id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0806.4859
Stephane Lengrand
St\'ephane Lengrand (LIX)
Termination of lambda-calculus with the extra Call-By-Value rule known as assoc
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we prove that any lambda-term that is strongly normalising for beta-reduction is also strongly normalising for beta,assoc-reduction. assoc is a call-by-value rule that has been used in works by Moggi, Joachimsky, Espirito Santo and others. The result has often been justified with incomplete or incorrect proofs. Here we give one in full details.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 11:29:21 GMT" }, { "version": "v2", "created": "Tue, 2 Sep 2008 19:17:17 GMT" } ]
2008-09-02T00:00:00
[ [ "Lengrand", "Stéphane", "", "LIX" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.4874
Lawrence Ong
Lawrence Ong, Mehul Motani
Myopic Coding in Multiterminal Networks
null
IEEE Transactions on Information Theory, Vol. 54, No. 7, pp. 3295-3314, Jul. 2008
10.1109/TIT.2008.924675
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the interplay between cooperation and achievable rates in multi-terminal networks. Cooperation refers to the process of nodes working together to relay data toward the destination. There is an inherent tradeoff between achievable information transmission rates and the level of cooperation, which is determined by how many nodes are involved and how the nodes encode/decode the data. We illustrate this trade-off by studying information-theoretic decode-forward based coding strategies for data transmission in multi-terminal networks. Decode-forward strategies are usually discussed in the context of omniscient coding, in which all nodes in the network fully cooperate with each other, both in encoding and decoding. In this paper, we investigate myopic coding, in which each node cooperates with only a few neighboring nodes. We show that achievable rates of myopic decode-forward can be as large as that of omniscient decode-forward in the low SNR regime. We also show that when each node has only a few cooperating neighbors, adding one node into the cooperation increases the transmission rate significantly. Furthermore, we show that myopic decode-forward can achieve non-zero rates as the network size grows without bound.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 12:21:58 GMT" } ]
2010-04-15T00:00:00
[ [ "Ong", "Lawrence", "" ], [ "Motani", "Mehul", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.4899
Mordecai Golin
Mordecai Golin and Yan Zhang
A Dynamic Programming Approach To Length-Limited Huffman Coding
null
null
null
null
cs.DS cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ``state-of-the-art'' in Length Limited Huffman Coding algorithms is the $\Theta(ND)$-time, $\Theta(N)$-space one of Hirschberg and Larmore, where $D\le N$ is the length restriction on the code. This is a very clever, very problem specific, technique. In this note we show that there is a simple Dynamic-Programming (DP) method that solves the problem with the same time and space bounds. The fact that there was an $\Theta(ND)$ time DP algorithm was previously known; it is a straightforward DP with the Monge property (which permits an order of magnitude speedup). It was not interesting, though, because it also required $\Theta(ND)$ space. The main result of this paper is the technique developed for reducing the space. It is quite simple and applicable to many other problems modeled by DPs with the Monge property. We illustrate this with examples from web-proxy design and wireless mobile paging.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 14:13:18 GMT" } ]
2008-07-01T00:00:00
[ [ "Golin", "Mordecai", "" ], [ "Zhang", "Yan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.4920
Tuyet-Tram Dang-Ngoc
Tuyet-Tram Dang-Ngoc (PRISM), Georges Gardarin (PRISM)
Conception et Evaluation de XQuery dans une architecture de m\'ediation "Tout-XML"
null
Revue ISI (Integration de syst\`emes d'information) : Num\'ero sp\'ecial sur les Bases de Donn\'ees Semi-structur\'ees 8, 5-6 (2003) 11-25
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
XML has emerged as the leading language for representing and exchanging data not only on the Web, but also in general in the enterprise. XQuery is emerging as the standard query language for XML. Thus, tools are required to mediate between XML queries and heterogeneous data sources to integrate data in XML. This paper presents the XMedia mediator, a unique tool for integrating and querying disparate heterogeneous information as unified XML views. It describes the mediator architecture and focuses on the unique distributed query processing technology implemented in this component. Query evaluation is based on an original XML algebra simply extending classical operators to process tuples of tree elements. Further, we present a set of performance evaluation on a relational benchmark, which leads to discuss possible performance enhancements.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 15:23:20 GMT" } ]
2008-12-18T00:00:00
[ [ "Dang-Ngoc", "Tuyet-Tram", "", "PRISM" ], [ "Gardarin", "Georges", "", "PRISM" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0806.4921
Eugen Popovici
Eugen Popovici (VALORIA), Gilbas M\'enier (VALORIA), Pierre-Fran\c{c}ois Marteau (VALORIA)
Interpr\'etation vague des contraintes structurelles pour la RI dans des corpus de documents XML - \'Evaluation d'une m\'ethode approch\'ee de RI structur\'ee
26 pages, ISBN 978-2-7462-1969-4
Document num\'erique 10, 1 (2007) 63--88
10.3166/dn.10.63-88
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose specific data structures designed to the indexing and retrieval of information elements in heterogeneous XML data bases. The indexing scheme is well suited to the management of various contextual searches, expressed either at a structural level or at an information content level. The approximate search mechanisms are based on a modified Levenshtein editing distance and information fusion heuristics. The implementation described highlights the mixing of structured information presented as field/value instances and free text elements. The retrieval performances of the proposed approach are evaluated within the INEX 2005 evaluation campaign. The evaluation results rank the proposed approach among the best evaluated XML IR systems for the VVCAS task.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 15:25:30 GMT" } ]
2008-12-18T00:00:00
[ [ "Popovici", "Eugen", "", "VALORIA" ], [ "Ménier", "Gilbas", "", "VALORIA" ], [ "Marteau", "Pierre-François", "", "VALORIA" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0806.4956
Vishwanath Raman
Luca de Alfaro, Rupak Majumdar, Vishwanath Raman, Mari\"elle Stoelinga
Game Refinement Relations and Metrics
null
Logical Methods in Computer Science, Volume 4, Issue 3 (September 11, 2008) lmcs:781
10.2168/LMCS-4(3:7)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider two-player games played over finite state spaces for an infinite number of rounds. At each state, the players simultaneously choose moves; the moves determine a successor state. It is often advantageous for players to choose probability distributions over moves, rather than single moves. Given a goal, for example, reach a target state, the question of winning is thus a probabilistic one: what is the maximal probability of winning from a given state? On these game structures, two fundamental notions are those of equivalences and metrics. Given a set of winning conditions, two states are equivalent if the players can win the same games with the same probability from both states. Metrics provide a bound on the difference in the probabilities of winning across states, capturing a quantitative notion of state similarity. We introduce equivalences and metrics for two-player game structures, and we show that they characterize the difference in probability of winning games whose goals are expressed in the quantitative mu-calculus. The quantitative mu-calculus can express a large set of goals, including reachability, safety, and omega-regular properties. Thus, we claim that our relations and metrics provide the canonical extensions to games, of the classical notion of bisimulation for transition systems. We develop our results both for equivalences and metrics, which generalize bisimulation, and for asymmetrical versions, which generalize simulation.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 17:55:15 GMT" }, { "version": "v2", "created": "Wed, 10 Sep 2008 22:36:12 GMT" } ]
2015-07-01T00:00:00
[ [ "de Alfaro", "Luca", "" ], [ "Majumdar", "Rupak", "" ], [ "Raman", "Vishwanath", "" ], [ "Stoelinga", "Mariëlle", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0806.4958
Venkatesh Saligrama
Venkatesh Saligrama
Deterministic Designs with Deterministic Guarantees: Toeplitz Compressed Sensing Matrices, Sequence Designs and System Identification
added references. streamlined introduction
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a new family of discrete sequences having "random like" uniformly decaying auto-correlation properties. The new class of infinite length sequences are higher order chirps constructed using irrational numbers. Exploiting results from the theory of continued fractions and diophantine approximations, we show that the class of sequences so formed has the property that the worst-case auto-correlation coefficients for every finite length sequence decays at a polynomial rate. These sequences display doppler immunity as well. We also show that Toeplitz matrices formed from such sequences satisfy restricted-isometry-property (RIP), a concept that has played a central role recently in Compressed Sensing applications. Compressed sensing has conventionally dealt with sensing matrices with arbitrary components. Nevertheless, such arbitrary sensing matrices are not appropriate for linear system identification and one must employ Toeplitz structured sensing matrices. Linear system identification plays a central role in a wide variety of applications such as channel estimation for multipath wireless systems as well as control system applications. Toeplitz matrices are also desirable on account of their filtering structure, which allows for fast implementation together with reduced storage requirements.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 19:54:37 GMT" }, { "version": "v2", "created": "Mon, 28 Jul 2008 18:07:48 GMT" } ]
2008-07-28T00:00:00
[ [ "Saligrama", "Venkatesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0806.4979
Salim El Rouayheb
Salim Y. El Rouayheb, C. N. Georghiades, E. Soljanin, A. Sprintson
Bounds on Codes Based on Graph Theory
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $A_q(n,d)$ be the maximum order (maximum number of codewords) of a $q$-ary code of length $n$ and Hamming distance at least $d$. And let $A(n,d,w)$ that of a binary code of constant weight $w$. Building on results from algebraic graph theory and Erd\H{o}s-ko-Rado like theorems in extremal combinatorics, we show how several known bounds on $A_q(n,d)$ and $A(n,d,w)$ can be easily obtained in a single framework. For instance, both the Hamming and Singleton bounds can derived as an application of a property relating the clique number and the independence number of vertex transitive graphs. Using the same techniques, we also derive some new bounds and present some additional applications.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 19:44:24 GMT" } ]
2008-07-01T00:00:00
[ [ "Rouayheb", "Salim Y. El", "" ], [ "Georghiades", "C. N.", "" ], [ "Soljanin", "E.", "" ], [ "Sprintson", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.0007
David Eppstein
David Eppstein
Finding Large Clique Minors is Hard
5 pages, 1 figure
J. Graph Algorithms and Applications 13(2):197-204, 2009
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that it is NP-complete, given a graph G and a parameter h, to determine whether G contains a complete graph K_h as a minor.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 20:09:54 GMT" }, { "version": "v2", "created": "Wed, 13 May 2009 20:15:02 GMT" } ]
2009-08-28T00:00:00
[ [ "Eppstein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0807.0023
Marko A. Rodriguez
Marko A. Rodriguez, Johan Bollen, Herbert Van de Sompel
Automatic Metadata Generation using Associative Networks
null
ACM Transactions on Information Systems, volume 27, number 2, pages 1-20, ISSN: 1046-8188, ACM Press, February 2009
10.1145/1462198.1462199
LA-UR-06-3445
cs.IR cs.DL
http://creativecommons.org/licenses/publicdomain/
In spite of its tremendous value, metadata is generally sparse and incomplete, thereby hampering the effectiveness of digital information services. Many of the existing mechanisms for the automated creation of metadata rely primarily on content analysis which can be costly and inefficient. The automatic metadata generation system proposed in this article leverages resource relationships generated from existing metadata as a medium for propagation from metadata-rich to metadata-poor resources. Because of its independence from content analysis, it can be applied to a wide variety of resource media types and is shown to be computationally inexpensive. The proposed method operates through two distinct phases. Occurrence and co-occurrence algorithms first generate an associative network of repository resources leveraging existing repository metadata. Second, using the associative network as a substrate, metadata associated with metadata-rich resources is propagated to metadata-poor resources by means of a discrete-form spreading activation algorithm. This article discusses the general framework for building associative networks, an algorithm for disseminating metadata through such networks, and the results of an experiment and validation of the proposed method using a standard bibliographic dataset.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 21:23:28 GMT" }, { "version": "v2", "created": "Sat, 7 Mar 2009 01:20:48 GMT" } ]
2009-03-07T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Bollen", "Johan", "" ], [ "Van de Sompel", "Herbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0807.0038
Changyong Zhang
Changyong Zhang
A Novel Mathematical Model for the Unique Shortest Path Routing Problem
31 pages, 4 figures
null
null
null
math.OC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Link weights are the principal parameters of shortest path routing protocols, the most commonly used protocols for IP networks. The problem of optimally setting link weights for unique shortest path routing is addressed. Due to the complexity of the constraints involved, there exist challenges to formulate the problem properly, so that a solution algorithm may be developed which could prove to be more efficient than those already in existence. In this paper, a novel complete formulation with a polynomial number of constraints is first introduced and then mathematically proved to be correct. It is further illustrated that the formulation has advantages over a prior one in terms of both constraint structure and model size for a proposed decomposition method to solve the problem.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 23:22:47 GMT" }, { "version": "v2", "created": "Thu, 4 Mar 2010 06:54:04 GMT" } ]
2010-03-04T00:00:00
[ [ "Zhang", "Changyong", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0807.0042
Youjian (Eugene) Liu
Youjian Liu
A Simple Converse Proof and a Unified Capacity Formula for Channels with Input Constraints
A single column version of this paper was submitted to IEEE Transactions on Information Theory on June 17, 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given the single-letter capacity formula and the converse proof of a channel without constraints, we provide a simple approach to extend the results for the same channel but with constraints. The resulting capacity formula is the minimum of a Lagrange dual function. It gives an unified formula in the sense that it works regardless whether the problem is convex. If the problem is non-convex, we show that the capacity can be larger than the formula obtained by the naive approach of imposing constraints on the maximization in the capacity formula of the case without the constraints. The extension on the converse proof is simply by adding a term involving the Lagrange multiplier and the constraints. The rest of the proof does not need to be changed. We name the proof method the Lagrangian Converse Proof. In contrast, traditional approaches need to construct a better input distribution for convex problems or need to introduce a time sharing variable for non-convex problems. We illustrate the Lagrangian Converse Proof for three channels, the classic discrete time memoryless channel, the channel with non-causal channel-state information at the transmitter, the channel with limited channel-state feedback. The extension to the rate distortion theory is also provided.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 00:13:03 GMT" } ]
2008-09-29T00:00:00
[ [ "Liu", "Youjian", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.0070
Yuri Arkhipkin
Yuri Arkhipkin
Quantitative Paradigm of Software Reliability as Content Relevance
14 pages, 3 figures
null
null
null
cs.SE cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a quantitative approach to software reliability and content relevance definitions validated by the systems' potential reliability law.Thus it is argued for the unified math nature or quantitative paradigm of software reliability and content relevance.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 05:29:07 GMT" } ]
2008-07-02T00:00:00
[ [ "Arkhipkin", "Yuri", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0807.0087
Francesc Rossell\'o
Gabriel Cardona, Merce Llabres, Francesc Rossello, Gabriel Valiente
Path lengths in tree-child time consistent hybridization networks
31 pages
null
null
null
q-bio.PE cs.CE cs.DM q-bio.QM
http://creativecommons.org/licenses/publicdomain/
Hybridization networks are representations of evolutionary histories that allow for the inclusion of reticulate events like recombinations, hybridizations, or lateral gene transfers. The recent growth in the number of hybridization network reconstruction algorithms has led to an increasing interest in the definition of metrics for their comparison that can be used to assess the accuracy or robustness of these methods. In this paper we establish some basic results that make it possible the generalization to tree-child time consistent (TCTC) hybridization networks of some of the oldest known metrics for phylogenetic trees: those based on the comparison of the vectors of path lengths between leaves. More specifically, we associate to each hybridization network a suitably defined vector of `splitted' path lengths between its leaves, and we prove that if two TCTC hybridization networks have the same such vectors, then they must be isomorphic. Thus, comparing these vectors by means of a metric for real-valued vectors defines a metric for TCTC hybridization networks. We also consider the case of fully resolved hybridization networks, where we prove that simpler, `non-splitted' vectors can be used.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 09:13:32 GMT" } ]
2008-07-06T00:00:00
[ [ "Cardona", "Gabriel", "" ], [ "Llabres", "Merce", "" ], [ "Rossello", "Francesc", "" ], [ "Valiente", "Gabriel", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0807.0093
Karsten Borgwardt
S.V.N. Vishwanathan, Karsten M. Borgwardt, Imre Risi Kondor, Nicol N. Schraudolph
Graph Kernels
http://jmlr.csail.mit.edu/papers/v11/vishwanathan10a.html
Journal of Machine Learning Research 11 (Apr): 1201-1242, 2010
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a unified framework to study graph kernels, special cases of which include the random walk graph kernel \citep{GaeFlaWro03,BorOngSchVisetal05}, marginalized graph kernel \citep{KasTsuIno03,KasTsuIno04,MahUedAkuPeretal04}, and geometric kernel on graphs \citep{Gaertner02}. Through extensions of linear algebra to Reproducing Kernel Hilbert Spaces (RKHS) and reduction to a Sylvester equation, we construct an algorithm that improves the time complexity of kernel computation from $O(n^6)$ to $O(n^3)$. When the graphs are sparse, conjugate gradient solvers or fixed-point iterations bring our algorithm into the sub-cubic domain. Experiments on graphs from bioinformatics and other application domains show that it is often more than a thousand times faster than previous approaches. We then explore connections between diffusion kernels \citep{KonLaf02}, regularization on graphs \citep{SmoKon03}, and graph kernels, and use these connections to propose new graph kernels. Finally, we show that rational kernels \citep{CorHafMoh02,CorHafMoh03,CorHafMoh04} when specialized to graphs reduce to the random walk graph kernel.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 09:46:14 GMT" } ]
2010-11-30T00:00:00
[ [ "Vishwanathan", "S. V. N.", "" ], [ "Borgwardt", "Karsten M.", "" ], [ "Kondor", "Imre Risi", "" ], [ "Schraudolph", "Nicol N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0807.0140
Ioannis Chatzigiannakis
Ioannis Chatzigiannakis and Paul G. Spirakis
The Dynamics of Probabilistic Population Protocols
To appear as a Brief Announced in Proc. of 22nd International Symposium on Distributed Computing (DISC 2008), September 22-24, 2008, Arcachon, France
null
null
null
cs.DC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study here the dynamics (and stability) of Probabilistic Population Protocols, via the differential equations approach. We provide a quite general model and we show that it includes the model of Angluin et. al. in the case of very large populations. For the general model we give a sufficient condition for stability that can be checked in polynomial time. We also study two interesting subcases: (a) protocols whose specifications (in our terms) are configuration independent. We show that they are always stable and that their eventual subpopulation percentages are actually a Markov Chain stationary distribution. (b) protocols that have dynamics resembling virus spread. We show that their dynamics are actually similar to the well-known Replicator Dynamics of Evolutionary Games. We also provide a sufficient condition for stability in this case.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 12:49:22 GMT" } ]
2008-07-02T00:00:00
[ [ "Chatzigiannakis", "Ioannis", "" ], [ "Spirakis", "Paul G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0807.0161
Arkadiy Khandjian
Arkadiy Khandjian
Increase of Software Safety
null
null
null
null
cs.SE
http://creativecommons.org/licenses/by/3.0/
New model of software safety is offered. Distribution of mistakes in program on stages of life cycle is researched. Study of ways of increase of reliability of software at help simulation program is leaded.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 13:53:44 GMT" } ]
2008-07-02T00:00:00
[ [ "Khandjian", "Arkadiy", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0807.0199
Thomas Unger
Thomas Unger and Nadya Markin
Quadratic Forms and Space-Time Block Codes from Generalized Quaternion and Biquaternion Algebras
8 pages, final version
IEEE Trans. Inform. Theory 57 (2011), no. 9, 6148-6156
10.1109/TIT.2011.2161909
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the context of space-time block codes (STBCs), the theory of generalized quaternion and biquaternion algebras (i.e., tensor products of two quaternion algebras) over arbitrary base fields is presented, as well as quadratic form theoretic criteria to check if such algebras are division algebras. For base fields relevant to STBCs, these criteria are exploited, via Springer's theorem, to construct several explicit infinite families of (bi-)quaternion division algebras. These are used to obtain new $2\x 2$ and $4\x 4$ STBCs.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 17:41:49 GMT" }, { "version": "v2", "created": "Fri, 11 Jun 2010 18:41:29 GMT" }, { "version": "v3", "created": "Sun, 31 Oct 2010 17:57:06 GMT" }, { "version": "v4", "created": "Mon, 11 Apr 2011 16:53:54 GMT" } ]
2012-02-07T00:00:00
[ [ "Unger", "Thomas", "" ], [ "Markin", "Nadya", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.0204
N Naveen
R. N. Krishnakumar, N. Naveen and P. Vijay Kumar
Diversity Multiplexing Tradeoff of Asynchronous Cooperative Relay Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The assumption of nodes in a cooperative communication relay network operating in synchronous fashion is often unrealistic. In the present paper, we consider two different models of asynchronous operation in cooperative-diversity networks experiencing slow fading and examine the corresponding diversity-multiplexing tradeoffs (DMT). For both models, we propose protocols and distributed space-time codes that asymptotically achieve the transmit diversity bound for all multiplexing gains and for any number of relays.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 17:15:41 GMT" } ]
2008-07-02T00:00:00
[ [ "Krishnakumar", "R. N.", "" ], [ "Naveen", "N.", "" ], [ "Kumar", "P. Vijay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.0222
Sariel Har-Peled
Sariel Har-Peled, S. Muthukrishnan
Range Medians
To appear in ESA 08
null
null
null
cs.DS cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a generalization of the classical median finding problem to batched query case: given an array of unsorted $n$ items and $k$ (not necessarily disjoint) intervals in the array, the goal is to determine the median in {\em each} of the intervals in the array. We give an algorithm that uses $O(n\log n + k\log k \log n)$ comparisons and show a lower bound of $\Omega(n\log k)$ comparisons for this problem. This is optimal for $k=O(n/\log n)$.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 20:05:29 GMT" } ]
2008-07-02T00:00:00
[ [ "Har-Peled", "Sariel", "" ], [ "Muthukrishnan", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0807.0245
Jing Liu
Jing Liu, Jian-Kang Zhang, Kon Max Wong
Full Diversity Codes for MISO Systems Equipped with Linear or ML Detectors
16 pages, 8 figures. accepted for publication in IEEE Trans. Information theory
null
10.1109/TIT.2008.928992
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a general criterion for space time block codes (STBC) to achieve full-diversity with a linear receiver is proposed for a wireless communication system having multiple transmitter and single receiver antennas (MISO). Particularly, the STBC with Toeplitz structure satisfies this criterion and therefore, enables full-diversity. Further examination of this Toeplitz STBC reveals the following important properties: a) The symbol transmission rate can be made to approach unity. b) Applying the Toeplitz code to any signalling scheme having nonzero distance between the nearest constellation points results in a non-vanishing determinant. In addition, if QAM is used as the signalling scheme, then for independent MISO flat fading channels, the Toeplitz codes is proved to approach the optimal diversity-vs-multiplexing tradeoff with a ZF receiver when the number of channel uses is large. This is, so far, the first non-orthogonal STBC shown to achieve the optimal tradeoff for such a receiver. On the other hand, when ML detection is employed in a MISO system, the Toeplitz STBC achieves the maximum coding gain for independent channels. When the channel fading coefficients are correlated, the inherent transmission matrix in the Toeplitz STBC can be designed to minimize the average worst case pair-wise error probability.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 21:49:42 GMT" } ]
2016-11-18T00:00:00
[ [ "Liu", "Jing", "" ], [ "Zhang", "Jian-Kang", "" ], [ "Wong", "Kon Max", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.0311
Dmitry Lande
D.V. Lande and V.V. Zhygalo
About the creation of a parallel bilingual corpora of web-publications
3 pages
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The algorithm of the creation texts parallel corpora was presented. The algorithm is based on the use of "key words" in text documents, and on the means of their automated translation. Key words were singled out by means of using Russian and Ukrainian morphological dictionaries, as well as dictionaries of the translation of nouns for the Russian and Ukrainianlanguages. Besides, to calculate the weights of the terms in the documents, empiric-statistic rules were used. The algorithm under consideration was realized in the form of a program complex, integrated into the content-monitoring InfoStream system. As a result, a parallel bilingual corpora of web-publications containing about 30 thousand documents, was created
[ { "version": "v1", "created": "Wed, 2 Jul 2008 09:49:14 GMT" } ]
2008-07-03T00:00:00
[ [ "Lande", "D. V.", "" ], [ "Zhygalo", "V. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0807.0336
Uli Wagner
Ji\v{r}\'i Matou\v{s}ek, Martin Tancer, and Uli Wagner
Hardness of embedding simplicial complexes in $\R^d$
36 pages, 17 figures; revised version incorporating changes suggested by anonymous referees; added linear-time algorithm for deciding planarity of 2-dimensional complexes
null
null
null
cs.CG math.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let EMBED(k,d) be the following algorithmic problem: Given a finite simplicial complex K of dimension at most k, does there exist a (piecewise linear) embedding of K into R^d? Known results easily imply polynomiality of EMBED(k,2) (k=1,2; the case k=1, d=2 is graph planarity) and of EMBED(k,2k) for all k>2 (even if k is not considered fixed). We observe that the celebrated result of Novikov on the algorithmic unsolvability of recognizing the 5-sphere implies that EMBED(d,d) and EMBED(d-1,d) are undecidable for each d>4. Our main result is NP-hardness of EMBED(2,4) and, more generally, of EMBED(k,d) for all k,d with d>3 and d\geq k \geq (2d-2)/3. These dimensions fall outside the so-called metastable range of a theorem of Haefliger and Weber, which characterizes embeddability using the deleted product obstruction. Our reductions are based on examples, due to Segal, Spie\.z, Freedman, Krushkal, Teichner, and Skopenkov, showing that outside the metastable range the deleted product obstruction is not sufficient to characterize embeddability.
[ { "version": "v1", "created": "Wed, 2 Jul 2008 14:00:47 GMT" }, { "version": "v2", "created": "Wed, 22 Apr 2009 09:45:12 GMT" } ]
2009-04-22T00:00:00
[ [ "Matoušek", "Jiří", "" ], [ "Tancer", "Martin", "" ], [ "Wagner", "Uli", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" } ]
0807.0337
Emanuel Diamant
Emanuel Diamant
Unveiling the mystery of visual information processing in human brain
Accepted to be published in Brain Research (BRES-38102)
null
null
null
cs.AI cs.IR cs.IT math.IT q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is generally accepted that human vision is an extremely powerful information processing system that facilitates our interaction with the surrounding world. However, despite extended and extensive research efforts, which encompass many exploration fields, the underlying fundamentals and operational principles of visual information processing in human brain remain unknown. We still are unable to figure out where and how along the path from eyes to the cortex the sensory input perceived by the retina is converted into a meaningful object representation, which can be consciously manipulated by the brain. Studying the vast literature considering the various aspects of brain information processing, I was surprised to learn that the respected scholarly discussion is totally indifferent to the basic keynote question: "What is information?" in general or "What is visual information?" in particular. In the old days, it was assumed that any scientific research approach has first to define its basic departure points. Why was it overlooked in brain information processing research remains a conundrum. In this paper, I am trying to find a remedy for this bizarre situation. I propose an uncommon definition of "information", which can be derived from Kolmogorov's Complexity Theory and Chaitin's notion of Algorithmic Information. Embracing this new definition leads to an inevitable revision of traditional dogmas that shape the state of the art of brain information processing research. I hope this revision would better serve the challenging goal of human visual information processing modeling.
[ { "version": "v1", "created": "Wed, 2 Jul 2008 12:33:48 GMT" } ]
2008-07-07T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" } ]
0807.0425
Cedric Adjih
Song Yean Cho (INRIA Rocquencourt, LIX), C\'edric Adjih (INRIA Rocquencourt)
Wireless Broadcast with Network Coding in Mobile Ad-Hoc Networks: DRAGONCAST
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network coding is a recently proposed method for transmitting data, which has been shown to have potential to improve wireless network performance. We study network coding for one specific case of multicast, broadcasting, from one source to all nodes of the network. We use network coding as a loss tolerant, energy-efficient, method for broadcast. Our emphasis is on mobile networks. Our contribution is the proposal of DRAGONCAST, a protocol to perform network coding in such a dynamically evolving environment. It is based on three building blocks: a method to permit real-time decoding of network coding, a method to adjust the network coding transmission rates, and a method for ensuring the termination of the broadcast. The performance and behavior of the method are explored experimentally by simulations; they illustrate the excellent performance of the protocol.
[ { "version": "v1", "created": "Wed, 2 Jul 2008 19:23:50 GMT" } ]
2009-04-20T00:00:00
[ [ "Cho", "Song Yean", "", "INRIA Rocquencourt, LIX" ], [ "Adjih", "Cédric", "", "INRIA\n Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0807.0462
Chinh Hoang
Chinh T. Hoang
On the complexity of finding a sun in a graph
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sun is the graph obtained from a cycle of length even and at least six by adding edges to make the even-indexed vertices pairwise adjacent. Suns play an important role in the study of strongly chordal graphs. A graph is chordal if it does not contain an induced cycle of length at least four. A graph is strongly chordal if it is chordal and every even cycle has a chord joining vertices whose distance on the cycle is odd. Farber proved that a graph is strongly chordal if and only if it is chordal and contains no induced suns. There are well known polynomial-time algorithms for recognizing a sun in a chordal graph. Recently, polynomial-time algorithms for finding a sun for a larger class of graphs, the so-called HHD-free graphs, have been discovered. In this paper, we prove the problem of deciding whether an arbitrary graph contains a sun in NP-complete.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 16:49:19 GMT" } ]
2008-07-04T00:00:00
[ [ "Hoang", "Chinh T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0807.0476
Daowen Qiu
Daowen Qiu
Research report: State complexity of operations on two-way quantum finite automata
This is a draft and primary version, and a deep study will be done
null
null
null
cs.DM cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the size complexity of minimal {\it two-way quantum finite automata} (2qfa's) necessary for operations to perform on all inputs of each fixed length. Such a complexity measure, known as state complexity of operations, is useful in measuring how much information is necessary to convert languages. We focus on intersection, union, reversals, and catenation operations and show some upper bounds of state complexity of operations on 2qfa's. Also, we present a number of non-regular languages and prove that these languages can be accepted by 2qfa's with one-sided error probabilities within linear time. Notably, these examples show that our bounds obtained for these operations are not tight, and therefore worth improving. We give an instance to show that the upper bound of the state number for the simulation of one-way deterministic finite automata by two-way reversible finite automata is not tight in general.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 02:26:17 GMT" } ]
2008-07-04T00:00:00
[ [ "Qiu", "Daowen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0807.0484
Gabriel Nivasch
Gabriel Nivasch
Improved bounds and new techniques for Davenport-Schinzel sequences and their generalizations
To appear in Journal of the ACM. 48 pages, 3 figures
Journal of the ACM, 57, article 17, 44 pages, 2010
10.1145/1706591.1706597
null
cs.DM cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let lambda_s(n) denote the maximum length of a Davenport-Schinzel sequence of order s on n symbols. For s=3 it is known that lambda_3(n) = Theta(n alpha(n)) (Hart and Sharir, 1986). For general s>=4 there are almost-tight upper and lower bounds, both of the form n * 2^poly(alpha(n)) (Agarwal, Sharir, and Shor, 1989). Our first result is an improvement of the upper-bound technique of Agarwal et al. We obtain improved upper bounds for s>=6, which are tight for even s up to lower-order terms in the exponent. More importantly, we also present a new technique for deriving upper bounds for lambda_s(n). With this new technique we: (1) re-derive the upper bound of lambda_3(n) <= 2n alpha(n) + O(n sqrt alpha(n)) (first shown by Klazar, 1999); (2) re-derive our own new upper bounds for general s; and (3) obtain improved upper bounds for the generalized Davenport-Schinzel sequences considered by Adamec, Klazar, and Valtr (1992). Regarding lower bounds, we show that lambda_3(n) >= 2n alpha(n) - O(n), and therefore, the coefficient 2 is tight. We also present a simpler version of the construction of Agarwal, Sharir, and Shor that achieves the known lower bounds for even s>=4.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 05:08:29 GMT" }, { "version": "v2", "created": "Tue, 25 Nov 2008 08:44:00 GMT" }, { "version": "v3", "created": "Wed, 9 Dec 2009 11:09:16 GMT" } ]
2013-03-25T00:00:00
[ [ "Nivasch", "Gabriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0807.0517
Miklos Antal Mr
Miklos Antal, Laszlo Balogh
Modeling belief systems with scale-free networks
23 pages, 9 figures
null
null
null
cs.AI physics.soc-ph
http://creativecommons.org/licenses/by/3.0/
Evolution of belief systems has always been in focus of cognitive research. In this paper we delineate a new model describing belief systems as a network of statements considered true. Testing the model a small number of parameters enabled us to reproduce a variety of well-known mechanisms ranging from opinion changes to development of psychological problems. The self-organizing opinion structure showed a scale-free degree distribution. The novelty of our work lies in applying a convenient set of definitions allowing us to depict opinion network dynamics in a highly favorable way, which resulted in a scale-free belief network. As an additional benefit, we listed several conjectural consequences in a number of areas related to thinking and reasoning.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 09:38:19 GMT" } ]
2008-07-04T00:00:00
[ [ "Antal", "Miklos", "" ], [ "Balogh", "Laszlo", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0807.0552
Sebastien Collette
G. Aloupis and J. Cardinal and S. Collette and S. Langerman and D. Orden and P. Ramos
Decomposition of Multiple Coverings into More Parts
null
Discrete and Computational Geometry 44:3 (2010), 706-723
10.1007/s00454-009-9238-3
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that for every centrally symmetric convex polygon Q, there exists a constant alpha such that any alpha*k-fold covering of the plane by translates of Q can be decomposed into k coverings. This improves on a quadratic upper bound proved by Pach and Toth (SoCG'07). The question is motivated by a sensor network problem, in which a region has to be monitored by sensors with limited battery lifetime.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 13:03:47 GMT" } ]
2020-07-21T00:00:00
[ [ "Aloupis", "G.", "" ], [ "Cardinal", "J.", "" ], [ "Collette", "S.", "" ], [ "Langerman", "S.", "" ], [ "Orden", "D.", "" ], [ "Ramos", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0807.0564
Mark Flanagan
Mark F. Flanagan
Linear-Programming Receivers
7 pages (double-column), presented at the 46th Annual Allerton Conference on Communication, Control and Computing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that any communication system which admits a sum-product (SP) receiver also admits a corresponding linear-programming (LP) receiver. The two receivers have a relationship defined by the local structure of the underlying graphical model, and are inhibited by the same phenomenon, which we call 'pseudoconfigurations'. This concept is a generalization of the concept of 'pseudocodewords' for linear codes. It is proved that the LP receiver has the 'optimum certificate' property, and that the receiver output is the lowest cost pseudoconfiguration. Equivalence of graph-cover pseudoconfigurations and linear-programming pseudoconfigurations is also proved. While the LP receiver is generally more complex than the corresponding SP receiver, the LP receiver and its associated pseudoconfiguration structure provide an analytic tool for the analysis of SP receivers. As an example application, we show how the LP design technique may be applied to the problem of joint equalization and decoding.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 13:54:45 GMT" }, { "version": "v2", "created": "Thu, 18 Sep 2008 16:38:58 GMT" } ]
2008-09-18T00:00:00
[ [ "Flanagan", "Mark F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.0565
Damian H. Zanette
Damian H. Zanette
Music, Complexity, Information
null
null
null
null
physics.soc-ph cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
These are the preparatory notes for a Science & Music essay, "Playing by numbers", appeared in Nature 453 (2008) 988-989.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 13:42:00 GMT" } ]
2008-07-04T00:00:00
[ [ "Zanette", "Damian H.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0807.0595
Henk Hollmann
Henk D.L. Hollmann
Nonstandard linear recurring sequence subgroups in finite fields and automorphisms of cyclic codes
null
null
null
Philips Research manuscript number PR-MS 29.450
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $q=p^r$ be a prime power, and let $f(x)=x^m-\gs_{m-1}x^{m-1}- >...-\gs_1x-\gs_0$ be an irreducible polynomial over the finite field $\GF(q)$ of size $q$. A zero $\xi$ of $f$ is called {\em nonstandard (of degree $m$) over $\GF(q)$} if the recurrence relation $u_m=\gs_{m-1}u_{m-1} + ... + \gs_1u_1+\gs_0u_0$ with characteristic polynomial $f$ can generate the powers of $\xi$ in a nontrivial way, that is, with $u_0=1$ and $f(u_1)\neq 0$. In 2003, Brison and Nogueira asked for a characterisation of all nonstandard cases in the case $m=2$, and solved this problem for $q$ a prime, and later for $q=p^r$ with $r\leq4$. In this paper, we first show that classifying nonstandard finite field elements is equivalent to classifying those cyclic codes over $\GF(q)$ generated by a single zero that posses extra permutation automorphisms. Apart from two sporadic examples of degree 11 over $\GF(2)$ and of degree 5 over $\GF(3)$, related to the Golay codes, there exist two classes of examples of nonstandard finite field elements. One of these classes (type I) involves irreducible polynomials $f$ of the form $f(x)=x^m-f_0$, and is well-understood. The other class (type II) can be obtained from a primitive element in some subfield by a process that we call extension and lifting. We will use the known classification of the subgroups of $\PGL(2,q)$ in combination with a recent result by Brison and Nogueira to show that a nonstandard element of degree two over $\GF(q)$ necessarily is of type I or type II, thus solving completely the classification problem for the case $m=2$.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 16:27:58 GMT" } ]
2008-07-04T00:00:00
[ [ "Hollmann", "Henk D. L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.0610
Lu\'isa Lima
Joao P. Vilela, Luisa Lima, Joao Barros
Lightweight Security for Network Coding
Proc. of the IEEE International Conference on Communications (ICC 2008), Beijing, China, May 2008
null
10.1109/ICC.2008.336
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different data flows. We propose a low-complexity cryptographic scheme that exploits the inherent security provided by random linear network coding and offers the advantage of reduced overhead in comparison to traditional end-to-end encryption of the entire data. Confidentiality is achieved by protecting (or "locking") the source coefficients required to decode the encoded data, without preventing intermediate nodes from running their standard network coding operations. Our scheme can be easily combined with existing techniques that counter active attacks.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 18:21:29 GMT" } ]
2016-11-17T00:00:00
[ [ "Vilela", "Joao P.", "" ], [ "Lima", "Luisa", "" ], [ "Barros", "Joao", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0807.0626
Christian Tanguy
Christian Tanguy
Asymptotic Mean Time To Failure and Higher Moments for Large, Recursive Networks
null
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with asymptotic expressions of the Mean Time To Failure (MTTF) and higher moments for large, recursive, and non-repairable systems in the context of two-terminal reliability. Our aim is to extend the well-known results of the series and parallel cases. We first consider several exactly solvable configurations of identical components with exponential failure-time distribution functions to illustrate different (logarithmic or power-law) behaviors as the size of the system, indexed by an integer n, increases. The general case is then addressed: it provides a simple interpretation of the origin of the power-law exponent and an efficient asymptotic expression for the total reliability of large, recursive systems. Finally, we assess the influence of the non-exponential character of the component reliability on the n-dependence of the MTTF.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 19:44:36 GMT" } ]
2008-07-04T00:00:00
[ [ "Tanguy", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0807.0627
Arnaud Martin
Arnaud Martin (E3I2)
Belief decision support and reject for textured images characterization
null
International Conference on Information Fusion, Lens : France (2008)
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The textured images' classification assumes to consider the images in terms of area with the same texture. In uncertain environment, it could be better to take an imprecise decision or to reject the area corresponding to an unlearning class. Moreover, on the areas that are the classification units, we can have more than one texture. These considerations allows us to develop a belief decision model permitting to reject an area as unlearning and to decide on unions and intersections of learning classes. The proposed approach finds all its justification in an application of seabed characterization from sonar images, which contributes to an illustration.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 19:46:21 GMT" } ]
2008-07-04T00:00:00
[ [ "Martin", "Arnaud", "", "E3I2" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0807.0629
Christian Tanguy
Christian Tanguy
Exact two-terminal reliability of some directed networks
null
Proceedings of the 6th International Workshop on the Design of Reliable Communication, La Rochelle : France (2007)
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The calculation of network reliability in a probabilistic context has long been an issue of practical and academic importance. Conventional approaches (determination of bounds, sums of disjoint products algorithms, Monte Carlo evaluations, studies of the reliability polynomials, etc.) only provide approximations when the network's size increases, even when nodes do not fail and all edges have the same reliability p. We consider here a directed, generic graph of arbitrary size mimicking real-life long-haul communication networks, and give the exact, analytical solution for the two-terminal reliability. This solution involves a product of transfer matrices, in which individual reliabilities of edges and nodes are taken into account. The special case of identical edge and node reliabilities (p and rho, respectively) is addressed. We consider a case study based on a commonly-used configuration, and assess the influence of the edges being directed (or not) on various measures of network performance. While the two-terminal reliability, the failure frequency and the failure rate of the connection are quite similar, the locations of complex zeros of the two-terminal reliability polynomials exhibit strong differences, and various structure transitions at specific values of rho. The present work could be extended to provide a catalog of exactly solvable networks in terms of reliability, which could be useful as building blocks for new and improved bounds, as well as benchmarks, in the general case.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 19:47:11 GMT" } ]
2008-07-04T00:00:00
[ [ "Tanguy", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0807.0644
Neal E. Young
Christos Koufogiannakis and Neal E. Young
Greedy D-Approximation Algorithm for Covering with Arbitrary Constraints and Submodular Cost
null
Algorithmica 66(1):113-152 (2013)
10.1007/978-3-642-02927-1_53
null
cs.DS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a simple greedy D-approximation algorithm for any covering problem whose objective function is submodular and non-decreasing, and whose feasible region can be expressed as the intersection of arbitrary (closed upwards) covering constraints, each of which constrains at most D variables of the problem. (A simple example is Vertex Cover, with D = 2.) The algorithm generalizes previous approximation algorithms for fundamental covering problems and online paging and caching problems.
[ { "version": "v1", "created": "Fri, 4 Jul 2008 23:31:29 GMT" }, { "version": "v2", "created": "Thu, 20 Nov 2008 01:26:09 GMT" }, { "version": "v3", "created": "Fri, 8 May 2009 02:11:42 GMT" }, { "version": "v4", "created": "Fri, 30 Dec 2011 17:40:35 GMT" } ]
2015-06-02T00:00:00
[ [ "Koufogiannakis", "Christos", "" ], [ "Young", "Neal E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0807.0661
Pierrick Burgain
Pierrick Burgain, Eric Feron, John-Paul Clarke
Collaborative Virtual Queue: Fair Management of Congested Departure Operations and Benefit Analysis
LaTex, 30 pages with 10 figures
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to the stochastic nature of departure operations, working at full capacity makes major US airports very sensitive to uncertainties. Consequently, airport ground operations face critically congested taxiways and long runway queues. In this report, we show how improved management of departure operations from the ready-to-push-back time to the wheels-off time can potentially yield significant benefits to airlines and air traffic services. We develop a Collaborative Virtual Queue to enable better optimization capabilities during congested situations while taking into account the laissez-faire competitive environment. Results are evaluated using a departure system model, validated using current statistics and previous studies. First, the Collaborative Virtual Queue enables keeping aircraft away from runway queues, which increases wheels-off time predictability. Second, holding aircraft enables last-minute intra-airline flight switching. This creates new optimization capabilities for airlines i.e. it gives airlines the flexibility to prioritize their flight sequence in real-time. These capabilities are illustrated by the trade-off between minimizing the average passenger waiting time and minimizing the level of unfairness between aircraft of the same airline. For instance, airlines could choose to decrease by up to 15% their average passenger waiting time by prioritizing heavy planes over small planes when the taxiway system is congested.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 22:39:14 GMT" } ]
2008-07-08T00:00:00
[ [ "Burgain", "Pierrick", "" ], [ "Feron", "Eric", "" ], [ "Clarke", "John-Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0807.0672
Mark Burgin
Mark Burgin
Algorithmic Problem Complexity
null
null
null
null
cs.CC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
People solve different problems and know that some of them are simple, some are complex and some insoluble. The main goal of this work is to develop a mathematical theory of algorithmic complexity for problems. This theory is aimed at determination of computer abilities in solving different problems and estimation of resources that computers need to do this. Here we build the part of this theory related to static measures of algorithms. At first, we consider problems for finite words and study algorithmic complexity of such problems, building optimal complexity measures. Then we consider problems for such infinite objects as functions and study algorithmic complexity of these problems, also building optimal complexity measures. In the second part of the work, complexity of algorithmic problems, such as the halting problem for Turing machines, is measured by the classes of automata that are necessary to solve this problem. To classify different problems with respect to their complexity, inductive Turing machines, which extend possibilities of Turing machines, are used. A hierarchy of inductive Turing machines generates an inductive hierarchy of algorithmic problems. Here we specifically consider algorithmic problems related to Turing machines and inductive Turing machines, and find a place for these problems in the inductive hierarchy of algorithmic problems.
[ { "version": "v1", "created": "Fri, 4 Jul 2008 02:45:46 GMT" } ]
2008-07-08T00:00:00
[ [ "Burgin", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.0704
Marina Knyazhsnky
Knyazhansky Marina, Plotkin Tatjana
Knowledge bases over algebraic models. Some notes about informational equivalence
22 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recent advances in knowledge base research and the growing importance of effective knowledge management raised an important question of knowledge base equivalence verification. This problem has not been stated earlier, at least in a way that allows speaking about algorithms for verification of informational equivalence, because the informal definition of knowledge bases makes formal solution of this problem impossible. In this paper we provide an implementable formal algorithm for knowledge base equivalence verification based on the formal definition of knowledge base proposed by Plotkin B. and Plotkin T., and study some important properties of automorphic equivalence of models. We also describe the concept of equivalence and formulate the criterion for the equivalence of knowledge bases defined over finite models. Further we define multi-models and automorphic equivalence of models and multi-models, that is generalization of automorphic equivalence of algebras.
[ { "version": "v1", "created": "Fri, 4 Jul 2008 09:16:13 GMT" } ]
2008-07-08T00:00:00
[ [ "Marina", "Knyazhansky", "" ], [ "Tatjana", "Plotkin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0807.0718
Flavio D'Alessandro
Flavio D'Alessandro, Benedetto Intrigila, Stefano Varricchio
The Parikh functions of sparse context-free languages are quasi-polynomials
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that the Parikh map of a bounded context-free language is a box spline. Moreover we prove that in this case, such a function is rational.
[ { "version": "v1", "created": "Fri, 4 Jul 2008 11:01:15 GMT" } ]
2008-07-08T00:00:00
[ [ "D'Alessandro", "Flavio", "" ], [ "Intrigila", "Benedetto", "" ], [ "Varricchio", "Stefano", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0807.0799
Bhavana Kanukurthi
Bhavana Kanukurthi and Leonid Reyzin
An Improved Robust Fuzzy Extractor
15 pages; to appear in SCN 2008
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, W' to agree on a secret key R in the presence of an active adversary. Robust fuzzy extractors were defined by Dodis et al. in Crypto 2006 to be noninteractive, i.e., only one message P, which can be modified by an unbounded adversary, can pass from one party to the other. This allows them to be used by a single party at different points in time (e.g., for key recovery or biometric authentication), but also presents an additional challenge: what if R is used, and thus possibly observed by the adversary, before the adversary has a chance to modify P. Fuzzy extractors secure against such a strong attack are called post-application robust. We construct a fuzzy extractor with post-application robustness that extracts a shared secret key of up to (2m-n)/2 bits (depending on error-tolerance and security parameters), where n is the bit-length and m is the entropy of W. The previously best known result, also of Dodis et al., extracted up to (2m-n)/3 bits (depending on the same parameters).
[ { "version": "v1", "created": "Fri, 4 Jul 2008 17:24:29 GMT" }, { "version": "v2", "created": "Fri, 8 Aug 2008 07:12:32 GMT" } ]
2008-08-08T00:00:00
[ [ "Kanukurthi", "Bhavana", "" ], [ "Reyzin", "Leonid", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0807.0807
Mustaq Ahmed
Mustaq Ahmed, Anna Lubiw
Shortest Paths Avoiding Forbidden Subpaths
12 pages, 2 figures. Fixed a few typos, rephrased a few sentences, and used the STACS style
Proceedings of the 26th International Symposium on Theoretical Aspects of Computer Science (STACS), Freiburg, Germany, 2009, pp. 63-74
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study a variant of the shortest path problem in graphs: given a weighted graph G and vertices s and t, and given a set X of forbidden paths in G, find a shortest s-t path P such that no path in X is a subpath of P. Path P is allowed to repeat vertices and edges. We call each path in X an exception, and our desired path a shortest exception-avoiding path. We formulate a new version of the problem where the algorithm has no a priori knowledge of X, and finds out about an exception x in X only when a path containing x fails. This situation arises in computing shortest paths in optical networks. We give an algorithm that finds a shortest exception avoiding path in time polynomial in |G| and |X|. The main idea is to run Dijkstra's algorithm incrementally after replicating vertices when an exception is discovered.
[ { "version": "v1", "created": "Fri, 4 Jul 2008 19:30:30 GMT" }, { "version": "v2", "created": "Wed, 11 Feb 2009 16:49:43 GMT" } ]
2009-02-11T00:00:00
[ [ "Ahmed", "Mustaq", "" ], [ "Lubiw", "Anna", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0807.0821
Salim El Rouayheb
Salim El Rouayheb, Emina Soljanin
On Wiretap Networks II
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of securing a multicast network against a wiretapper that can intercept the packets on a limited number of arbitrary network links of his choice. We assume that the network implements network coding techniques to simultaneously deliver all the packets available at the source to all the destinations. We show how this problem can be looked at as a network generalization of the Ozarow-Wyner Wiretap Channel of type II. In particular, we show that network security can be achieved by using the Ozarow-Wyner approach of coset coding at the source on top of the implemented network code. This way, we quickly and transparently recover some of the results available in the literature on secure network coding for wiretapped networks. We also derive new bounds on the required secure code alphabet size and an algorithm for code construction.
[ { "version": "v1", "created": "Fri, 4 Jul 2008 21:20:43 GMT" } ]
2008-07-08T00:00:00
[ [ "Rouayheb", "Salim El", "" ], [ "Soljanin", "Emina", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.0868
Saeed Akhavan Astaneh
Saeed A. Astaneh, Saeed Gazor, Hamid Behroozi
On the Capacity of Pairwise Collaborative Networks
Accepted for publication at PIMRC'08
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive expressions for the achievable rate region of a collaborative coding scheme in a two-transmitter, two-receiver Pairwise Collaborative Network (PCN) where one transmitter and receiver pair, namely relay pair, assists the other pair, namely the source pair, by partially decoding and forwarding the transmitted message to the intended receiver. The relay pair provides such assistance while handling a private message. We assume that users can use the past channel outputs and can transmit and receive at the same time and in the same frequency band. In this collaborative scheme, the transmitter of the source pair splits its information into two independent parts. Ironically, the relay pair employs the decode and forward coding to assist the source pair in delivering a part of its message and re-encodes the decoded message along with private message, which is intended to the receiver of the relay pair, and broadcasts the results. The receiver of the relay pair decodes both messages, retrieves the private message, re-encodes and transmits the decoded massage to the intended destination. We also characterize the achievable rate region for Gaussian PCN. Finally, we provide numerical results to study the rate trade off for the involved pairs. Numerical result shows that the collaboration offers gain when the channel gain between the users of the relay pair are strong. It also shows that if the channel conditions between transmitters or between the receivers of the relay and source pairs are poor, such a collaboration is not beneficial.
[ { "version": "v1", "created": "Sat, 5 Jul 2008 16:33:44 GMT" } ]
2008-07-08T00:00:00
[ [ "Astaneh", "Saeed A.", "" ], [ "Gazor", "Saeed", "" ], [ "Behroozi", "Hamid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.0887
Dmitri Krioukov
Xenofontas Dimitropoulos, M. Angeles Serrano, Dmitri Krioukov
On Cycles in AS Relationships
This note is an addendum to cs/0604017
ACM SIGCOMM Computer Communication Review (CCR), v.38, n.3, p.103-104, 2008
10.1145/1384609.1384624
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several users of our AS relationship inference data (http://www.caida.org/data/active/as-relationships/), released with cs/0604017, asked us why it contained AS relationship cycles, e.g., cases where AS A is a provider of AS B, B is a provider of C, and C is a provider of A, or other cycle types. Having been answering these questions in private communications, we have eventually decided to write down our answers here for future reference.
[ { "version": "v1", "created": "Sun, 6 Jul 2008 04:50:39 GMT" } ]
2008-07-08T00:00:00
[ [ "Dimitropoulos", "Xenofontas", "" ], [ "Serrano", "M. Angeles", "" ], [ "Krioukov", "Dmitri", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0807.0908
Fionn Murtagh
Fionn Murtagh
The Correspondence Analysis Platform for Uncovering Deep Structure in Data and Information
Sixth Annual Boole Lecture in Informatics, Boole Centre for Research in Informatics, Cork, Ireland, 29 April 2008. 28 pp., 17 figures. To appear, Computer Journal. This version: 3 typos corrected
Computer Journal, 53 (3), 304-315, 2010
10.1093/comjnl/bxn045
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study two aspects of information semantics: (i) the collection of all relationships, (ii) tracking and spotting anomaly and change. The first is implemented by endowing all relevant information spaces with a Euclidean metric in a common projected space. The second is modelled by an induced ultrametric. A very general way to achieve a Euclidean embedding of different information spaces based on cross-tabulation counts (and from other input data formats) is provided by Correspondence Analysis. From there, the induced ultrametric that we are particularly interested in takes a sequential - e.g. temporal - ordering of the data into account. We employ such a perspective to look at narrative, "the flow of thought and the flow of language" (Chafe). In application to policy decision making, we show how we can focus analysis in a small number of dimensions.
[ { "version": "v1", "created": "Sun, 6 Jul 2008 15:22:54 GMT" }, { "version": "v2", "created": "Tue, 2 Sep 2008 17:07:52 GMT" } ]
2011-01-11T00:00:00
[ [ "Murtagh", "Fionn", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0807.0928
Denis Charles X.
Denis Charles, Kumar Chellapilla
Bloomier Filters: A second look
13 Pages, 3 figures, to appear in ESA - 2008
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Bloom filter is a space efficient structure for storing static sets, where the space efficiency is gained at the expense of a small probability of false-positives. A Bloomier filter generalizes a Bloom filter to compactly store a function with a static support. In this article we give a simple construction of a Bloomier filter. The construction is linear in space and requires constant time to evaluate. The creation of our Bloomier filter takes linear time which is faster than the existing construction. We show how one can improve the space utilization further at the cost of increasing the time for creating the data structure.
[ { "version": "v1", "created": "Sun, 6 Jul 2008 19:45:37 GMT" } ]
2008-07-08T00:00:00
[ [ "Charles", "Denis", "" ], [ "Chellapilla", "Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0807.0942
Vinod M. Prabhakaran
Vinod M. Prabhakaran, Krishnan Eswaran, and Kannan Ramchandran
Secrecy via Sources and Channels
42 pages, 7 figures, to appear in IEEE Transactions on Information Theory
null
10.1109/TIT.2012.2208579
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Alice and Bob want to share a secret key and to communicate an independent message, both of which they desire to be kept secret from an eavesdropper Eve. We study this problem of secret communication and secret key generation when two resources are available -- correlated sources at Alice, Bob, and Eve, and a noisy broadcast channel from Alice to Bob and Eve which is independent of the sources. We are interested in characterizing the fundamental trade-off between the rates of the secret message and secret key. We present an achievable solution and prove its optimality for the parallel channels and sources case when each sub-channel and source component satisfies a degradation order (either in favor of the legitimate receiver or the eavesdropper). This includes the case of jointly Gaussian sources and an additive Gaussian channel, for which the secrecy region is evaluated.
[ { "version": "v1", "created": "Mon, 7 Jul 2008 04:55:20 GMT" }, { "version": "v2", "created": "Wed, 13 Jun 2012 03:38:22 GMT" } ]
2016-11-15T00:00:00
[ [ "Prabhakaran", "Vinod M.", "" ], [ "Eswaran", "Krishnan", "" ], [ "Ramchandran", "Kannan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.0967
Raffaele D'Abrusco
M. Brescia, S. Cavuoti, G. D'Angelo, R. D'Abrusco, C. Donalek, N. Deniskina, O. Laurino, G. Longo
Astrophysics in S.Co.P.E
null
null
null
null
astro-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
S.Co.P.E. is one of the four projects funded by the Italian Government in order to provide Southern Italy with a distributed computing infrastructure for fundamental science. Beside being aimed at building the infrastructure, S.Co.P.E. is also actively pursuing research in several areas among which astrophysics and observational cosmology. We shortly summarize the most significant results obtained in the first two years of the project and related to the development of middleware and Data Mining tools for the Virtual Observatory.
[ { "version": "v1", "created": "Mon, 7 Jul 2008 08:38:00 GMT" } ]
2008-07-08T00:00:00
[ [ "Brescia", "M.", "" ], [ "Cavuoti", "S.", "" ], [ "D'Angelo", "G.", "" ], [ "D'Abrusco", "R.", "" ], [ "Donalek", "C.", "" ], [ "Deniskina", "N.", "" ], [ "Laurino", "O.", "" ], [ "Longo", "G.", "" ] ]
[ null, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0807.0992
Alexis Darrasse
Alexis Darrasse (LIP6)
Random XML sampling the Boltzmann way
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we present the prototype of a framework capable of producing, with linear complexity, uniformly random XML documents with respect to a given RELAX NG grammar. The generation relies on powerful combinatorial methods together with numerical and symbolic resolution of polynomial systems.
[ { "version": "v1", "created": "Mon, 7 Jul 2008 11:20:07 GMT" } ]
2008-07-08T00:00:00
[ [ "Darrasse", "Alexis", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0807.0993
Damien Hardy
Damien Hardy (IRISA), Isabelle Puaut (IRISA)
WCET analysis of multi-level set-associative instruction caches
null
null
null
RR-6574
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the advent of increasingly complex hardware in real-time embedded systems (processors with performance enhancing features such as pipelines, cache hierarchy, multiple cores), many processors now have a set-associative L2 cache. Thus, there is a need for considering cache hierarchies when validating the temporal behavior of real-time systems, in particular when estimating tasks' worst-case execution times (WCETs). To the best of our knowledge, there is only one approach for WCET estimation for systems with cache hierarchies [Mueller, 1997], which turns out to be unsafe for set-associative caches. In this paper, we highlight the conditions under which the approach described in [Mueller, 1997] is unsafe. A safe static instruction cache analysis method is then presented. Contrary to [Mueller, 1997] our method supports set-associative and fully associative caches. The proposed method is experimented on medium-size and large programs. We show that the method is most of the time tight. We further show that in all cases WCET estimations are much tighter when considering the cache hierarchy than when considering only the L1 cache. An evaluation of the analysis time is conducted, demonstrating that analysing the cache hierarchy has a reasonable computation time.
[ { "version": "v1", "created": "Mon, 7 Jul 2008 11:20:39 GMT" } ]
2009-04-20T00:00:00
[ [ "Hardy", "Damien", "", "IRISA" ], [ "Puaut", "Isabelle", "", "IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0807.1005
Peter Grunwald
Tim van Erven, Peter Grunwald and Steven de Rooij
Catching Up Faster by Switching Sooner: A Prequential Solution to the AIC-BIC Dilemma
A preliminary version of a part of this paper appeared at the NIPS 2007 conference
null
null
null
math.ST cs.IT cs.LG math.IT stat.ME stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bayesian model averaging, model selection and its approximations such as BIC are generally statistically consistent, but sometimes achieve slower rates og convergence than other methods such as AIC and leave-one-out cross-validation. On the other hand, these other methods can br inconsistent. We identify the "catch-up phenomenon" as a novel explanation for the slow convergence of Bayesian methods. Based on this analysis we define the switch distribution, a modification of the Bayesian marginal distribution. We show that, under broad conditions,model selection and prediction based on the switch distribution is both consistent and achieves optimal convergence rates, thereby resolving the AIC-BIC dilemma. The method is practical; we give an efficient implementation. The switch distribution has a data compression interpretation, and can thus be viewed as a "prequential" or MDL method; yet it is different from the MDL methods that are usually considered in the literature. We compare the switch distribution to Bayes factor model selection and leave-one-out cross-validation.
[ { "version": "v1", "created": "Mon, 7 Jul 2008 12:57:23 GMT" } ]
2008-09-17T00:00:00
[ [ "van Erven", "Tim", "" ], [ "Grunwald", "Peter", "" ], [ "de Rooij", "Steven", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0807.1016
Paulo Oliva
Rob Arthan, Ursula Martin, Erik A. Mathiesen, Paulo Oliva
A General Framework for Sound and Complete Floyd-Hoare Logics
27 pages
ACM Transactions on Computational Logic, 11(1), 2009
10.1145/1614431.1614438
null
cs.LO cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an abstraction of Hoare logic to traced symmetric monoidal categories, a very general framework for the theory of systems. Our abstraction is based on a traced monoidal functor from an arbitrary traced monoidal category into the category of pre-orders and monotone relations. We give several examples of how our theory generalises usual Hoare logics (partial correctness of while programs, partial correctness of pointer programs), and provide some case studies on how it can be used to develop new Hoare logics (run-time analysis of while programs and stream circuits).
[ { "version": "v1", "created": "Mon, 7 Jul 2008 13:40:00 GMT" } ]
2013-05-09T00:00:00
[ [ "Arthan", "Rob", "" ], [ "Martin", "Ursula", "" ], [ "Mathiesen", "Erik A.", "" ], [ "Oliva", "Paulo", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0807.1139
Nitish Korula
Nitish Korula, Martin Pal
Algorithms for Secretary Problems on Graphs and Hypergraphs
15 pages, 2 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We examine several online matching problems, with applications to Internet advertising reservation systems. Consider an edge-weighted bipartite graph G, with partite sets L, R. We develop an 8-competitive algorithm for the following secretary problem: Initially given R, and the size of L, the algorithm receives the vertices of L sequentially, in a random order. When a vertex l \in L is seen, all edges incident to l are revealed, together with their weights. The algorithm must immediately either match l to an available vertex of R, or decide that l will remain unmatched. Dimitrov and Plaxton show a 16-competitive algorithm for the transversal matroid secretary problem, which is the special case with weights on vertices, not edges. (Equivalently, one may assume that for each l \in L, the weights on all edges incident to l are identical.) We use a similar algorithm, but simplify and improve the analysis to obtain a better competitive ratio for the more general problem. Perhaps of more interest is the fact that our analysis is easily extended to obtain competitive algorithms for similar problems, such as to find disjoint sets of edges in hypergraphs where edges arrive online. We also introduce secretary problems with adversarially chosen groups. Finally, we give a 2e-competitive algorithm for the secretary problem on graphic matroids, where, with edges appearing online, the goal is to find a maximum-weight acyclic subgraph of a given graph.
[ { "version": "v1", "created": "Mon, 7 Jul 2008 22:51:46 GMT" } ]
2008-07-09T00:00:00
[ [ "Korula", "Nitish", "" ], [ "Pal", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0807.1153
Wei-jen Hsu
Wei-jen Hsu, Debojyoti Dutta, and Ahmed Helmy
CSI: A Paradigm for Behavior-oriented Delivery Services in Mobile Human Networks
12 pages, 12 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose behavior-oriented services as a new paradigm of communication in mobile human networks. Our study is motivated by the tight user-network coupling in future mobile societies. In such a paradigm, messages are sent to inferred behavioral profiles, instead of explicit IDs. Our paper provides a systematic framework in providing such services. First, user behavioral profiles are constructed based on traces collected from two large wireless networks, and their spatio-temporal stability is analyzed. The implicit relationship discovered between mobile users could be utilized to provide a service for message delivery and discovery in various network environments. As an example application, we provide a detailed design of such a service in challenged opportunistic network architecture, named CSI. We provide a fully distributed solution using behavioral profile space gradients and small world structures. Our analysis shows that user behavioral profiles are surprisingly stable, i.e., the similarity of the behavioral profile of a user to its future behavioral profile is above 0.8 for two days and 0.75 for one week, and remains above 0.6 for five weeks. The correlation coefficient of the similarity metrics between a user pair at different time instants is above 0.7 for four days, 0.62 for a week, and remains above 0.5 for two weeks. Leveraging such a stability in user behaviors, the CSI service achieves delivery rate very close to the delay-optimal strategy (above 94%), with minimal overhead (less than 84% of the optimal). We believe that this new paradigm will act as an enabler of multiple new services in mobile societies, and is potentially applicable in server-based, heterogeneous or infrastructure-less wireless environments.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 01:58:26 GMT" } ]
2008-07-09T00:00:00
[ [ "Hsu", "Wei-jen", "" ], [ "Dutta", "Debojyoti", "" ], [ "Helmy", "Ahmed", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0807.1158
Abhay Trichur Subramanian
Abhay T. Subramanian, Andrew Thangaraj
Path Gain Algebraic Formulation for the Scalar Linear Network Coding Problem
12 pages, 6 figures. Accepted for publication in IEEE Transactions on Information Theory (May 2010)
null
10.1109/TIT.2010.2054270
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the algebraic view, the solution to a network coding problem is seen as a variety specified by a system of polynomial equations typically derived by using edge-to-edge gains as variables. The output from each sink is equated to its demand to obtain polynomial equations. In this work, we propose a method to derive the polynomial equations using source-to-sink path gains as the variables. In the path gain formulation, we show that linear and quadratic equations suffice; therefore, network coding becomes equivalent to a system of polynomial equations of maximum degree 2. We present algorithms for generating the equations in the path gains and for converting path gain solutions to edge-to-edge gain solutions. Because of the low degree, simplification is readily possible for the system of equations obtained using path gains. Using small-sized network coding problems, we show that the path gain approach results in simpler equations and determines solvability of the problem in certain cases. On a larger network (with 87 nodes and 161 edges), we show how the path gain approach continues to provide deterministic solutions to some network coding problems.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 02:51:49 GMT" }, { "version": "v2", "created": "Sat, 19 Jun 2010 12:57:20 GMT" } ]
2016-11-17T00:00:00
[ [ "Subramanian", "Abhay T.", "" ], [ "Thangaraj", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.1160
Charles Shen
Charles Shen, Henning Schulzrinne, Erich Nahum
Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation
In Proceedings of IPTComm 2008
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Session Initiation Protocol (SIP) server may be overloaded by emergency-induced call volume, ``American Idol'' style flash crowd effects or denial of service attacks. The SIP server overload problem is interesting especially because the costs of serving or rejecting a SIP session can be similar. For this reason, the built-in SIP overload control mechanism based on generating rejection messages cannot prevent the server from entering congestion collapse under heavy load. The SIP overload problem calls for a pushback control solution in which the potentially overloaded receiving server may notify its upstream sending servers to have them send only the amount of load within the receiving server's processing capacity. The pushback framework can be achieved by either a rate-based feedback or a window-based feedback. The centerpiece of the feedback mechanism is the algorithm used to generate load regulation information. We propose three new window-based feedback algorithms and evaluate them together with two existing rate-based feedback algorithms. We compare the different algorithms in terms of the number of tuning parameters and performance under both steady and variable load. Furthermore, we identify two categories of fairness requirements for SIP overload control, namely, user-centric and provider-centric fairness. With the introduction of a new double-feed SIP overload control architecture, we show how the algorithms can meet those fairness criteria.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 03:23:41 GMT" } ]
2008-07-09T00:00:00
[ [ "Shen", "Charles", "" ], [ "Schulzrinne", "Henning", "" ], [ "Nahum", "Erich", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0807.1162
Charles Shen
Charles Shen and Henning Schulzrinne
Measurement and Evaluation of ENUM Server Performance
null
Proceedings of IEEE ICC 2007 p. 1967-1972
null
null
cs.PF cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ENUM is a DNS-based protocol standard for mapping E.164 telephone numbers to Internet Uniform Resource Identifiers (URIs). It places unique requirements on the existing DNS infrastructure, such as data scalability, query throughput, response time, and database update rates. This paper measures and evaluates the performance of existing name server implementation as ENUM servers. We compared PowerDNS (PDNS), BIND and Navitas. Results show that BIND is not suitable for ENUM due to its poor scaling property. Both PDNS and Navitas can serve ENUM. However, Navitas turns out to be highly optimized and clearly outperforms PDNS in all aspects we have tested. We also instrumented the PDNS server to identify its performance bottleneck and investigated ways to improve it.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 03:51:17 GMT" } ]
2008-07-09T00:00:00
[ [ "Shen", "Charles", "" ], [ "Schulzrinne", "Henning", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0807.1165
Krishnendu Chatterjee
Krishnendu Chatterjee, Thomas A. Henzinger and Vinayak Prabhu
Timed Parity Games: Complexity and Robustness
Accepted in conference FORMATS 2008. Pages 22
null
null
null
cs.LO cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider two-player games played in real time on game structures with clocks and parity objectives. The games are concurrent in that at each turn, both players independently propose a time delay and an action, and the action with the shorter delay is chosen. To prevent a player from winning by blocking time, we restrict each player to strategies that ensure that the player cannot be responsible for causing a zeno run. First, we present an efficient reduction of these games to turn-based (i.e., nonconcurrent) finite-state (i.e., untimed) parity games. The states of the resulting game are pairs of clock regions of the original game. Our reduction improves the best known complexity for solving timed parity games. Moreover, the rich class of algorithms for classical parity games can now be applied to timed parity games. Second, we consider two restricted classes of strategies for the player that represents the controller in a real-time synthesis problem, namely, limit-robust and bounded-robust strategies. Using a limit-robust strategy, the controller cannot choose an exact real-valued time delay but must allow for some nonzero jitter in each of its actions. If there is a given lower bound on the jitter, then the strategy is bounded-robust. We show that exact strategies are more powerful than limit-robust strategies, which are more powerful than bounded-robust strategies for any bound. For both kinds of robust strategies, we present efficient reductions to standard timed automaton games. These reductions provide algorithms for the synthesis of robust real-time controllers.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 06:37:35 GMT" } ]
2008-07-09T00:00:00
[ [ "Chatterjee", "Krishnendu", "" ], [ "Henzinger", "Thomas A.", "" ], [ "Prabhu", "Vinayak", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0807.1169
Charles Shen
Charles Shen and Henning Schulzrinne
A VoIP Privacy Mechanism and its Application in VoIP Peering for Voice Service Provider Topology and Identity Hiding
null
null
null
cucs-039-06
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Voice Service Providers (VSPs) participating in VoIP peering frequently want to withhold their identity and related privacy-sensitive information from other parties during the VoIP communication. A number of existing documents on VoIP privacy exist, but most of them focus on end user privacy. By summarizing and extending existing work, we present a unified privacy mechanism for both VoIP users and service providers. We also show a case study on how VSPs can use this mechanism for identity and topology hiding in VoIP peering.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 04:31:44 GMT" } ]
2008-07-09T00:00:00
[ [ "Shen", "Charles", "" ], [ "Schulzrinne", "Henning", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0807.1173
Rohit Chadha
Rohit Chadha and Mahesh Viswanthan
A Counterexample Guided Abstraction-Refinement Framework for Markov Decision Processes
null
null
null
null
cs.SE cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main challenge in using abstractions effectively, is to construct a suitable abstraction for the system being verified. One approach that tries to address this problem is that of {\it counterexample guided abstraction-refinement (CEGAR)}, wherein one starts with a coarse abstraction of the system, and progressively refines it, based on invalid counterexamples seen in prior model checking runs, until either an abstraction proves the correctness of the system or a valid counterexample is generated. While CEGAR has been successfully used in verifying non-probabilistic systems automatically, CEGAR has not been applied in the context of probabilistic systems. The main issues that need to be tackled in order to extend the approach to probabilistic systems is a suitable notion of ``counterexample'', algorithms to generate counterexamples, check their validity, and then automatically refine an abstraction based on an invalid counterexample. In this paper, we address these issues, and present a CEGAR framework for Markov Decision Processes.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 19:47:11 GMT" } ]
2008-07-09T00:00:00
[ [ "Chadha", "Rohit", "" ], [ "Viswanthan", "Mahesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0807.1182
R. Alexander Bentley
R. Alexander Bentley
Random drift versus selection in academic vocabulary: an evolutionary analysis of published keywords
9 pages, 4 figures
PLoS ONE, 3 (2008) e3057
10.1371/journal.pone.0003057
null
physics.soc-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The evolution of vocabulary in academic publishing is characterized via keyword frequencies recorded the ISI Web of Science citations database. In four distinct case-studies, evolutionary analysis of keyword frequency change through time is compared to a model of random copying used as the null hypothesis, such that selection may be identified against it. The case studies from the physical sciences indicate greater selection in keyword choice than in the social sciences. Similar evolutionary analyses can be applied to a wide range of phenomena; wherever the popularity of multiple items through time has been recorded, as with web searches, or sales of popular music and books, for example.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 07:05:01 GMT" } ]
2009-02-18T00:00:00
[ [ "Bentley", "R. Alexander", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0807.1211
James Cheney
James Cheney
Flux: FunctionaL Updates for XML (extended report)
Extended version of ICFP 2008 paper
null
null
null
cs.PL cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
XML database query languages have been studied extensively, but XML database updates have received relatively little attention, and pose many challenges to language design. We are developing an XML update language called Flux, which stands for FunctionaL Updates for XML, drawing upon ideas from functional programming languages. In prior work, we have introduced a core language for Flux with a clear operational semantics and a sound, decidable static type system based on regular expression types. Our initial proposal had several limitations. First, it lacked support for recursive types or update procedures. Second, although a high-level source language can easily be translated to the core language, it is difficult to propagate meaningful type errors from the core language back to the source. Third, certain updates are well-formed yet contain path errors, or ``dead'' subexpressions which never do any useful work. It would be useful to detect path errors, since they often represent errors or optimization opportunities. In this paper, we address all three limitations. Specifically, we present an improved, sound type system that handles recursion. We also formalize a source update language and give a translation to the core language that preserves and reflects typability. We also develop a path-error analysis (a form of dead-code analysis) for updates.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 17:10:51 GMT" } ]
2008-07-09T00:00:00
[ [ "Cheney", "James", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0807.1221
Natan Rubin
Haim Kaplan, Natan Rubin, and Micha Sharir
Line Transversals of Convex Polyhedra in $\reals^3$
10 pages+ 15 page appendix
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish a bound of $O(n^2k^{1+\eps})$, for any $\eps>0$, on the combinatorial complexity of the set $\T$ of line transversals of a collection $\P$ of $k$ convex polyhedra in $\reals^3$ with a total of $n$ facets, and present a randomized algorithm which computes the boundary of $\T$ in comparable expected time. Thus, when $k\ll n$, the new bounds on the complexity (and construction cost) of $\T$ improve upon the previously best known bounds, which are nearly cubic in $n$. To obtain the above result, we study the set $\TL$ of line transversals which emanate from a fixed line $\ell_0$, establish an almost tight bound of $O(nk^{1+\eps})$ on the complexity of $\TL$, and provide a randomized algorithm which computes $\TL$ in comparable expected time. Slightly improved combinatorial bounds for the complexity of $\TL$, and comparable improvements in the cost of constructing this set, are established for two special cases, both assuming that the polyhedra of $\P$ are pairwise disjoint: the case where $\ell_0$ is disjoint from the polyhedra of $\P$, and the case where the polyhedra of $\P$ are unbounded in a direction parallel to $\ell_0$.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 11:55:45 GMT" } ]
2008-07-09T00:00:00
[ [ "Kaplan", "Haim", "" ], [ "Rubin", "Natan", "" ], [ "Sharir", "Micha", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0807.1228
Michele Garetto Dr.
Michele Garetto and Emilio Leonardi
Restricted Mobility Improves Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks
12 pages
null
null
null
cs.PF cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we analyze asymptotic delay-throughput trade-offs in mobile ad-hoc networks comprising heterogeneous nodes with restricted mobility. We show that node spatial heterogeneity has the ability to drastically improve upon existing scaling laws established under the assumption that nodes are identical and uniformly visit the entire network area. In particular, we consider the situation in which each node moves around its own home-point according to a restricted mobility process which results into a spatial stationary distribution that decays as a power law of exponent delta with the distance from the home-point. For such restricted mobility model, we propose a novel class of scheduling and routing schemes, which significantly outperforms all delay-throughput results previously obtained in the case of identical nodes. In particular, for delta = 2 it is possible to achieve almost constant delay and almost constant per-node throughput (except for a poly-logarithmic factor) as the number of nodes increases, even without resorting to sophisticated coding or signal processing techniques.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 13:04:05 GMT" } ]
2008-07-09T00:00:00
[ [ "Garetto", "Michele", "" ], [ "Leonardi", "Emilio", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0807.1253
Dorje C. Brody
Dorje C. Brody, Mark H. A. Davis, Robyn L. Friedman, Lane P. Hughston
Informed Traders
20 pages, 5 figures. Version to appear in the Proceedings of the Royal Society A
Proceedings of the Royal Society London A465, 1103-1122 (2009)
10.1098/rspa.2008.0465
null
q-fin.TR cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An asymmetric information model is introduced for the situation in which there is a small agent who is more susceptible to the flow of information in the market than the general market participant, and who tries to implement strategies based on the additional information. In this model market participants have access to a stream of noisy information concerning the future return of an asset, whereas the informed trader has access to a further information source which is obscured by an additional noise that may be correlated with the market noise. The informed trader uses the extraneous information source to seek statistical arbitrage opportunities, while at the same time accommodating the additional risk. The amount of information available to the general market participant concerning the asset return is measured by the mutual information of the asset price and the associated cash flow. The worth of the additional information source is then measured in terms of the difference of mutual information between the general market participant and the informed trader. This difference is shown to be nonnegative when the signal-to-noise ratio of the information flow is known in advance. Explicit trading strategies leading to statistical arbitrage opportunities, taking advantage of the additional information, are constructed, illustrating how excess information can be translated into profit.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 14:24:12 GMT" }, { "version": "v2", "created": "Mon, 17 Nov 2008 15:07:54 GMT" } ]
2013-01-31T00:00:00
[ [ "Brody", "Dorje C.", "" ], [ "Davis", "Mark H. A.", "" ], [ "Friedman", "Robyn L.", "" ], [ "Hughston", "Lane P.", "" ] ]
[ { "class": "Quantitative Finance", "code": "q-fin.TR", "description": "Market microstructure, liquidity, exchange and auction design, automated trading, agent-based modeling and market-making", "span": "(Trading and Market Microstructure)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0807.1267
Rahul Jain
Rahul Jain and Pranab Sen and Jaikumar Radhakrishnan
Optimal Direct Sum and Privacy Trade-off Results for Quantum and Classical Communication Complexity
Full version (version 1), 31 pages, 4 figures
null
null
null
cs.DC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show optimal Direct Sum result for the one-way entanglement-assisted quantum communication complexity for any relation f subset of X x Y x Z. We show: Q^{1,pub}(f^m) = Omega(m Q^{1,pub}(f)), where Q^{1,pub}(f), represents the one-way entanglement-assisted quantum communication complexity of f with error at most 1/3 and f^m represents m-copies of f. Similarly for the one-way public-coin classical communication complexity we show: R^{1,pub}(f^m) = Omega(m R^{1,pub}(f)), where R^{1,pub}(f), represents the one-way public-coin classical communication complexity of f with error at most 1/3. We show similar optimal Direct Sum results for the Simultaneous Message Passing quantum and classical models. For two-way protocols we present optimal Privacy Trade-off results leading to a Weak Direct Sum result for such protocols. We show our Direct Sum and Privacy Trade-off results via message compression arguments which also imply a new round elimination lemma in quantum communication. This allows us to extend classical lower bounds on the cell probe complexity of some data structure problems, e.g. Approximate Nearest Neighbor Searching on the Hamming cube {0,1}^n and Predecessor Search to the quantum setting. In a separate result we show that Newman's technique of reducing the number of public-coins in a classical protocol cannot be lifted to the quantum setting. We do this by defining a general notion of black-box reduction of prior entanglement that subsumes Newman's technique. We prove that such a black-box reduction is impossible for quantum protocols. In the final result in the theme of message compression, we provide an upper bound on the problem of Exact Remote State Preparation.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 15:05:45 GMT" } ]
2008-07-09T00:00:00
[ [ "Jain", "Rahul", "" ], [ "Sen", "Pranab", "" ], [ "Radhakrishnan", "Jaikumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.1277
David Gamarnik
David Gamarnik and David Goldberg
Randomized greedy algorithms for independent sets and matchings in regular graphs: Exact results and finite girth corrections
24 pages
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive new results for the performance of a simple greedy algorithm for finding large independent sets and matchings in constant degree regular graphs. We show that for $r$-regular graphs with $n$ nodes and girth at least $g$, the algorithm finds an independent set of expected cardinality $f(r)n - O\big(\frac{(r-1)^{\frac{g}{2}}}{\frac{g}{2}!} n\big)$, where $f(r)$ is a function which we explicitly compute. A similar result is established for matchings. Our results imply improved bounds for the size of the largest independent set in these graphs, and provide the first results of this type for matchings. As an implication we show that the greedy algorithm returns a nearly perfect matching when both the degree $r$ and girth $g$ are large. Furthermore, we show that the cardinality of independent sets and matchings produced by the greedy algorithm in \emph{arbitrary} bounded degree graphs is concentrated around the mean. Finally, we analyze the performance of the greedy algorithm for the case of random i.i.d. weighted independent sets and matchings, and obtain a remarkably simple expression for the limiting expected values produced by the algorithm. In fact, all the other results are obtained as straightforward corollaries from the results for the weighted case.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 15:29:42 GMT" } ]
2008-07-09T00:00:00
[ [ "Gamarnik", "David", "" ], [ "Goldberg", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0807.1282
Dominik Scheder
Dominik Scheder
Satisfiability of Almost Disjoint CNF Formulas
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We call a CNF formula linear if any two clauses have at most one variable in common. Let m(k) be the largest integer m such that any linear k-CNF formula with <= m clauses is satisfiable. We show that 4^k / (4e^2k^3) <= m(k) < ln(2) k^4 4^k. More generally, a (k,d)-CSP is a constraint satisfaction problem in conjunctive normal form where each variable can take on one of d values, and each constraint contains k variables and forbids exacty one of the d^k possible assignments to these variables. Call a (k,d)-CSP l-disjoint if no two distinct constraints have l or more variables in common. Let m_l(k,d) denote the largest integer m such that any l-disjoint (k,d)-CSP with at most m constraints is satisfiable. We show that 1/k (d^k/(ed^(l-1)k))^(1+1/(l-1))<= m_l(k,d) < c (k^2/l ln(d) d^k)^(1+1/(l-1)). for some constant c. This means for constant l, upper and lower bound differ only in a polynomial factor in d and k.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 15:46:16 GMT" }, { "version": "v2", "created": "Thu, 10 Jul 2008 12:43:45 GMT" } ]
2008-07-10T00:00:00
[ [ "Scheder", "Dominik", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0807.1297
Martin Pal
Gagan Aggarwal and S. Muthukrishnan and David Pal and Martin Pal
General Auction Mechanism for Search Advertising
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In sponsored search, a number of advertising slots is available on a search results page, and have to be allocated among a set of advertisers competing to display an ad on the page. This gives rise to a bipartite matching market that is typically cleared by the way of an automated auction. Several auction mechanisms have been proposed, with variants of the Generalized Second Price (GSP) being widely used in practice. A rich body of work on bipartite matching markets builds upon the stable marriage model of Gale and Shapley and the assignment model of Shapley and Shubik. We apply insights from this line of research into the structure of stable outcomes and their incentive properties to advertising auctions. We model advertising auctions in terms of an assignment model with linear utilities, extended with bidder and item specific maximum and minimum prices. Auction mechanisms like the commonly used GSP or the well-known Vickrey-Clarke-Groves (VCG) are interpreted as simply computing a \emph{bidder-optimal stable matching} in this model, for a suitably defined set of bidder preferences. In our model, the existence of a stable matching is guaranteed, and under a non-degeneracy assumption a bidder-optimal stable matching exists as well. We give an algorithm to find such matching in polynomial time, and use it to design truthful mechanism that generalizes GSP, is truthful for profit-maximizing bidders, implements features like bidder-specific minimum prices and position-specific bids, and works for rich mixtures of bidders and preferences.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 17:16:29 GMT" } ]
2008-07-09T00:00:00
[ [ "Aggarwal", "Gagan", "" ], [ "Muthukrishnan", "S.", "" ], [ "Pal", "David", "" ], [ "Pal", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0807.1313
Yingda Chen
Yingda Chen and Shalinee Kishore
On the Tradeoffs of Implementing Randomized Network Coding in Multicast Networks
22 pages, 5 figures, submitted to IEEE Transactions on Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Randomized network coding (RNC) greatly reduces the complexity of implementing network coding in large-scale, heterogeneous networks. This paper examines two tradeoffs in applying RNC: The first studies how the performance of RNC varies with a node's randomizing capabilities. Specifically, a limited randomized network coding (L-RNC) scheme - in which intermediate nodes perform randomized encoding based on only a limited number of random coefficients - is proposed and its performance bounds are analyzed. Such a L-RNC approach is applicable to networks in which nodes have either limited computation/storage capacity or have ambiguity about downstream edge connectivity (e.g., as in ad hoc sensor networks). A second tradeoff studied here examines the relationship between the reliability and the capacity gains of generalized RNC, i.e., how the outage probability of RNC relates to the transmission rate at the source node. This tradeoff reveals that significant reductions in outage probability are possible when the source transmits deliberately and only slightly below network capacity. This approach provides an effective means to improve the feasibility probability of RNC when the size of the finite field is fixed.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 19:03:15 GMT" }, { "version": "v2", "created": "Wed, 18 Feb 2009 16:27:36 GMT" } ]
2009-02-18T00:00:00
[ [ "Chen", "Yingda", "" ], [ "Kishore", "Shalinee", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.1372
Danilo Silva
Danilo Silva, Frank R. Kschischang, Ralf K\"otter
Communication over Finite-Field Matrix Channels
24 pages, to be published at the IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, vol. 56, no. 3, pp. 1296-1305, Mar. 2010
10.1109/TIT.2009.2039167
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is motivated by the problem of error control in network coding when errors are introduced in a random fashion (rather than chosen by an adversary). An additive-multiplicative matrix channel is considered as a model for random network coding. The model assumes that n packets of length m are transmitted over the network, and up to t erroneous packets are randomly chosen and injected into the network. Upper and lower bounds on capacity are obtained for any channel parameters, and asymptotic expressions are provided in the limit of large field or matrix size. A simple coding scheme is presented that achieves capacity in both limiting cases. The scheme has decoding complexity O(n^2 m) and a probability of error that decreases exponentially both in the packet length and in the field size in bits. Extensions of these results for coherent network coding are also presented.
[ { "version": "v1", "created": "Wed, 9 Jul 2008 04:25:44 GMT" }, { "version": "v2", "created": "Tue, 7 Jul 2009 01:57:55 GMT" }, { "version": "v3", "created": "Fri, 11 Sep 2009 09:18:44 GMT" }, { "version": "v4", "created": "Mon, 14 Sep 2009 13:08:21 GMT" } ]
2019-05-07T00:00:00
[ [ "Silva", "Danilo", "" ], [ "Kschischang", "Frank R.", "" ], [ "Kötter", "Ralf", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.1412
Partha Mukhopadhyay
V. Arvind and Partha Mukhopadhyay
Quantum Query Complexity of Multilinear Identity Testing
12 pages
null
null
null
cs.CC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Motivated by the quantum algorithm in \cite{MN05} for testing commutativity of black-box groups, we study the following problem: Given a black-box finite ring $R=\angle{r_1,...,r_k}$ where $\{r_1,r_2,...,r_k\}$ is an additive generating set for $R$ and a multilinear polynomial $f(x_1,...,x_m)$ over $R$ also accessed as a black-box function $f:R^m\to R$ (where we allow the indeterminates $x_1,...,x_m$ to be commuting or noncommuting), we study the problem of testing if $f$ is an \emph{identity} for the ring $R$. More precisely, the problem is to test if $f(a_1,a_2,...,a_m)=0$ for all $a_i\in R$. We give a quantum algorithm with query complexity $O(m(1+\alpha)^{m/2} k^{\frac{m}{m+1}})$ assuming $k\geq (1+1/\alpha)^{m+1}$. Towards a lower bound, we also discuss a reduction from a version of $m$-collision to this problem. We also observe a randomized test with query complexity $4^mmk$ and constant success probability and a deterministic test with $k^m$ query complexity.
[ { "version": "v1", "created": "Wed, 9 Jul 2008 10:39:19 GMT" } ]
2008-07-10T00:00:00
[ [ "Arvind", "V.", "" ], [ "Mukhopadhyay", "Partha", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0807.1458
Maziar Nekovee
Maziar Nekovee, Y. Moreno, G. Bianconi, M. Marsili
Theory of Rumour Spreading in Complex Social Networks
null
Physica A, Vol 374, 457 (2007)
10.1016/j.physa.2006.07.017
null
physics.soc-ph cond-mat.stat-mech cs.CR physics.bio-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a general stochastic model for the spread of rumours, and derive mean-field equations that describe the dynamics of the model on complex social networks (in particular those mediated by the Internet). We use analytical and numerical solutions of these equations to examine the threshold behavior and dynamics of the model on several models of such networks: random graphs, uncorrelated scale-free networks and scale-free networks with assortative degree correlations. We show that in both homogeneous networks and random graphs the model exhibits a critical threshold in the rumour spreading rate below which a rumour cannot propagate in the system. In the case of scale-free networks, on the other hand, this threshold becomes vanishingly small in the limit of infinite system size. We find that the initial rate at which a rumour spreads is much higher in scale-free networks than in random graphs, and that the rate at which the spreading proceeds on scale-free networks is further increased when assortative degree correlations are introduced. The impact of degree correlations on the final fraction of nodes that ever hears a rumour, however, depends on the interplay between network topology and the rumour spreading rate. Our results show that scale-free social networks are prone to the spreading of rumours, just as they are to the spreading of infections. They are relevant to the spreading dynamics of chain emails, viral advertising and large-scale information dissemination algorithms on the Internet.
[ { "version": "v1", "created": "Wed, 9 Jul 2008 14:34:22 GMT" } ]
2009-11-13T00:00:00
[ [ "Nekovee", "Maziar", "" ], [ "Moreno", "Y.", "" ], [ "Bianconi", "G.", "" ], [ "Marsili", "M.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "physics.bio-ph", "description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.", "span": "(Biological Physics)" } ]
0807.1475
Maziar Nekovee
Maziar Nekovee
Simulations of Large-scale WiFi-based Wireless Networks: Interdisciplinary Challenges and Applications
Future Generation Computer Systems, Article in Press
null
10.1016/j.future.2008.05.007
null
cs.CE cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Fidelity (WiFi) is the fastest growing wireless technology to date. In addition to providing wire-free connectivity to the Internet WiFi technology also enables mobile devices to connect directly to each other and form highly dynamic wireless adhoc networks. Such distributed networks can be used to perform cooperative communication tasks such ad data routing and information dissemination in the absence of a fixed infrastructure. Furthermore, adhoc grids composed of wirelessly networked portable devices are emerging as a new paradigm in grid computing. In this paper we review computational and algorithmic challenges of high-fidelity simulations of such WiFi-based wireless communication and computing networks, including scalable topology maintenance, mobility modelling, parallelisation and synchronisation. We explore similarities and differences between the simulations of these networks and simulations of interacting many-particle systems, such as molecular dynamics (MD) simulations. We show how the cell linked-list algorithm which we have adapted from our MD simulations can be used to greatly improve the computational performance of wireless network simulators in the presence of mobility, and illustrate with an example from our simulation studies of worm attacks on mobile wireless adhoc networks.
[ { "version": "v1", "created": "Wed, 9 Jul 2008 16:04:37 GMT" } ]
2008-07-10T00:00:00
[ [ "Nekovee", "Maziar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0807.1494
Matteo Gagliolo
Matteo Gagliolo and Juergen Schmidhuber
Algorithm Selection as a Bandit Problem with Unbounded Losses
15 pages, 2 figures
null
10.1007/978-3-642-13800-3_7
IDSIA-07-08
cs.AI cs.GT cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Algorithm selection is typically based on models of algorithm performance, learned during a separate offline training sequence, which can be prohibitively expensive. In recent work, we adopted an online approach, in which a performance model is iteratively updated and used to guide selection on a sequence of problem instances. The resulting exploration-exploitation trade-off was represented as a bandit problem with expert advice, using an existing solver for this game, but this required the setting of an arbitrary bound on algorithm runtimes, thus invalidating the optimal regret of the solver. In this paper, we propose a simpler framework for representing algorithm selection as a bandit problem, with partial information, and an unknown bound on losses. We adapt an existing solver to this game, proving a bound on its expected regret, which holds also for the resulting algorithm selection technique. We present preliminary experiments with a set of SAT solvers on a mixed SAT-UNSAT benchmark.
[ { "version": "v1", "created": "Wed, 9 Jul 2008 16:47:36 GMT" } ]
2013-01-31T00:00:00
[ [ "Gagliolo", "Matteo", "" ], [ "Schmidhuber", "Juergen", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0807.1496
Luis Rademacher
Navin Goyal, Luis Rademacher, Santosh Vempala
Expanders via Random Spanning Trees
null
null
null
null
cs.DM cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the problem of routing reliably and scalably in a graph, we introduce the notion of a splicer, the union of spanning trees of a graph. We prove that for any bounded-degree n-vertex graph, the union of two random spanning trees approximates the expansion of every cut of the graph to within a factor of O(log n). For the random graph G_{n,p}, for p> c log{n}/n, two spanning trees give an expander. This is suggested by the case of the complete graph, where we prove that two random spanning trees give an expander. The construction of the splicer is elementary -- each spanning tree can be produced independently using an algorithm by Aldous and Broder: a random walk in the graph with edges leading to previously unvisited vertices included in the tree. A second important application of splicers is to graph sparsification where the goal is to approximate every cut (and more generally the quadratic form of the Laplacian) using only a small subgraph of the original graph. Benczur-Karger as well as Spielman-Srivastava have shown sparsifiers with O(n log n/eps^2)$ edges that achieve approximation within factors 1+eps and 1-eps. Their methods, based on independent sampling of edges, need Omega(n log n) edges to get any approximation (else the subgraph could be disconnected) and leave open the question of linear-size sparsifiers. Splicers address this question for random graphs by providing sparsifiers of size O(n) that approximate every cut to within a factor of O(log n).
[ { "version": "v1", "created": "Wed, 9 Jul 2008 16:49:16 GMT" } ]
2008-07-10T00:00:00
[ [ "Goyal", "Navin", "" ], [ "Rademacher", "Luis", "" ], [ "Vempala", "Santosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0807.1513
Jonathan Tapson
J. Tapson, C. Jin, A. van Schaik, and R. Etienne-Cummings
A First-Order Non-Homogeneous Markov Model for the Response of Spiking Neurons Stimulated by Small Phase-Continuous Signals
Accepted for publication in Neural Computation
Neural Computation Volume 21 Issue 6 Pages 1554-1588 Year 2009
null
null
q-bio.NC cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a first-order non-homogeneous Markov model for the interspike-interval density of a continuously stimulated spiking neuron. The model allows the conditional interspike-interval density and the stationary interspike-interval density to be expressed as products of two separate functions, one of which describes only the neuron characteristics, and the other of which describes only the signal characteristics. This allows the use of this model to predict the response when the underlying neuron model is not known or well determined. The approximation shows particularly clearly that signal autocorrelations and cross-correlations arise as natural features of the interspike-interval density, and are particularly clear for small signals and moderate noise. We show that this model simplifies the design of spiking neuron cross-correlation systems, and describe a four-neuron mutual inhibition network that generates a cross-correlation output for two input signals.
[ { "version": "v1", "created": "Wed, 9 Jul 2008 18:36:48 GMT" } ]
2012-08-15T00:00:00
[ [ "Tapson", "J.", "" ], [ "Jin", "C.", "" ], [ "van Schaik", "A.", "" ], [ "Etienne-Cummings", "R.", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0807.1523
Philippe Dumas
Philippe Dumas (INRIA Rocquencourt)
Mean asymptotic behaviour of radix-rational sequences and dilation equations (Extended version)
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The generating series of a radix-rational sequence is a rational formal power series from formal language theory viewed through a fixed radix numeration system. For each radix-rational sequence with complex values we provide an asymptotic expansion for the sequence of its Ces\`aro means. The precision of the asymptotic expansion depends on the joint spectral radius of the linear representation of the sequence; the coefficients are obtained through some dilation equations. The proofs are based on elementary linear algebra.
[ { "version": "v1", "created": "Wed, 9 Jul 2008 19:15:48 GMT" }, { "version": "v2", "created": "Thu, 21 Aug 2008 19:52:55 GMT" } ]
2008-08-21T00:00:00
[ [ "Dumas", "Philippe", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0807.1524
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis), Ekaterina Komendantskaya (INRIA Sophia Antipolis)
Inductive and Coinductive Components of Corecursive Functions in Coq
Dans Coalgebraic Methods in Computer Science (2008)
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Constructive Type Theory, recursive and corecursive definitions are subject to syntactic restrictions which guarantee termination for recursive functions and productivity for corecursive functions. However, many terminating and productive functions do not pass the syntactic tests. Bove proposed in her thesis an elegant reformulation of the method of accessibility predicates that widens the range of terminative recursive functions formalisable in Constructive Type Theory. In this paper, we pursue the same goal for productive corecursive functions. Notably, our method of formalisation of coinductive definitions of productive functions in Coq requires not only the use of ad-hoc predicates, but also a systematic algorithm that separates the inductive and coinductive parts of functions.
[ { "version": "v1", "created": "Wed, 9 Jul 2008 19:16:25 GMT" } ]
2008-07-10T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ], [ "Komendantskaya", "Ekaterina", "", "INRIA\n Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0807.1543
Xiaohu Shang
Xiaohu Shang, Biao Chen, Gerhard Kramer, H. Vincent Poor
On the Capacity of MIMO Interference Channels
8 pages, 2 figures, submitted to Allerton 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity region of a multiple-input-multiple-output interference channel (MIMO IC) where the channel matrices are square and invertible is studied. The capacity region for strong interference is established where the definition of strong interference parallels that of scalar channels. Moreover, the sum-rate capacity for Z interference, noisy interference, and mixed interference is established. These results generalize known results for the scalar Gaussian IC.
[ { "version": "v1", "created": "Thu, 10 Jul 2008 00:39:06 GMT" }, { "version": "v2", "created": "Thu, 25 Sep 2008 19:40:13 GMT" } ]
2008-09-25T00:00:00
[ [ "Shang", "Xiaohu", "" ], [ "Chen", "Biao", "" ], [ "Kramer", "Gerhard", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.1550
Paul Slater
Paul B. Slater
Discernment of Hubs and Clusters in Socioeconomic Networks
17 pages, small mathematical expression for the probability 0.973469 now correctly written (mid. p. 9)
null
null
null
physics.soc-ph cs.SI physics.data-an stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interest in the analysis of networks has grown rapidly in the new millennium. Consequently, we promote renewed attention to a certain methodological approach introduced in 1974. Over the succeeding decade, this two-stage--double-standardization and hierarchical clustering (single-linkage-like)--procedure was applied to a wide variety of weighted, directed networks of a socioeconomic nature, frequently revealing the presence of ``hubs''. These were, typically--in the numerous instances studied of migration flows between geographic subdivisions within nations--``cosmopolitan/non-provincial'' areas, a prototypical example being the French capital, Paris. Such locations emit and absorb people broadly across their respective nations. Additionally, the two-stage procedure--which ``might very well be the most successful application of cluster analysis'' (R. C. Dubes, 1985)--detected many (physically or socially) isolated, functional groups (regions) of areas, such as the southern islands, Shikoku and Kyushu, of Japan, the Italian islands of Sardinia and Sicily, and the New England region of the United States. Further, we discuss a (complementary) approach developed in 1976, in which the max-flow/min-cut theorem was applied to raw/non-standardized (interindustry, as well as migration) flows.
[ { "version": "v1", "created": "Thu, 10 Jul 2008 15:53:54 GMT" }, { "version": "v2", "created": "Thu, 17 Jul 2008 17:52:57 GMT" }, { "version": "v3", "created": "Wed, 23 Jul 2008 17:54:03 GMT" } ]
2012-07-03T00:00:00
[ [ "Slater", "Paul B.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0807.1560
Vahed Qazvinian
Vahed Qazvinian and Dragomir R. Radev
Scientific Paper Summarization Using Citation Summary Networks
null
null
null
null
cs.IR cs.CL
http://creativecommons.org/licenses/by-nc-sa/3.0/
Quickly moving to a new area of research is painful for researchers due to the vast amount of scientific literature in each field of study. One possible way to overcome this problem is to summarize a scientific topic. In this paper, we propose a model of summarizing a single article, which can be further used to summarize an entire topic. Our model is based on analyzing others' viewpoint of the target article's contributions and the study of its citation summary network using a clustering approach.
[ { "version": "v1", "created": "Thu, 10 Jul 2008 00:01:20 GMT" } ]
2008-07-11T00:00:00
[ [ "Qazvinian", "Vahed", "" ], [ "Radev", "Dragomir R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0807.1603
Cl\'emence Magnien
Matthieu Latapy, Clemence Magnien and Frederic Ouedraogo
A Radar for the Internet
8 pages
Proceedings of ADN'08: 1st International Workshop on Analysis of Dynamic Networks, in conjonction with IEEE ICDM 2008
10.1109/ICDMW.2008.121
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In contrast with most internet topology measurement research, our concern here is not to obtain a map as complete and precise as possible of the whole internet. Instead, we claim that each machine's view of this topology, which we call ego-centered view, is an object worth of study in itself. We design and implement an ego-centered measurement tool, and perform radar-like measurements consisting of repeated measurements of such views of the internet topology. We conduct long-term (several weeks) and high-speed (one round every few minutes) measurements of this kind from more than one hundred monitors, and we provide the obtained data. We also show that these data may be used to detect events in the dynamics of internet topology.
[ { "version": "v1", "created": "Thu, 10 Jul 2008 09:34:19 GMT" }, { "version": "v2", "created": "Mon, 9 Feb 2009 15:43:16 GMT" } ]
2016-11-15T00:00:00
[ [ "Latapy", "Matthieu", "" ], [ "Magnien", "Clemence", "" ], [ "Ouedraogo", "Frederic", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0807.1667
Alexey Toporensky
A. V. Toporensky
Quasi-Mandelbrot sets for perturbed complex analytic maps: visual patterns
6 pages with 10 JPEG pictures
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider perturbations of the complex quadratic map $ z \to z^2 +c$ and corresponding changes in their quasi-Mandelbrot sets. Depending on particular perturbation, visual forms of quasi-Mandelbrot set changes either sharply (when the perturbation reaches some critical value) or continuously. In the latter case we have a smooth transition from the classical form of the set to some forms, constructed from mostly linear structures, as it is typical for two-dimensional real number dynamics. Two examples of continuous evolution of the quasi-Mandelbrot set are described.
[ { "version": "v1", "created": "Thu, 10 Jul 2008 14:40:35 GMT" } ]
2008-07-11T00:00:00
[ [ "Toporensky", "A. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0807.1669
Milad Niqui
Milad Niqui
Coinductive Formal Reasoning in Exact Real Arithmetic
40 pages
Logical Methods in Computer Science, Volume 4, Issue 3 (September 10, 2008) lmcs:953
10.2168/LMCS-4(3:6)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we present a method for formally proving the correctness of the lazy algorithms for computing homographic and quadratic transformations -- of which field operations are special cases-- on a representation of real numbers by coinductive streams. The algorithms work on coinductive stream of M\"{o}bius maps and form the basis of the Edalat--Potts exact real arithmetic. We use the machinery of the Coq proof assistant for the coinductive types to present the formalisation. The formalised algorithms are only partially productive, i.e., they do not output provably infinite streams for all possible inputs. We show how to deal with this partiality in the presence of syntactic restrictions posed by the constructive type theory of Coq. Furthermore we show that the type theoretic techniques that we develop are compatible with the semantics of the algorithms as continuous maps on real numbers. The resulting Coq formalisation is available for public download.
[ { "version": "v1", "created": "Thu, 10 Jul 2008 14:56:05 GMT" }, { "version": "v2", "created": "Wed, 10 Sep 2008 14:30:03 GMT" } ]
2015-07-01T00:00:00
[ [ "Niqui", "Milad", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0807.1720
Veronika Rehn-Sonigo
Anne Benoit (LIP), Henri Casanova, Veronika Rehn-Sonigo (LIP), Yves Robert (LIP)
Resource Allocation Strategies for In-Network Stream Processing
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the operator mapping problem for in-network stream processing applications. In-network stream processing consists in applying a tree of operators in steady-state to multiple data objects that are continually updated at various locations on a network. Examples of in-network stream processing include the processing of data in a sensor network, or of continuous queries on distributed relational databases. We study the operator mapping problem in a ``constructive'' scenario, i.e., a scenario in which one builds a platform dedicated to the application buy purchasing processing servers with various costs and capabilities. The objective is to minimize the cost of the platform while ensuring that the application achieves a minimum steady-state throughput. The first contribution of this paper is the formalization of a set of relevant operator-placement problems as linear programs, and a proof that even simple versions of the problem are NP-complete. Our second contribution is the design of several polynomial time heuristics, which are evaluated via extensive simulations and compared to theoretical bounds for optimal solutions.
[ { "version": "v1", "created": "Thu, 10 Jul 2008 19:14:14 GMT" } ]
2008-07-11T00:00:00
[ [ "Benoit", "Anne", "", "LIP" ], [ "Casanova", "Henri", "", "LIP" ], [ "Rehn-Sonigo", "Veronika", "", "LIP" ], [ "Robert", "Yves", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0807.1734
Daniel Lemire
Daniel Lemire
Faster Sequential Search with a Two-Pass Dynamic-Time-Warping Lower Bound
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Dynamic Time Warping (DTW) is a popular similarity measure between time series. The DTW fails to satisfy the triangle inequality and its computation requires quadratic time. Hence, to find closest neighbors quickly, we use bounding techniques. We can avoid most DTW computations with an inexpensive lower bound (LB_Keogh). We compare LB_Keogh with a tighter lower bound (LB_Improved). We find that LB_Improved-based search is faster for sequential search. As an example, our approach is 3 times faster over random-walk and shape time series. We also review some of the mathematical properties of the DTW. We derive a tight triangle inequality for the DTW. We show that the DTW becomes the l_1 distance when time series are separated by a constant.
[ { "version": "v1", "created": "Thu, 10 Jul 2008 20:26:31 GMT" }, { "version": "v2", "created": "Mon, 21 Jul 2008 22:16:03 GMT" }, { "version": "v3", "created": "Thu, 4 Sep 2008 15:36:33 GMT" }, { "version": "v4", "created": "Mon, 6 Oct 2008 19:56:39 GMT" }, { "version": "v5", "created": "Tue, 7 Oct 2008 00:45:02 GMT" } ]
2008-10-07T00:00:00
[ [ "Lemire", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0807.1753
Maria Gradinariu Potop-Butucaru
Julien Clement (1), Xavier Defago (2), Maria Gradinariu Potop-Butucaru (2) and Stephane Messika (1) ((1) LRI, Universite Paris 11, France (2) JAIST, Japon, (3) LIP6, Universite Paris 6)
The cost of probabilistic gathering in oblivious robot networks
null
null
null
null
cs.DC cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we address the complexity issues of two agreement problems in oblivious robot networks namely gathering and scattering. These abstractions are fundamental coordination problems in cooperative mobile robotics. Moreover, their oblivious characteristics makes them appealing for self-stabilization since they are self-stabilizing with no extra-cost. Given a set of robots with arbitrary initial location and no initial agreement on a global coordinate system, gathering requires that all robots reach the exact same but not predetermined location while scattering aims at scatter robots such that no two robots share the same location. Both deterministic gathering and scattering have been proved impossible under arbitrary schedulers therefore probabilistic solutions have been recently proposed. The contribution of this paper is twofold. First, we propose a detailed complexity analysis of the existent probabilistic gathering algorithms in both fault-free and fault-prone environments. We consider both crash and byzantine-prone environments. Moreover, using Markov chains tools and additional assumptions on the environment we prove that the gathering convergence time can be reduced from O(n^2) (the best known tight bound) to O(nln(n)). Additionally, we prove that in crash-prone environments gathering is achieved in O(nln(n)+2f). Second, using the same technique we prove that the best known scattering strategy converges in fault-free systems is O(n) (which is one to optimal) while in crash-prone environments it needs O(n-f). Finally, we conclude the paper with a discussion related to different strategies to gather oblivious robots.
[ { "version": "v1", "created": "Thu, 10 Jul 2008 22:43:42 GMT" } ]
2008-07-14T00:00:00
[ [ "Clement", "Julien", "" ], [ "Defago", "Xavier", "" ], [ "Potop-Butucaru", "Maria Gradinariu", "" ], [ "Messika", "Stephane", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0807.1765
Renato Figueiredo
Renato Figueiredo, P. Oscar Boykin, Jose A. B. Fortes, Tao Li, Jie-Kwon Peir, David Wolinsky, Lizy John, David Kaeli, David Lilja, Sally McKee, Gokhan Memik, Alain Roy, Gary Tyson
Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education
11 pages, 2 figures. Describes the Archer project, http://archer-project.org
null
10.1007/978-3-642-03354-4_7
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces Archer, a community-based computing resource for computer architecture research and education. The Archer infrastructure integrates virtualization and batch scheduling middleware to deliver high-throughput computing resources aggregated from resources distributed across wide-area networks and owned by different participating entities in a seamless manner. The paper discusses the motivations leading to the design of Archer, describes its core middleware components, and presents an analysis of the functionality and performance of a prototype wide-area deployment running a representative computer architecture simulation workload.
[ { "version": "v1", "created": "Fri, 11 Jul 2008 02:47:55 GMT" } ]
2015-05-13T00:00:00
[ [ "Figueiredo", "Renato", "" ], [ "Boykin", "P. Oscar", "" ], [ "Fortes", "Jose A. B.", "" ], [ "Li", "Tao", "" ], [ "Peir", "Jie-Kwon", "" ], [ "Wolinsky", "David", "" ], [ "John", "Lizy", "" ], [ "Kaeli", "David", "" ], [ "Lilja", "David", "" ], [ "McKee", "Sally", "" ], [ "Memik", "Gokhan", "" ], [ "Roy", "Alain", "" ], [ "Tyson", "Gary", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0807.1773
Kaibin Huang
Kaibin Huang, Jeffrey G. Andrews, Dongning Guo, Robert W. Heath, Jr., and Randall A. Berry
Spatial Interference Cancellation for Multi-Antenna Mobile Ad Hoc Networks
28 pages; submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interference between nodes is a critical impairment in mobile ad hoc networks (MANETs). This paper studies the role of multiple antennas in mitigating such interference. Specifically, a network is studied in which receivers apply zero-forcing beamforming to cancel the strongest interferers. Assuming a network with Poisson distributed transmitters and independent Rayleigh fading channels, the transmission capacity is derived, which gives the maximum number of successful transmissions per unit area. Mathematical tools from stochastic geometry are applied to obtain the asymptotic transmission capacity scaling and characterize the impact of inaccurate channel state information (CSI). It is shown that, if each node cancels L interferers, the transmission capacity decreases as the outage probability to the power of 1/(L+1) as the outage probability vanishes. For fixed outage probability, as L grows, the transmission capacity increases as L to the power of (1-2/alpha) where alpha is the path-loss exponent. Moreover, CSI inaccuracy is shown to have no effect on the transmission capacity scaling as the outage probability vanishes, provided that the CSI training sequence has an appropriate length, which we derived. Numerical results suggest that canceling merely one interferer by each node increases the transmission capacity by an order of magnitude or more, even when the CSI is imperfect.
[ { "version": "v1", "created": "Fri, 11 Jul 2008 04:45:33 GMT" }, { "version": "v2", "created": "Fri, 24 Sep 2010 07:26:01 GMT" } ]
2012-08-27T00:00:00
[ [ "Huang", "Kaibin", "" ], [ "Andrews", "Jeffrey G.", "" ], [ "Guo", "Dongning", "" ], [ "Heath,", "Robert W.", "Jr." ], [ "Berry", "Randall A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0807.1775
Damien Vergnaud
Beno\^it Libert and Damien Vergnaud
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
32 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re-distributes users' decryption keys, it runs the risk of being caught and prosecuted. Goyal proposed two constructions: the first one is efficient but can only trace well-formed decryption keys to their source; the second one allows tracing obfuscated decryption boxes in a model (called weak black-box model) where cheating authorities have no decryption oracle. The latter scheme is unfortunately far less efficient in terms of decryption cost and ciphertext size. In this work, we propose a new construction that combines the efficiency of Goyal's first proposal with a very simple weak black-box tracing mechanism. Our scheme is described in the selective-ID model but readily extends to meet all security properties in the adaptive-ID sense, which is not known to be true for prior black-box schemes.
[ { "version": "v1", "created": "Fri, 11 Jul 2008 09:40:01 GMT" }, { "version": "v2", "created": "Wed, 16 Jul 2008 08:50:10 GMT" }, { "version": "v3", "created": "Fri, 3 Oct 2008 07:37:56 GMT" }, { "version": "v4", "created": "Tue, 16 Dec 2008 09:47:29 GMT" }, { "version": "v5", "created": "Tue, 8 Sep 2009 16:06:59 GMT" } ]
2009-09-08T00:00:00
[ [ "Libert", "Benoît", "" ], [ "Vergnaud", "Damien", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0807.1891
Benjmain Moseley
Chandra Chekuri and Benjamin Moseley
Online Scheduling to Minimize the Maximum Delay Factor
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper two scheduling models are addressed. First is the standard model (unicast) where requests (or jobs) are independent. The other is the broadcast model where broadcasting a page can satisfy multiple outstanding requests for that page. We consider online scheduling of requests when they have deadlines. Unlike previous models, which mainly consider the objective of maximizing throughput while respecting deadlines, here we focus on scheduling all the given requests with the goal of minimizing the maximum {\em delay factor}.We prove strong lower bounds on the achievable competitive ratios for delay factor scheduling even with unit-time requests.For the unicast model we give algorithms that are $(1 + \eps)$-speed $O({1 \over \eps})$-competitive in both the single machine and multiple machine settings. In the broadcast model we give an algorithm for similar-sized pages that is $(2+ \eps)$-speed $O({1 \over \eps^2})$-competitive. For arbitrary page sizes we give an algorithm that is $(4+\eps)$-speed $O({1 \over \eps^2})$-competitive.
[ { "version": "v1", "created": "Fri, 11 Jul 2008 17:00:07 GMT" } ]
2008-07-14T00:00:00
[ [ "Chekuri", "Chandra", "" ], [ "Moseley", "Benjamin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0807.1906
Florentin Smarandache
Florentin Smarandache
Extension of Inagaki General Weighted Operators and A New Fusion Rule Class of Proportional Redistribution of Intersection Masses
6 pages; SWIFT 2008 - Skovde Workshop on Information Fusion Topics, Sweden;
International Journal of Artificial Intelligence, Vol. 3, No. A09, 79-85, 2009
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we extend Inagaki Weighted Operators fusion rule (WO) in information fusion by doing redistribution of not only the conflicting mass, but also of masses of non-empty intersections, that we call Double Weighted Operators (DWO). Then we propose a new fusion rule Class of Proportional Redistribution of Intersection Masses (CPRIM), which generates many interesting particular fusion rules in information fusion. Both formulas are presented for any number of sources of information. An application and comparison with other fusion rules are given in the last section.
[ { "version": "v1", "created": "Fri, 11 Jul 2008 18:30:10 GMT" }, { "version": "v2", "created": "Mon, 1 Sep 2008 19:03:33 GMT" }, { "version": "v3", "created": "Sat, 4 Oct 2008 23:09:41 GMT" } ]
2009-06-17T00:00:00
[ [ "Smarandache", "Florentin", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0807.1919
Assaf Naor
William B. Johnson and Assaf Naor
The Johnson-Lindenstrauss lemma almost characterizes Hilbert space, but not quite
null
null
null
null
math.FA cs.CG math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $X$ be a normed space that satisfies the Johnson-Lindenstrauss lemma (J-L lemma, in short) in the sense that for any integer $n$ and any $x_1,\ldots,x_n\in X$ there exists a linear mapping $L:X\to F$, where $F\subseteq X$ is a linear subspace of dimension $O(\log n)$, such that $\|x_i-x_j\|\le\|L(x_i)-L(x_j)\|\le O(1)\cdot\|x_i-x_j\|$ for all $i,j\in \{1,\ldots, n\}$. We show that this implies that $X$ is almost Euclidean in the following sense: Every $n$-dimensional subspace of $X$ embeds into Hilbert space with distortion $2^{2^{O(\log^*n)}}$. On the other hand, we show that there exists a normed space $Y$ which satisfies the J-L lemma, but for every $n$ there exists an $n$-dimensional subspace $E_n\subseteq Y$ whose Euclidean distortion is at least $2^{\Omega(\alpha(n))}$, where $\alpha$ is the inverse Ackermann function.
[ { "version": "v1", "created": "Fri, 11 Jul 2008 19:39:07 GMT" } ]
2008-07-29T00:00:00
[ [ "Johnson", "William B.", "" ], [ "Naor", "Assaf", "" ] ]
[ { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
0807.1949
Fei Wei
Fei Wei, Huazhong Yang
Virtual Transmission Method, A New Distributed Algorithm to Solve Sparse Linear System
v1: short paper to describe VTM, published by NCM'08; v2: add an example of level-two splitting; v3: full paper; v4: rename EVS to GNBT; add lines coupling technique; v5: reuse EVS, get rid of GNBT; more info, see http://weifei00.googlepages.com
null
10.1109/NCM.2008.160
null
math.NA cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new parallel algorithm which could work naturally on the parallel computer with arbitrary number of processors. This algorithm is named Virtual Transmission Method (VTM). Its physical backgroud is the lossless transmission line and microwave network. The basic idea of VTM is to insert lossless transmission lines into the sparse linear system to achieve distributed computing. VTM is proved to be convergent to solve SPD linear system. Preconditioning method and performance model are presented. Numerical experiments show that VTM is efficient, accurate and stable. Accompanied with VTM, we bring in a new technique to partition the symmetric linear system, which is named Generalized Node & Branch Tearing (GNBT). It is based on Kirchhoff's Current Law from circuit theory. We proved that GNBT is feasible to partition any SPD linear system.
[ { "version": "v1", "created": "Sat, 12 Jul 2008 03:19:51 GMT" }, { "version": "v2", "created": "Mon, 20 Oct 2008 03:01:22 GMT" }, { "version": "v3", "created": "Tue, 17 Feb 2009 04:35:25 GMT" }, { "version": "v4", "created": "Thu, 29 Apr 2010 13:51:10 GMT" }, { "version": "v5", "created": "Tue, 7 Sep 2010 23:35:28 GMT" } ]
2010-09-09T00:00:00
[ [ "Wei", "Fei", "" ], [ "Yang", "Huazhong", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0807.1997
Zhi-Hua Zhou
Zhi-Hua Zhou, Yu-Yin Sun, Yu-Feng Li
Multi-Instance Learning by Treating Instances As Non-I.I.D. Samples
ICML, 2009
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-instance learning attempts to learn from a training set consisting of labeled bags each containing many unlabeled instances. Previous studies typically treat the instances in the bags as independently and identically distributed. However, the instances in a bag are rarely independent, and therefore a better performance can be expected if the instances are treated in an non-i.i.d. way that exploits the relations among instances. In this paper, we propose a simple yet effective multi-instance learning method, which regards each bag as a graph and uses a specific kernel to distinguish the graphs by considering the features of the nodes as well as the features of the edges that convey some relations among instances. The effectiveness of the proposed method is validated by experiments.
[ { "version": "v1", "created": "Sat, 12 Jul 2008 20:19:18 GMT" }, { "version": "v2", "created": "Wed, 15 Apr 2009 17:22:40 GMT" }, { "version": "v3", "created": "Fri, 17 Apr 2009 08:43:03 GMT" }, { "version": "v4", "created": "Wed, 13 May 2009 16:22:00 GMT" } ]
2009-05-13T00:00:00
[ [ "Zhou", "Zhi-Hua", "" ], [ "Sun", "Yu-Yin", "" ], [ "Li", "Yu-Feng", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0807.2011
Martin Hoefer
Martin Hoefer and Alexander Skopalik
Altruism in Atomic Congestion Games
13 pages, 1 figure, includes some minor adjustments
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the effects of introducing altruistic agents into atomic congestion games. Altruistic behavior is modeled by a trade-off between selfish and social objectives. In particular, we assume agents optimize a linear combination of personal delay of a strategy and the resulting increase in social cost. Our model can be embedded in the framework of congestion games with player-specific latency functions. Stable states are the Nash equilibria of these games, and we examine their existence and the convergence of sequential best-response dynamics. Previous work shows that for symmetric singleton games with convex delays Nash equilibria are guaranteed to exist. For concave delay functions we observe that there are games without Nash equilibria and provide a polynomial time algorithm to decide existence for symmetric singleton games with arbitrary delay functions. Our algorithm can be extended to compute best and worst Nash equilibria if they exist. For more general congestion games existence becomes NP-hard to decide, even for symmetric network games with quadratic delay functions. Perhaps surprisingly, if all delay functions are linear, then there is always a Nash equilibrium in any congestion game with altruists and any better-response dynamics converges. In addition to these results for uncoordinated dynamics, we consider a scenario in which a central altruistic institution can motivate agents to act altruistically. We provide constructive and hardness results for finding the minimum number of altruists to stabilize an optimal congestion profile and more general mechanisms to incentivize agents to adopt favorable behavior.
[ { "version": "v1", "created": "Sun, 13 Jul 2008 05:58:36 GMT" }, { "version": "v2", "created": "Wed, 4 Feb 2009 16:54:47 GMT" } ]
2009-02-04T00:00:00
[ [ "Hoefer", "Martin", "" ], [ "Skopalik", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]