109/ICCS.2008.4737445 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In cellular systems using frequency division duplex, growing Internet
services cause unbalance of uplink and downlink traffic, resulting in poor
uplink spectrum utilization. Addressing this issue, this paper considers
overlaying an ad hoc network onto a cellular uplink network for improving
spectrum utilization and spatial reuse efficiency. Transmission capacities of
the overlaid networks are analyzed, which are defined as the maximum densities
of the ad hoc nodes and mobile users under an outage constraint. Using tools
from stochastic geometry, the capacity tradeoff curves for the overlaid
networks are shown to be linear. Deploying overlaid networks based on frequency
separation is proved to achieve higher network capacities than that based on
spatial separation. Furthermore, spatial diversity is shown to enhance network
capacities.
| [
{
"version": "v1",
"created": "Sat, 28 Jun 2008 07:26:40 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Huang",
"Kaibin",
""
],
[
"Chen",
"Yan",
""
],
[
"Chen",
"Bin",
""
],
[
"Yang",
"Xia",
""
],
[
"Lau",
"Vincent K. N.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.4686 | Tong Zhang | John Langford, Lihong Li, Tong Zhang | Sparse Online Learning via Truncated Gradient | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a general method called truncated gradient to induce sparsity in
the weights of online learning algorithms with convex loss functions. This
method has several essential properties: The degree of sparsity is continuous
-- a parameter controls the rate of sparsification from no sparsification to
total sparsification. The approach is theoretically motivated, and an instance
of it can be regarded as an online counterpart of the popular
$L_1$-regularization method in the batch setting. We prove that small rates of
sparsification result in only small additional regret with respect to typical
online learning guarantees. The approach works well empirically. We apply the
approach to several datasets and find that for datasets with large numbers of
features, substantial sparsity is discoverable.
| [
{
"version": "v1",
"created": "Sat, 28 Jun 2008 14:19:50 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jul 2008 01:58:32 GMT"
}
]
| 2008-07-04T00:00:00 | [
[
"Langford",
"John",
""
],
[
"Li",
"Lihong",
""
],
[
"Zhang",
"Tong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0806.4695 | Massimiliano Laddomada Ph.D. | F. Daneshgaran, M. Laddomada, F. Mesiti, and M. Mondin | On the Throughput Allocation for Proportional Fairness in Multirate IEEE
802.11 DCF | Submitted to IEEE CCNC 2009 | null | 10.1109/CCNC.2009.4784741 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a modified proportional fairness (PF) criterion suitable
for mitigating the \textit{rate anomaly} problem of multirate IEEE 802.11
Wireless LANs employing the mandatory Distributed Coordination Function (DCF)
option. Compared to the widely adopted assumption of saturated network, the
proposed criterion can be applied to general networks whereby the contending
stations are characterized by specific packet arrival rates, $\lambda_s$, and
transmission rates $R_d^{s}$.
The throughput allocation resulting from the proposed algorithm is able to
greatly increase the aggregate throughput of the DCF while ensuring fairness
levels among the stations of the same order of the ones available with the
classical PF criterion. Put simply, each station is allocated a throughput that
depends on a suitable normalization of its packet rate, which, to some extent,
measures the frequency by which the station tries to gain access to the
channel. Simulation results are presented for some sample scenarios, confirming
the effectiveness of the proposed criterion.
| [
{
"version": "v1",
"created": "Sat, 28 Jun 2008 15:29:10 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Daneshgaran",
"F.",
""
],
[
"Laddomada",
"M.",
""
],
[
"Mesiti",
"F.",
""
],
[
"Mondin",
"M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0806.4703 | Feng Li | Feng Li and Shuigeng Zhou | Challenging More Updates: Towards Anonymous Re-publication of Fully
Dynamic Datasets | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most existing anonymization work has been done on static datasets, which have
no update and need only one-time publication. Recent studies consider
anonymizing dynamic datasets with external updates: the datasets are updated
with record insertions and/or deletions. This paper addresses a new problem:
anonymous re-publication of datasets with internal updates, where the attribute
values of each record are dynamically updated. This is an important and
challenging problem for attribute values of records are updating frequently in
practice and existing methods are unable to deal with such a situation.
We initiate a formal study of anonymous re-publication of dynamic datasets
with internal updates, and show the invalidation of existing methods. We
introduce theoretical definition and analysis of dynamic datasets, and present
a general privacy disclosure framework that is applicable to all anonymous
re-publication problems. We propose a new counterfeited generalization
principle alled m-Distinct to effectively anonymize datasets with both external
updates and internal updates. We also develop an algorithm to generalize
datasets to meet m-Distinct. The experiments conducted on real-world data
demonstrate the effectiveness of the proposed solution.
| [
{
"version": "v1",
"created": "Sat, 28 Jun 2008 16:24:03 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Jul 2008 08:24:57 GMT"
}
]
| 2008-07-24T00:00:00 | [
[
"Li",
"Feng",
""
],
[
"Zhou",
"Shuigeng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0806.4722 | Lav Varshney | Lav R. Varshney, Julius Kusuma, and Vivek K Goyal | Malleable Coding: Compressed Palimpsests | 39 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A malleable coding scheme considers not only compression efficiency but also
the ease of alteration, thus encouraging some form of recycling of an old
compressed version in the formation of a new one. Malleability cost is the
difficulty of synchronizing compressed versions, and malleable codes are of
particular interest when representing information and modifying the
representation are both expensive. We examine the trade-off between compression
efficiency and malleability cost under a malleability metric defined with
respect to a string edit distance. This problem introduces a metric topology to
the compressed domain. We characterize the achievable rates and malleability as
the solution of a subgraph isomorphism problem. This can be used to argue that
allowing conditional entropy of the edited message given the original message
to grow linearly with block length creates an exponential increase in code
length.
| [
{
"version": "v1",
"created": "Sat, 28 Jun 2008 20:18:59 GMT"
}
]
| 2008-07-01T00:00:00 | [
[
"Varshney",
"Lav R.",
""
],
[
"Kusuma",
"Julius",
""
],
[
"Goyal",
"Vivek K",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.4735 | Shai Gutner | Noga Alon and Shai Gutner | Linear Time Algorithms for Finding a Dominating Set of Fixed Size in
Degenerated Graphs | null | Proc. of 13th COCOON (2007), 394-405 | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is substantial literature dealing with fixed parameter algorithms for
the dominating set problem on various families of graphs. In this paper, we
give a $k^{O(dk)} n$ time algorithm for finding a dominating set of size at
most $k$ in a $d$-degenerated graph with $n$ vertices. This proves that the
dominating set problem is fixed-parameter tractable for degenerated graphs. For
graphs that do not contain $K_h$ as a topological minor, we give an improved
algorithm for the problem with running time $(O(h))^{hk} n$. For graphs which
are $K_h$-minor-free, the running time is further reduced to $(O(\log
h))^{hk/2} n$. Fixed-parameter tractable algorithms that are linear in the
number of vertices of the graph were previously known only for planar graphs.
For the families of graphs discussed above, the problem of finding an induced
cycle of a given length is also addressed. For every fixed $H$ and $k$, we show
that if an $H$-minor-free graph $G$ with $n$ vertices contains an induced cycle
of size $k$, then such a cycle can be found in O(n) expected time as well as in
$O(n \log n)$ worst-case time. Some results are stated concerning the
(im)possibility of establishing linear time algorithms for the more general
family of degenerated graphs.
| [
{
"version": "v1",
"created": "Sun, 29 Jun 2008 06:09:57 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Alon",
"Noga",
""
],
[
"Gutner",
"Shai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0806.4737 | Sang Won Choi | Sang Won Choi and Sae-Young Chung | On the Multiplexing Gain of K-user Partially Connected Interference
Channel | Submitted to IEEE Transactions on Information Theory
(Correspondence), June 29, 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The multiplexing gain (MUXG) of $K$-user interference channel (IC) with
partially connected interfering links is analyzed. The motivation for the
partially connected IC comes from the fact that not all interferences are
equally strong in practice. The MUXG is characterized as a function of the
number ($K$) of users and the number ($N \geq 1$) of interfering links. Our
analysis is mainly based on the interference alignment (IA) technique to
mitigate interference. Our main results are as follows: One may expect that
higher MUXG can be attained when some of interfering links do not exist.
However, when $N$ is odd and $K=N+2$, the MUXG is not increased beyond the
optimal MUXG of fully connected IC, which is $\frac{KM}{2}$. The number of
interfering links has no influence on the achievable MUXG using IA, but affects
the efficiency in terms of the number of required channel realizations: When
N=1 or 2, the optimal MUXG of the fully connected IC is achievable with a
finite number of channel realizations. In case of $N \geq 3$, however, the MUXG
of $\frac{KM}{2}$ can be achieved asymptotically as the number of channel
realizations tends to infinity.
| [
{
"version": "v1",
"created": "Sun, 29 Jun 2008 08:01:52 GMT"
}
]
| 2008-07-01T00:00:00 | [
[
"Choi",
"Sang Won",
""
],
[
"Chung",
"Sae-Young",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.4746 | Alexandr Savinov | Alexandr Savinov | Concept-Oriented Programming | 46 pages, 8 figures, 11 listings | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object-oriented programming (OOP) is aimed at describing the structure and
behaviour of objects by hiding the mechanism of their representation and access
in primitive references. In this article we describe an approach, called
concept-oriented programming (COP), which focuses on modelling references
assuming that they also possess application-specific structure and behaviour
accounting for a great deal or even most of the overall program complexity.
References in COP are completely legalized and get the same status as objects
while the functions are distributed among both objects and references. In order
to support this design we introduce a new programming construct, called
concept, which generalizes conventional classes and concept inclusion relation
generalizing class inheritance. The main advantage of COP is that it allows
programmers to describe two sides of any program: explicitly used functions of
objects and intermediate functionality of references having cross-cutting
nature and executed implicitly behind the scenes during object access.
| [
{
"version": "v1",
"created": "Sun, 29 Jun 2008 10:56:41 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Sep 2010 11:21:01 GMT"
}
]
| 2010-09-28T00:00:00 | [
[
"Savinov",
"Alexandr",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0806.4749 | Alexandr Savinov | Alexandr Savinov | Nested Ordered Sets and their Use for Data Modelling | 15 pages, 4 figures | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a new approach to data modelling, called the
concept-oriented model (CoM), and describe its main features and
characteristics including data semantics and operations. The distinguishing
feature of this model is that it is based on the formalism of nested ordered
sets where any element participates in two structures simultaneously:
hierarchical (nested) and multi-dimensional (ordered). An element of the model
is postulated to consist of two parts, called identity and entity, and the
whole approach can be naturally broken into two branches: identity modelling
and entity modelling. We also propose a new query language with the main
construct, called concept, defined as a pair of two classes: identity class and
entity class. We describe how its operations of projection, de-projection and
product can be used to solve typical data modelling tasks.
| [
{
"version": "v1",
"created": "Sun, 29 Jun 2008 11:38:06 GMT"
}
]
| 2008-07-01T00:00:00 | [
[
"Savinov",
"Alexandr",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0806.4773 | Naftali Sommer | Ofir Shalvi, Naftali Sommer, Meir Feder | Signal Codes | Submitted to IEEE Transactions on Information Theory | null | 10.1109/ITW.2003.1216761 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by signal processing, we present a new class of channel codes,
called signal codes, for continuous-alphabet channels. Signal codes are lattice
codes whose encoding is done by convolving an integer information sequence with
a fixed filter pattern. Decoding is based on the bidirectional sequential stack
decoder, which can be implemented efficiently using the heap data structure.
Error analysis and simulation results indicate that signal codes can achieve
low error rate at approximately 1dB from channel capacity.
| [
{
"version": "v1",
"created": "Sun, 29 Jun 2008 16:30:34 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Shalvi",
"Ofir",
""
],
[
"Sommer",
"Naftali",
""
],
[
"Feder",
"Meir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0806.4787 | Herman Haverkort | Herman Haverkort and Freek van Walderveen | Locality and Bounding-Box Quality of Two-Dimensional Space-Filling
Curves | 24 pages, full version of paper to appear in ESA. Difference with
first version: minor editing; Fig. 2(m) corrected | null | null | null | cs.CG cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Space-filling curves can be used to organise points in the plane into
bounding-box hierarchies (such as R-trees). We develop measures of the
bounding-box quality of space-filling curves that express how effective
different space-filling curves are for this purpose. We give general lower
bounds on the bounding-box quality measures and on locality according to
Gotsman and Lindenbaum for a large class of space-filling curves. We describe a
generic algorithm to approximate these and similar quality measures for any
given curve. Using our algorithm we find good approximations of the locality
and the bounding-box quality of several known and new space-filling curves.
Surprisingly, some curves with relatively bad locality by Gotsman and
Lindenbaum's measure, have good bounding-box quality, while the curve with the
best-known locality has relatively bad bounding-box quality.
| [
{
"version": "v1",
"created": "Sun, 29 Jun 2008 21:47:15 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Jul 2008 12:02:51 GMT"
}
]
| 2008-07-12T00:00:00 | [
[
"Haverkort",
"Herman",
""
],
[
"van Walderveen",
"Freek",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0806.4790 | Vladimir Braverman | Vladimir Braverman, Kai-Min Chung, Zhenming Liu, Michael Mitzenmacher,
Rafail Ostrovsky | AMS Without 4-Wise Independence on Product Domains | null | null | null | null | cs.DS | http://creativecommons.org/licenses/by/3.0/ | In their seminal work, Alon, Matias, and Szegedy introduced several sketching
techniques, including showing that 4-wise independence is sufficient to obtain
good approximations of the second frequency moment. In this work, we show that
their sketching technique can be extended to product domains $[n]^k$ by using
the product of 4-wise independent functions on $[n]$. Our work extends that of
Indyk and McGregor, who showed the result for $k = 2$. Their primary motivation
was the problem of identifying correlations in data streams. In their model, a
stream of pairs $(i,j) \in [n]^2$ arrive, giving a joint distribution $(X,Y)$,
and they find approximation algorithms for how close the joint distribution is
to the product of the marginal distributions under various metrics, which
naturally corresponds to how close $X$ and $Y$ are to being independent. By
using our technique, we obtain a new result for the problem of approximating
the $\ell_2$ distance between the joint distribution and the product of the
marginal distributions for $k$-ary vectors, instead of just pairs, in a single
pass. Our analysis gives a randomized algorithm that is a $(1 \pm \epsilon)$
approximation (with probability $1-\delta$) that requires space logarithmic in
$n$ and $m$ and proportional to $3^k$.
| [
{
"version": "v1",
"created": "Sun, 29 Jun 2008 21:34:28 GMT"
},
{
"version": "v2",
"created": "Fri, 15 May 2009 19:16:27 GMT"
},
{
"version": "v3",
"created": "Thu, 17 Sep 2009 16:21:56 GMT"
},
{
"version": "v4",
"created": "Tue, 5 Jan 2010 22:23:35 GMT"
},
{
"version": "v5",
"created": "Wed, 3 Feb 2010 14:19:09 GMT"
}
]
| 2010-02-03T00:00:00 | [
[
"Braverman",
"Vladimir",
""
],
[
"Chung",
"Kai-Min",
""
],
[
"Liu",
"Zhenming",
""
],
[
"Mitzenmacher",
"Michael",
""
],
[
"Ostrovsky",
"Rafail",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0806.4802 | Yoav Freund PhD | Yoav Freund and Daniel Hsu | A new Hedging algorithm and its application to inferring latent random
variables | null | null | null | null | cs.GT cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new online learning algorithm for cumulative discounted gain.
This learning algorithm does not use exponential weights on the experts.
Instead, it uses a weighting scheme that depends on the regret of the master
algorithm relative to the experts. In particular, experts whose discounted
cumulative gain is smaller (worse) than that of the master algorithm receive
zero weight. We also sketch how a regret-based algorithm can be used as an
alternative to Bayesian averaging in the context of inferring latent random
variables.
| [
{
"version": "v1",
"created": "Mon, 30 Jun 2008 05:30:30 GMT"
}
]
| 2008-07-01T00:00:00 | [
[
"Freund",
"Yoav",
""
],
[
"Hsu",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0806.4858 | Guangwu Xu | Adrian Dumitrescu, Csaba D. T\'oth and Guangwu Xu | On stars and Steiner stars. II | 10 pages, 1 figure | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A {\em Steiner star} for a set $P$ of $n$ points in $\RR^d$ connects an
arbitrary center point to all points of $P$, while a {\em star} connects a
point $p\in P$ to the remaining $n-1$ points of $P$. All connections are
realized by straight line segments. Fekete and Meijer showed that the minimum
star is at most $\sqrt{2}$ times longer than the minimum Steiner star for any
finite point configuration in $\RR^d$. The maximum ratio between them, over all
finite point configurations in $\RR^d$, is called the {\em star Steiner ratio}
in $\RR^d$. It is conjectured that this ratio is $4/\pi = 1.2732...$ in the
plane and $4/3=1.3333...$ in three dimensions. Here we give upper bounds of
1.3631 in the plane, and 1.3833 in 3-space, thereby substantially improving
recent upper bounds of 1.3999, and $\sqrt{2}-10^{-4}$, respectively. Our
results also imply improved bounds on the maximum ratios between the minimum
star and the maximum matching in two and three dimensions.
| [
{
"version": "v1",
"created": "Mon, 30 Jun 2008 19:46:43 GMT"
}
]
| 2008-07-01T00:00:00 | [
[
"Dumitrescu",
"Adrian",
""
],
[
"Tóth",
"Csaba D.",
""
],
[
"Xu",
"Guangwu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.