id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0807.3803 | Mark Wilde | Mark M. Wilde and Todd A. Brun | Quantum Convolutional Coding with Shared Entanglement: General Structure | 23 pages, replaced with final published version | Quantum Information Processing, Volume 9, Number 5, pages 509-540,
September 2010 | 10.1007/s11128-010-0179-9 | CSI-08-07-02 | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a general theory of entanglement-assisted quantum convolutional
coding. The codes have a convolutional or memory structure, they assume that
the sender and receiver share noiseless entanglement prior to quantum
communication, and they are not restricted to possess the
Calderbank-Shor-Steane structure as in previous work. We provide two
significant advances for quantum convolutional coding theory. We first show how
to "expand" a given set of quantum convolutional generators. This expansion
step acts as a preprocessor for a polynomial symplectic Gram-Schmidt
orthogonalization procedure that simplifies the commutation relations of the
expanded generators to be the same as those of entangled Bell states (ebits)
and ancilla qubits. The above two steps produce a set of generators with
equivalent error-correcting properties to those of the original generators. We
then demonstrate how to perform online encoding and decoding for a stream of
information qubits, halves of ebits, and ancilla qubits. The upshot of our
theory is that the quantum code designer can engineer quantum convolutional
codes with desirable error-correcting properties without having to worry about
the commutation relations of these generators.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2008 07:00:01 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Jul 2008 20:33:30 GMT"
},
{
"version": "v3",
"created": "Thu, 11 Apr 2013 22:26:05 GMT"
}
]
| 2013-04-15T00:00:00 | [
[
"Wilde",
"Mark M.",
""
],
[
"Brun",
"Todd A.",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.3806 | Erdal Arikan | Erdal Arikan, Emre Telatar | On the Rate of Channel Polarization | Some minor corrections | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is shown that for any binary-input discrete memoryless channel $W$ with
symmetric capacity $I(W)$ and any rate $R <I(W)$, the probability of block
decoding error for polar coding under successive cancellation decoding
satisfies $P_e \le 2^{-N^\beta}$ for any $\beta<\frac12$ when the block-length
$N$ is large enough.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2008 19:23:53 GMT"
},
{
"version": "v2",
"created": "Sun, 27 Jul 2008 08:51:24 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Apr 2009 07:27:31 GMT"
}
]
| 2009-04-06T00:00:00 | [
[
"Arikan",
"Erdal",
""
],
[
"Telatar",
"Emre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.3845 | Stefano Crespi Reghizzi | Stefano Crespi Reghizzi | Formal semantics of language and the Richard-Berry paradox | null | null | null | null | cs.CL cs.CC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The classical logical antinomy known as Richard-Berry paradox is combined
with plausible assumptions about the size i.e. the descriptional complexity of
Turing machines formalizing certain sentences, to show that formalization of
language leads to contradiction.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2008 10:31:55 GMT"
}
]
| 2008-07-25T00:00:00 | [
[
"Reghizzi",
"Stefano Crespi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0807.3865 | Bruno Martin | Bruno Martin (I3S), Patrick Sol\'e (I3S) | Pseudo-random Sequences Generated by Cellular Automata | null | International Conference on Relations, Orders and Graphs:
Interactions with Computer Science, Mahdia : Tunisie (2008) | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generation of pseudo random sequences by cellular automata, as well as by
hybrid cellular automata is surveyed. An application to the fast evaluation and
FPGA implementation of some classes of boolean functions is sketched out.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2008 12:22:17 GMT"
}
]
| 2008-07-25T00:00:00 | [
[
"Martin",
"Bruno",
"",
"I3S"
],
[
"Solé",
"Patrick",
"",
"I3S"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0807.3879 | Alessandra Di Pierro | Alessandra Di Pierro, Chris Hankin and Herbert Wiklicky | Quantifying Timing Leaks and Cost Optimisation | 16 pages, 2 figures, 4 tables. A shorter version is included in the
proceedings of ICICS'08 - 10th International Conference on Information and
Communications Security, 20-22 October, 2008 Birmingham, UK | null | null | null | cs.CR cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a new notion of security against timing attacks where the attacker
is able to simultaneously observe the execution time of a program and the
probability of the values of low variables. We then show how to measure the
security of a program with respect to this notion via a computable estimate of
the timing leakage and use this estimate for cost optimisation.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2008 13:17:19 GMT"
}
]
| 2008-07-25T00:00:00 | [
[
"Di Pierro",
"Alessandra",
""
],
[
"Hankin",
"Chris",
""
],
[
"Wiklicky",
"Herbert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0807.3908 | Marko A. Rodriguez | Marko A. Rodriguez | A Distributed Process Infrastructure for a Distributed Data Structure | written as a column for the Semantic Web and Information Systems
Bulletin, AIS Special Interest Group on Semantic Web and Information Systems
(SIGSEMIS), ISSN: 1556-2301 | null | null | LA-UR-08-04138 | cs.AI cs.DL | http://creativecommons.org/licenses/publicdomain/ | The Resource Description Framework (RDF) is continuing to grow outside the
bounds of its initial function as a metadata framework and into the domain of
general-purpose data modeling. This expansion has been facilitated by the
continued increase in the capacity and speed of RDF database repositories known
as triple-stores. High-end RDF triple-stores can hold and process on the order
of 10 billion triples. In an effort to provide a seamless integration of the
data contained in RDF repositories, the Linked Data community is providing
specifications for linking RDF data sets into a universal distributed graph
that can be traversed by both man and machine. While the seamless integration
of RDF data sets is important, at the scale of the data sets that currently
exist and will ultimately grow to become, the "download and index" philosophy
of the World Wide Web will not so easily map over to the Semantic Web. This
essay discusses the importance of adding a distributed RDF process
infrastructure to the current distributed RDF data structure.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2008 15:16:16 GMT"
}
]
| 2008-07-25T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0807.3913 | Lina Mroueh Ms | Lina Mroueh, St\'ephanie Rouquette-L\'eveil, Ghaya Rekaya-Ben Othman
and Jean-Claude Belfiore | DMT of weighted Parallel Channels: Application to Broadcast Channel | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | 10.1109/ISIT.2008.4595413 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a broadcast channel with random packet arrival and transmission queues,
the stability of the system is achieved by maximizing a weighted sum rate
capacity with suitable weights that depend on the queue size. The weighted sum
rate capacity using Dirty Paper Coding (DPC) and Zero Forcing (ZF) is
asymptotically equivalent to the weighted sum capacity over parallel
single-channels. In this paper, we study the Diversity Multiplexing Tradeoff
(DMT) of the fading broadcast channel under a fixed weighted sum rate capacity
constraint. The DMT of both identical and different parallel weighted MISO
channels is first derived. Finally, we deduce the DMT of a broadcast channel
using DPC and ZF precoders.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2008 15:34:59 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Mroueh",
"Lina",
""
],
[
"Rouquette-Léveil",
"Stéphanie",
""
],
[
"Othman",
"Ghaya Rekaya-Ben",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.3917 | Erdal Arikan | Erdal Arikan | Channel polarization: A method for constructing capacity-achieving codes
for symmetric binary-input memoryless channels | The version which appears in the IEEE Transactions on Information
Theory, July 2009 | null | 10.1109/TIT.2009.2021379 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A method is proposed, called channel polarization, to construct code
sequences that achieve the symmetric capacity $I(W)$ of any given binary-input
discrete memoryless channel (B-DMC) $W$. The symmetric capacity is the highest
rate achievable subject to using the input letters of the channel with equal
probability. Channel polarization refers to the fact that it is possible to
synthesize, out of $N$ independent copies of a given B-DMC $W$, a second set of
$N$ binary-input channels $\{W_N^{(i)}:1\le i\le N\}$ such that, as $N$ becomes
large, the fraction of indices $i$ for which $I(W_N^{(i)})$ is near 1
approaches $I(W)$ and the fraction for which $I(W_N^{(i)})$ is near 0
approaches $1-I(W)$. The polarized channels $\{W_N^{(i)}\}$ are
well-conditioned for channel coding: one need only send data at rate 1 through
those with capacity near 1 and at rate 0 through the remaining. Codes
constructed on the basis of this idea are called polar codes. The paper proves
that, given any B-DMC $W$ with $I(W)>0$ and any target rate $R < I(W)$, there
exists a sequence of polar codes $\{{\mathscr C}_n;n\ge 1\}$ such that
${\mathscr C}_n$ has block-length $N=2^n$, rate $\ge R$, and probability of
block error under successive cancellation decoding bounded as $P_{e}(N,R) \le
\bigoh(N^{-\frac14})$ independently of the code rate. This performance is
achievable by encoders and decoders with complexity $O(N\log N)$ for each.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2008 15:44:27 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Aug 2008 08:30:35 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Feb 2009 09:54:21 GMT"
},
{
"version": "v4",
"created": "Sun, 8 Mar 2009 18:40:16 GMT"
},
{
"version": "v5",
"created": "Mon, 20 Jul 2009 09:05:07 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Arikan",
"Erdal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.3933 | Frederic Le Mouel | Fr\'ed\'eric Le Mou\"el (INRIA Rh\^one-Alpes / CITI), Noha Ibrahim
(INRIA Rh\^one-Alpes / CITI), St\'ephane Fr\'enot (INRIA Rh\^one-Alpes /
CITI) | Interface Matching and Combining Techniques for Services Integration | null | Dans 3er Congreso Nacional de Ciencias de la Computacion
(CNCC'2005) (2005) | null | null | cs.OS cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The development of many highly dynamic environments, like pervasive
environments, introduces the possibility to use geographically close-related
services. Dynamically integrating and unintegrating these services in running
applications is a key challenge for this use. In this article, we classify
service integration issues according to interfaces exported by services and
internal combining techniques. We also propose a contextual integration
service, IntegServ, and an interface, Integrable, for developing services.
| [
{
"version": "v1",
"created": "Thu, 24 Jul 2008 17:51:07 GMT"
}
]
| 2008-07-25T00:00:00 | [
[
"Mouël",
"Frédéric Le",
"",
"INRIA Rhône-Alpes / CITI"
],
[
"Ibrahim",
"Noha",
"",
"INRIA Rhône-Alpes / CITI"
],
[
"Frénot",
"Stéphane",
"",
"INRIA Rhône-Alpes /\n CITI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0807.3979 | Maria Chiara Meo | Maurizio Gabbrielli, Maria Chiara Meo, Paolo Tacchella | Unfolding in CHR | null | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Program transformation is an appealing technique which allows to improve
run-time efficiency, space-consumption and more generally to optimize a given
program. Essentially it consists of a sequence of syntactic program
manipulations which preserves some kind of semantic equivalence. One of the
basic operations which is used by most program transformation systems is
unfolding which consists in the replacement of a procedure call by its
definition. While there is a large body of literature on transformation and
unfolding of sequential programs, very few papers have addressed this issue for
concurrent languages and, to the best of our knowledge, no other has considered
unfolding of CHR programs.
This paper defines a correct unfolding system for CHR programs. We define an
unfolding rule, show its correctness and discuss some conditions which can be
used to delete an unfolded rule while preserving the program meaning. We prove
that confluence and termination properties are preserved by the above
transformations.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2008 15:21:46 GMT"
}
]
| 2008-07-28T00:00:00 | [
[
"Gabbrielli",
"Maurizio",
""
],
[
"Meo",
"Maria Chiara",
""
],
[
"Tacchella",
"Paolo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0807.3991 | Dae San Kim | Dae San Kim | Codes Associated with Special Linear Groups and Power Moments of
Multi-dimensional Kloosterman Sums | null | null | null | null | math.NT cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we construct the binary linear codes $C(SL(n,q))$ associated
with finite special linear groups $SL(n,q)$, with both \emph{n,q} powers of
two. Then, via Pless power moment identity and utilizing our previous result on
the explicit expression of the Gauss sum for $SL(n,q)$, we obtain a recursive
formula for the power moments of multi-dimensional Kloosterman sums in terms of
the frequencies of weights in $C(SL(n,q))$. In particular, when $n=2$, this
gives a recursive formula for the power moments of Kloosterman sums. We
illustrate our results with some examples.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2008 02:49:09 GMT"
}
]
| 2008-07-28T00:00:00 | [
[
"Kim",
"Dae San",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.3996 | Dmitry Zinoviev | D. Zinoviev | Topology and Geometry of Online Social Networks | 6 pages, 11 figures, presented at WMCSI'08 | Proc. 12th World Multi-Conference on Systemics, Cybernetics and
Informatics VI (2008) 138-143 | null | null | cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study certain geometric and topological properties of
online social networks using the concept of density and geometric vector
spaces. "Moi Krug" ("My Circle"), a Russian social network that promotes the
principle of the "six degrees of separation" and is positioning itself as a
vehicle for professionals and recruiters seeking each others' services, is used
as a test vehicle.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2008 04:28:21 GMT"
}
]
| 2008-07-28T00:00:00 | [
[
"Zinoviev",
"D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0807.4009 | Florent Cousseau | Florent Cousseau, Kazushi Mimura, Toshiaki Omori, Masato Okada | Statistical mechanics of lossy compression for non-monotonic multilayer
perceptrons | 29 pages, 7 figures | Phys. Rev. E, 78, 021124 (2008) | 10.1103/PhysRevE.78.021124 | null | cond-mat.stat-mech cond-mat.dis-nn cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A lossy data compression scheme for uniformly biased Boolean messages is
investigated via statistical mechanics techniques. We utilize tree-like
committee machine (committee tree) and tree-like parity machine (parity tree)
whose transfer functions are non-monotonic. The scheme performance at the
infinite code length limit is analyzed using the replica method. Both committee
and parity treelike networks are shown to saturate the Shannon bound. The AT
stability of the Replica Symmetric solution is analyzed, and the tuning of the
non-monotonic transfer function is also discussed.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2008 07:09:18 GMT"
}
]
| 2008-08-27T00:00:00 | [
[
"Cousseau",
"Florent",
""
],
[
"Mimura",
"Kazushi",
""
],
[
"Omori",
"Toshiaki",
""
],
[
"Okada",
"Masato",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.4052 | Andreas Noack | Andreas Noack | Modularity clustering is force-directed layout | 9 pages, 7 figures, see http://code.google.com/p/linloglayout/ for
downloading the graph clustering and layout software | Phys. Rev. E 79, 026102 (2009) | 10.1103/PhysRevE.79.026102 | null | cs.DM cs.CG physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two natural and widely used representations for the community structure of
networks are clusterings, which partition the vertex set into disjoint subsets,
and layouts, which assign the vertices to positions in a metric space. This
paper unifies prominent characterizations of layout quality and clustering
quality, by showing that energy models of pairwise attraction and repulsion
subsume Newman and Girvan's modularity measure. Layouts with optimal energy are
relaxations of, and are thus consistent with, clusterings with optimal
modularity, which is of practical relevance because both representations are
complementary and often used together.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2008 19:56:08 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Dec 2008 16:13:37 GMT"
}
]
| 2009-02-06T00:00:00 | [
[
"Noack",
"Andreas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0807.4073 | Jan Rutten | J.J.M.M. Rutten | Rational streams coalgebraically | null | Logical Methods in Computer Science, Volume 4, Issue 3 (September
19, 2008) lmcs:1164 | 10.2168/LMCS-4(3:9)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study rational streams (over a field) from a coalgebraic perspective.
Exploiting the finality of the set of streams, we present an elementary and
uniform proof of the equivalence of four notions of representability of
rational streams: by finite dimensional linear systems; by finite stream
circuits; by finite weighted stream automata; and by finite dimensional
subsystems of the set of streams.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2008 11:36:23 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Sep 2008 11:53:47 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Rutten",
"J. J. M. M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0807.4074 | Smarajit Das | Smarajit Das and B. Sundar Rajan | Low-delay, Low-PAPR, High-rate Non-square Complex Orthogonal Designs | Submitted to IEEE Transactions on Information Theory. 17 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The maximal rate for non-square Complex Orthogonal Designs (CODs) with $n$
transmit antennas is ${1/2}+\frac{1}{n}$ if $n$ is even and
${1/2}+\frac{1}{n+1}$ if $n$ is odd, which are close to 1/2 for large values of
$n.$ A class of maximal rate non-square CODs have been constructed by Liang
(IEEE Trans. Inform. Theory, 2003) and Lu et. al. (IEEE Trans. Inform. Theory,
2005) have shown that the decoding delay of the codes given by Liang, can be
reduced by 50% when number of transmit antennas is a multiple of 4. Adams et.
al. (IEEE Trans. Inform. Theory, 2007) have shown that the designs of Liang are
of minimal-delay for $n$ equal to 1 and 3 modulo 4 and that of Lu et.al. are of
minimal delay when $n$ is a multiple of $4.$ However, these minimal delays are
large compared to the delays of the rate 1/2 non-square CODs constructed by
Tarokh et al (IEEE Trans. Inform. Theory, 1999) from rate-1 real orthogonal
designs (RODs). In this paper, we construct a class of rate-1/2 non-square CODs
for any $n$ with the decoding delay equal to 50% of that of the delay of the
rate-1/2 codes given by Tarokh et al. This is achieved by giving first a
general construction of rate-1 square Real Orthogonal Designs (RODs) which
includes as special cases the well known constructions of Adams, Lax and
Phillips and Geramita and Pullman, and then making use of it to obtain the
desired rate-1/2 non-square COD. For the case of 9 transmit antennas, our
rate-1/2 COD is shown to be of minimal-delay. The proposed construction results
in designs with zero entries which may have high Peak-to-Average Power Ratio
(PAPR) and it is shown that by appropriate postmultiplication, a design with no
zero entries can be obtained with no change in the code parameters.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2008 11:36:48 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jul 2008 18:34:22 GMT"
}
]
| 2008-07-28T00:00:00 | [
[
"Das",
"Smarajit",
""
],
[
"Rajan",
"B. Sundar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.4111 | James Dynes | J. F. Dynes, Z. L. Yuan, A. W. Sharpe and A. J. Shields | A High Speed, Post-Processing Free, Quantum Random Number Generator | null | Applied Physics Letters Vol. 93 031109 (2008) | 10.1063/1.2961000 | null | quant-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A quantum random number generator (QRNG) based on gated single photon
detection of an InGaAs photodiode at GHz frequency is demonstrated. Owing to
the extremely long coherence time of each photon, each photons' wavefuntion
extends over many gating cycles of the photodiode. The collapse of the photon
wavefunction on random gating cycles as well as photon random arrival time
detection events are used to generate sequences of random bits at a rate of
4.01 megabits/s. Importantly, the random outputs are intrinsically bias-free
and require no post-processing procedure to pass random number statistical
tests, making this QRNG an extremely simple device.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2008 14:53:47 GMT"
}
]
| 2008-07-28T00:00:00 | [
[
"Dynes",
"J. F.",
""
],
[
"Yuan",
"Z. L.",
""
],
[
"Sharpe",
"A. W.",
""
],
[
"Shields",
"A. J.",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0807.4128 | Smarajit Das | Smarajit Das and B. Sundar Rajan | Square Complex Orthogonal Designs with Low PAPR and Signaling Complexity | Accepted for publication in IEEE Transactions on Wireless
Communication. 10 pages, 6 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Space-Time Block Codes from square complex orthogonal designs (SCOD) have
been extensively studied and most of the existing SCODs contain large number of
zero. The zeros in the designs result in high peak-to-average power ratio
(PAPR) and also impose a severe constraint on hardware implementation of the
code when turning off some of the transmitting antennas whenever a zero is
transmitted. Recently, rate 1/2 SCODs with no zero entry have been reported for
8 transmit antennas. In this paper, SCODs with no zero entry for $2^a$ transmit
antennas whenever $a+1$ is a power of 2, are constructed which includes the 8
transmit antennas case as a special case. More generally, for arbitrary values
of $a$, explicit construction of $2^a\times 2^a$ rate $\frac{a+1}{2^a}$ SCODs
with the ratio of number of zero entries to the total number of entries equal
to $1-\frac{a+1}{2^a}2^{\lfloor log_2(\frac{2^a}{a+1}) \rfloor}$ is reported,
whereas for standard known constructions, the ratio is $1-\frac{a+1}{2^a}$. The
codes presented do not result in increased signaling complexity. Simulation
results show that the codes constructed in this paper outperform the codes
using the standard construction under peak power constraint while performing
the same under average power constraint.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2008 15:57:23 GMT"
}
]
| 2008-07-28T00:00:00 | [
[
"Das",
"Smarajit",
""
],
[
"Rajan",
"B. Sundar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.4132 | Carlo Alberto Furia | Carlo A. Furia, Dino Mandrioli, Angelo Morzenti, Matteo Rossi | Modeling Time in Computing: A Taxonomy and a Comparative Survey | More typos fixed | ACM Computing Surveys, 42(2):1--59, February 2010 | 10.1145/1667062.1667063 | null | cs.GL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The increasing relevance of areas such as real-time and embedded systems,
pervasive computing, hybrid systems control, and biological and social systems
modeling is bringing a growing attention to the temporal aspects of computing,
not only in the computer science domain, but also in more traditional fields of
engineering.
This article surveys various approaches to the formal modeling and analysis
of the temporal features of computer-based systems, with a level of detail that
is suitable also for non-specialists. In doing so, it provides a unifying
framework, rather than just a comprehensive list of formalisms.
The paper first lays out some key dimensions along which the various
formalisms can be evaluated and compared. Then, a significant sample of
formalisms for time modeling in computing are presented and discussed according
to these dimensions. The adopted perspective is, to some extent, historical,
going from "traditional" models and formalisms to more modern ones.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2008 16:09:16 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Sep 2008 16:23:05 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Oct 2010 11:01:40 GMT"
}
]
| 2013-08-15T00:00:00 | [
[
"Furia",
"Carlo A.",
""
],
[
"Mandrioli",
"Dino",
""
],
[
"Morzenti",
"Angelo",
""
],
[
"Rossi",
"Matteo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
]
|
0807.4198 | Brian Vogel | Brian K. Vogel | Positive factor networks: A graphical framework for modeling
non-negative sequential data | Minor editing of the abstract, introduction, and concluding sections
to improve readability and remove redundant wording, based on feedback from a
reviewer. No changes were made to the material presented nor to the results.
Added an acknowledgment section to thank the reviewer. Corrected minor typos | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel graphical framework for modeling non-negative sequential
data with hierarchical structure. Our model corresponds to a network of coupled
non-negative matrix factorization (NMF) modules, which we refer to as a
positive factor network (PFN). The data model is linear, subject to
non-negativity constraints, so that observation data consisting of an additive
combination of individually representable observations is also representable by
the network. This is a desirable property for modeling problems in
computational auditory scene analysis, since distinct sound sources in the
environment are often well-modeled as combining additively in the corresponding
magnitude spectrogram. We propose inference and learning algorithms that
leverage existing NMF algorithms and that are straightforward to implement. We
present a target tracking example and provide results for synthetic observation
data which serve to illustrate the interesting properties of PFNs and motivate
their potential usefulness in applications such as music transcription, source
separation, and speech recognition. We show how a target process characterized
by a hierarchical state transition model can be represented as a PFN. Our
results illustrate that a PFN which is defined in terms of a single target
observation can then be used to effectively track the states of multiple
simultaneous targets. Our results show that the quality of the inferred target
states degrades gradually as the observation noise is increased. We also
present results for an example in which meaningful hierarchical features are
extracted from a spectrogram. Such a hierarchical representation could be
useful for music transcription and source separation applications. We also
propose a network for language modeling.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2008 22:50:46 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Jul 2009 00:30:26 GMT"
}
]
| 2009-07-16T00:00:00 | [
[
"Vogel",
"Brian K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0807.4224 | Edmund Kirwan | Edmund Kirwan | Encapsulation theory fundamentals | 33 pages, 35 figures | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a theory of encapsulation, establishing a relationship
between encapsulation and information hiding through the concept of potential
structural complexity (P.S.C.), the maximum possible number of source code
dependencies that can exist between program units in a software system. The
P.S.C. of various, simple systems is examined in an attempt to demonstrate how
P.S.C. changes as program units are encapsulated among different configurations
of subsystems.
| [
{
"version": "v1",
"created": "Sat, 26 Jul 2008 08:55:36 GMT"
}
]
| 2008-07-29T00:00:00 | [
[
"Kirwan",
"Edmund",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0807.4229 | Adrien Richard | Adrien Richard | Positive circuits and maximal number of fixed points in discrete
dynamical systems | 13 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the Cartesian product X of n finite intervals of integers and a
map F from X to itself. As main result, we establish an upper bound on the
number of fixed points for F which only depends on X and on the topology of the
positive circuits of the interaction graph associated with F. The proof uses
and strongly generalizes a theorem of Richard and Comet which corresponds to a
discrete version of the Thomas' conjecture: if the interaction graph associated
with F has no positive circuit, then F has at most one fixed point. The
obtained upper bound on the number of fixed points also strongly generalizes
the one established by Aracena et al for a particular class of Boolean
networks.
| [
{
"version": "v1",
"created": "Sat, 26 Jul 2008 10:25:37 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Sep 2008 16:55:52 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Dec 2008 14:54:41 GMT"
}
]
| 2008-12-01T00:00:00 | [
[
"Richard",
"Adrien",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0807.4234 | Stavros Nikolopoulos D. | Kyriaki Ioannidou and Stavros D. Nikolopoulos | Linear Coloring and Linear Graphs | 21 pages, 7 figures | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by the definition of linear coloring on simplicial complexes,
recently introduced in the context of algebraic topology \cite{Civan}, and the
framework through which it was studied, we introduce the linear coloring on
graphs. We provide an upper bound for the chromatic number $\chi(G)$, for any
graph $G$, and show that $G$ can be linearly colored in polynomial time by
proposing a simple linear coloring algorithm. Based on these results, we define
a new class of perfect graphs, which we call co-linear graphs, and study their
complement graphs, namely linear graphs. The linear coloring of a graph $G$ is
a vertex coloring such that two vertices can be assigned the same color, if
their corresponding clique sets are associated by the set inclusion relation (a
clique set of a vertex $u$ is the set of all maximal cliques containing $u$);
the linear chromatic number $\mathcal{\lambda}(G)$ of $G$ is the least integer
$k$ for which $G$ admits a linear coloring with $k$ colors. We show that linear
graphs are those graphs $G$ for which the linear chromatic number achieves its
theoretical lower bound in every induced subgraph of $G$. We prove inclusion
relations between these two classes of graphs and other subclasses of chordal
and co-chordal graphs, and also study the structure of the forbidden induced
subgraphs of the class of linear graphs.
| [
{
"version": "v1",
"created": "Sat, 26 Jul 2008 12:04:27 GMT"
}
]
| 2008-07-29T00:00:00 | [
[
"Ioannidou",
"Kyriaki",
""
],
[
"Nikolopoulos",
"Stavros D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0807.4247 | Merce Villanueva | Cristina Fernandez-Cordoba, Jaume Pujol, and Merce Villanueva | Z2Z4-linear codes: rank and kernel | null | null | null | null | cs.IT cs.DM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A code C is Z2Z4-additive if the set of coordinates can be partitioned into
two subsets X and Y such that the punctured code of C by deleting the
coordinates outside X (respectively, Y) is a binary linear code (respectively,
a quaternary linear code). In this paper, the rank and dimension of the kernel
for Z2Z4-linear codes, which are the corresponding binary codes of
Z2Z4-additive codes, are studied. The possible values of these two parameters
for Z2Z4-linear codes, giving lower and upper bounds, are established. For each
possible rank r between these bounds, the construction of a Z2Z4-linear code
with rank r is given. Equivalently, for each possible dimension of the kernel
k, the construction of a Z2Z4-linear code with dimension of the kernel k is
given. Finally, the bounds on the rank, once the kernel dimension is fixed, are
established and the construction of a Z2Z4-additive code for each possible pair
(r,k) is given.
| [
{
"version": "v1",
"created": "Sat, 26 Jul 2008 18:30:23 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Jun 2009 09:42:16 GMT"
}
]
| 2009-06-04T00:00:00 | [
[
"Fernandez-Cordoba",
"Cristina",
""
],
[
"Pujol",
"Jaume",
""
],
[
"Villanueva",
"Merce",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.4268 | Reginald Smith | Reginald D. Smith | Phase Diagrams of Network Traffic | This paper has been withdrawn | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn due to errors in the analysis of data with
Carrier Access Rate control and statistical methodologies.
| [
{
"version": "v1",
"created": "Sun, 27 Jul 2008 19:36:43 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Mar 2009 23:51:08 GMT"
}
]
| 2016-09-08T00:00:00 | [
[
"Smith",
"Reginald D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0807.4309 | Praveen Sivadasan | Praveen Sivadasan, P. Sojan Lal | Array Based Java Source Code Obfuscation Using Classes with Restructured
Arrays | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Array restructuring operations obscure arrays. Our work aims on java source
code obfuscation containing arrays. Our main proposal is Classes with
restructured array members and obscured member methods for setting, getting
array elements and to get the length of arrays. The class method definition
codes are obscured through index transformation and constant hiding. The
instantiated objects of these classes are used for source code writing. A tool
named JDATATRANS is developed for generating classes and to the best of our
knowledge this is the first tool available for array restructuring, on java
source codes.
| [
{
"version": "v1",
"created": "Sun, 27 Jul 2008 16:25:55 GMT"
}
]
| 2008-07-29T00:00:00 | [
[
"Sivadasan",
"Praveen",
""
],
[
"Lal",
"P. Sojan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0807.4322 | Ori Shental | Ido Kanter, Ori Shental, Hadar Efraim and Nadav Yacov | Carnot in the Information Age: Discrete Symmetric Channels | null | null | null | null | cond-mat.stat-mech cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modeling communication channels as thermal systems results in Hamiltonians
which are an explicit function of the temperature. The first two authors have
recently generalized the second thermodynamic law to encompass systems with
temperature-dependent energy levels, $dQ=TdS+<d\mathcal{E}/dT>dT$, where
{$<\cdot>$} denotes averaging over the Boltzmann distribution, recomputing the
mutual information and other main properties of the popular Gaussian channel.
Here the mutual information for the binary symmetric channel as well as for the
discrete symmetric channel consisting of 4 input/output (I/O) symbols is
explicitly calculated using the generalized second law of thermodynamics. For
equiprobable I/O the mutual information of the examined channels has a very
simple form, -$\gamma U(\gamma)|_0^\beta$, where $U$ denotes the internal
energy of the channel. We prove that this simple form of the mutual information
governs the class of discrete memoryless symmetric communication channels with
equiprobable I/O symbols.
| [
{
"version": "v1",
"created": "Sun, 27 Jul 2008 19:08:12 GMT"
}
]
| 2008-07-29T00:00:00 | [
[
"Kanter",
"Ido",
""
],
[
"Shental",
"Ori",
""
],
[
"Efraim",
"Hadar",
""
],
[
"Yacov",
"Nadav",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.4325 | Guido Caldarelli | Nicola Perra (1,2), Vinko Zlatic (3,4), Alessandro Chessa (1,2),
Claudio Conti (5), Debora Donato (6), Guido Caldarelli (3,2) ((1) Dep of
Physics, SLACS-CNR University of Cagliari Italy, (2) Linkalab, Complex
Systems Computational Lab. Cagliari, Italy, (3) Centre SMC CNR-INFM, Dip.
Fisica, Universita' Sapienza Rome, Italy, (4) Theor. Physics Div., Rudjer
Boskovic Inst., Zagreb Croatia, (5) Centre SOFT CNR-INFM, Dip. Fisica,
Universita' Sapienza Rome, Italy, (6) Yahoo! Research Barcelona Spain) | Schroedinger-like PageRank equation and localization in the WWW | 5 pages | null | 10.1209/0295-5075/88/48002 | null | physics.soc-ph cond-mat.stat-mech cs.IR physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The WorldWide Web is one of the most important communication systems we use
in our everyday life. Despite its central role, the growth and the development
of the WWW is not controlled by any central authority. This situation has
created a huge ensemble of connections whose complexity can be fruitfully
described and quantified by network theory. One important application that
allows to sort out the information present in these connections is given by the
PageRank alghorithm. Computation of this quantity is usually made iteratively
with a large use of computational time. In this paper we show that the PageRank
can be expressed in terms of a wave function obeying a Schroedinger-like
equation. In particular the topological disorder given by the unbalance of
outgoing and ingoing links between pages, induces wave function and potential
structuring. This allows to directly localize the pages with the largest score.
Through this new representation we can now compute the PageRank without
iterative techniques. For most of the cases of interest our method is faster
than the original one. Our results also clarify the role of topology in the
diffusion of information within complex networks. The whole approach opens the
possibility to novel techniques inspired by quantum physics for the analysis of
the WWW properties.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2008 18:31:17 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Perra",
"Nicola",
""
],
[
"Zlatic",
"Vinko",
""
],
[
"Chessa",
"Alessandro",
""
],
[
"Conti",
"Claudio",
""
],
[
"Donato",
"Debora",
""
],
[
"Caldarelli",
"Guido",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0807.4326 | Benny Sudakov | Michael Krivelevich, Benny Sudakov and Dan Vilenchik | On the random satisfiable process | null | null | null | null | math.CO cs.CC math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we suggest a new model for generating random satisfiable k-CNF
formulas. To generate such formulas -- randomly permute all 2^k\binom{n}{k}
possible clauses over the variables x_1, ..., x_n, and starting from the empty
formula, go over the clauses one by one, including each new clause as you go
along if after its addition the formula remains satisfiable. We study the
evolution of this process, namely the distribution over formulas obtained after
scanning through the first m clauses (in the random permutation's order).
Random processes with conditioning on a certain property being respected are
widely studied in the context of graph properties. This study was pioneered by
Ruci\'nski and Wormald in 1992 for graphs with a fixed degree sequence, and
also by Erd\H{o}s, Suen, and Winkler in 1995 for triangle-free and bipartite
graphs. Since then many other graph properties were studied such as planarity
and H-freeness. Thus our model is a natural extension of this approach to the
satisfiability setting.
Our main contribution is as follows. For m \geq cn, c=c(k) a sufficiently
large constant, we are able to characterize the structure of the solution space
of a typical formula in this distribution. Specifically, we show that typically
all satisfying assignments are essentially clustered in one cluster, and all
but e^{-\Omega(m/n)} n of the variables take the same value in all satisfying
assignments. We also describe a polynomial time algorithm that finds with high
probability a satisfying assignment for such formulas.
| [
{
"version": "v1",
"created": "Sun, 27 Jul 2008 20:10:38 GMT"
}
]
| 2008-07-29T00:00:00 | [
[
"Krivelevich",
"Michael",
""
],
[
"Sudakov",
"Benny",
""
],
[
"Vilenchik",
"Dan",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0807.4345 | Eri Prasetyo Wibowo | Eri Prasetyo, Wahyu K.R. and Bumi Prabu Prabowo | Avoider robot design to dim the fire with dt basic mini system | 5 pages, 5 figures, IES Conference | 9 th IES 2007, EEPIS ITS Surabaya | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Avoider robot is mean robot who is designed to avoid the block in around.
Except that, this robot is also added by an addition application to dim the
fire. This robot is made with ultrasonic sensor PING. This sensor is set on the
front, right and left from robot. This sensor is used robot to look for the
right street, so that robot can walk on. After the robot can look for the right
street, next accomplished the robot is looking for the fire in around. And the
next, dim the fire with fan. This robot is made with basic stamp 2
micro-controller. And that micro-controller can be found in dt-basic mini
system module. This robot is made with servo motor on the right and left side,
which is used to movement.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2008 02:46:45 GMT"
}
]
| 2008-07-29T00:00:00 | [
[
"Prasetyo",
"Eri",
""
],
[
"R.",
"Wahyu K.",
""
],
[
"Prabowo",
"Bumi Prabu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0807.4368 | Dimitris Papamichail | Dimitris Papamichail and Georgios Papamichail | Improved Algorithms for Approximate String Matching (Extended Abstract) | 10 pages | null | null | null | cs.DS | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The problem of approximate string matching is important in many different
areas such as computational biology, text processing and pattern recognition. A
great effort has been made to design efficient algorithms addressing several
variants of the problem, including comparison of two strings, approximate
pattern identification in a string or calculation of the longest common
subsequence that two strings share.
We designed an output sensitive algorithm solving the edit distance problem
between two strings of lengths n and m respectively in time
O((s-|n-m|)min(m,n,s)+m+n) and linear space, where s is the edit distance
between the two strings. This worst-case time bound sets the quadratic factor
of the algorithm independent of the longest string length and improves existing
theoretical bounds for this problem. The implementation of our algorithm excels
also in practice, especially in cases where the two strings compared differ
significantly in length. Source code of our algorithm is available at
http://www.cs.miami.edu/\~dimitris/edit_distance
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2008 07:17:57 GMT"
}
]
| 2008-07-29T00:00:00 | [
[
"Papamichail",
"Dimitris",
""
],
[
"Papamichail",
"Georgios",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0807.4417 | Daniel Sonntag | Daniel Sonntag | On Introspection, Metacognitive Control and Augmented Data Mining Live
Cycles | 10 pages, 3 figures | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss metacognitive modelling as an enhancement to cognitive modelling
and computing. Metacognitive control mechanisms should enable AI systems to
self-reflect, reason about their actions, and to adapt to new situations. In
this respect, we propose implementation details of a knowledge taxonomy and an
augmented data mining life cycle which supports a live integration of obtained
models.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2008 12:05:16 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Jan 2009 15:43:21 GMT"
}
]
| 2009-01-15T00:00:00 | [
[
"Sonntag",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0807.4450 | Scott Kominers | Paul M. Kominers, Scott D. Kominers | Candy-passing Games on General Graphs, I | 2 pages | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We undertake the first study of the candy-passing game on arbitrary connected
graphs. We obtain a general stabilization result which encompasses the first
author's results (arXiv:0709.2156) for candy-passing games on n-cycles with at
least 3n candies.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2008 13:39:54 GMT"
}
]
| 2008-07-29T00:00:00 | [
[
"Kominers",
"Paul M.",
""
],
[
"Kominers",
"Scott D.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0807.4478 | Carlos Miravet | Carlos Miravet, Luis Pascual, Eloise Krouch, Juan Manuel del Cura | An Image-Based Sensor System for Autonomous Rendez-Vous with
Uncooperative Satellites | 12 pages, 13 figures. Presented in the 7th International ESA
Conference on Guidance, Navigation & Control Systems, Tralee, Ireland, 2008 | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper are described the image processing algorithms developed by
SENER, Ingenieria y Sistemas to cope with the problem of image-based,
autonomous rendez-vous (RV) with an orbiting satellite. The methods developed
have a direct application in the OLEV (Orbital Life Extension Extension
Vehicle) mission. OLEV is a commercial mission under development by a
consortium formed by Swedish Space Corporation, Kayser-Threde and SENER, aimed
to extend the operational life of geostationary telecommunication satellites by
supplying them control, navigation and guidance services. OLEV is planned to
use a set of cameras to determine the angular position and distance to the
client satellite during the complete phases of rendez-vous and docking, thus
enabling the operation with satellites not equipped with any specific
navigational aid to provide support during the approach. The ability to operate
with un-equipped client satellites significantly expands the range of
applicability of the system under development, compared to other competing
video technologies already tested in previous spatial missions, such as the
ones described here below.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2008 15:46:02 GMT"
}
]
| 2008-07-29T00:00:00 | [
[
"Miravet",
"Carlos",
""
],
[
"Pascual",
"Luis",
""
],
[
"Krouch",
"Eloise",
""
],
[
"del Cura",
"Juan Manuel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0807.4479 | Yago Ascasibar | Yago Ascasibar | FiEstAS sampling -- a Monte Carlo algorithm for multidimensional
numerical integration | 18 pages, 3 figures, submitted to Comp. Phys. Comm | null | 10.1016/j.cpc.2008.07.011 | null | astro-ph cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a new algorithm for Monte Carlo integration, based on
the Field Estimator for Arbitrary Spaces (FiEstAS). The algorithm is discussed
in detail, and its performance is evaluated in the context of Bayesian
analysis, with emphasis on multimodal distributions with strong parameter
degeneracies. Source code is available upon request.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2008 15:47:20 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Ascasibar",
"Yago",
""
]
]
| [
null,
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0807.4494 | Jason McEwen | J. D. McEwen | Fast, exact (but unstable) spin spherical harmonic transforms | 15 pages, 5 figures, replaced to match version accepted by ARJP | All Res.J.Phys.1:4-18,2011 | null | null | astro-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In many applications data are measured or defined on a spherical manifold;
spherical harmonic transforms are then required to access the frequency content
of the data. We derive algorithms to perform forward and inverse spin spherical
harmonic transforms for functions of arbitrary spin number. These algorithms
involve recasting the spin transform on the two-sphere S^2 as a Fourier
transform on the two-torus T^2. Fast Fourier transforms are then used to
compute Fourier coefficients, which are related to spherical harmonic
coefficients through a linear transform. By recasting the problem as a Fourier
transform on the torus we appeal to the usual Shannon sampling theorem to
develop spherical harmonic transforms that are theoretically exact for
band-limited functions, thereby providing an alternative sampling theorem on
the sphere. The computational complexity of our forward and inverse spin
spherical harmonic transforms scale as O(L^3) for any arbitrary spin number,
where L is the harmonic band-limit of the spin function on the sphere.
Numerical experiments are performed and unfortunately the forward transform is
found to be unstable for band-limits above L~32. The instability is due to the
poorly conditioned linear system relating Fourier and spherical harmonic
coefficients. The inverse transform is expected to be stable, although it is
not possible to verify this hypothesis.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2008 17:10:11 GMT"
},
{
"version": "v2",
"created": "Wed, 25 May 2011 19:11:15 GMT"
}
]
| 2011-10-28T00:00:00 | [
[
"McEwen",
"J. D.",
""
]
]
| [
null,
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.4548 | Deniz Gunduz | O. Simeone, D. Gunduz, H. V. Poor, A. Goldsmith, S. Shamai (Shitz) | Compound Multiple Access Channels with Partial Cooperation | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2018343 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A two-user discrete memoryless compound multiple access channel with a common
message and conferencing decoders is considered. The capacity region is
characterized in the special cases of physically degraded channels and
unidirectional cooperation, and achievable rate regions are provided for the
general case. The results are then extended to the corresponding Gaussian
model. In the Gaussian setup, the provided achievable rates are shown to lie
within some constant number of bits from the boundary of the capacity region in
several special cases. An alternative model, in which the encoders are
connected by conferencing links rather than having a common message, is studied
as well, and the capacity region for this model is also determined for the
cases of physically degraded channels and unidirectional cooperation. Numerical
results are also provided to obtain insights about the potential gains of
conferencing at the decoders and encoders.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2008 21:34:38 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Simeone",
"O.",
"",
"Shitz"
],
[
"Gunduz",
"D.",
"",
"Shitz"
],
[
"Poor",
"H. V.",
"",
"Shitz"
],
[
"Goldsmith",
"A.",
"",
"Shitz"
],
[
"Shamai",
"S.",
"",
"Shitz"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.4580 | Yi-Reun Kim | Yi-Reun Kim, Kyu-Young Whang, Min-Soo Kim, Il-Yeol Song | A Logical Model and Data Placement Strategies for MEMS Storage Devices | 37 pages | null | 10.1587/transinf.E92.D.2218 | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | MEMS storage devices are new non-volatile secondary storages that have
outstanding advantages over magnetic disks. MEMS storage devices, however, are
much different from magnetic disks in the structure and access characteristics.
They have thousands of heads called probe tips and provide the following two
major access facilities: (1) flexibility: freely selecting a set of probe tips
for accessing data, (2) parallelism: simultaneously reading and writing data
with the set of probe tips selected. Due to these characteristics, it is
nontrivial to find data placements that fully utilize the capability of MEMS
storage devices. In this paper, we propose a simple logical model called the
Region-Sector (RS) model that abstracts major characteristics affecting data
retrieval performance, such as flexibility and parallelism, from the physical
MEMS storage model. We also suggest heuristic data placement strategies based
on the RS model and derive new data placements for relational data and
two-dimensional spatial data by using those strategies. Experimental results
show that the proposed data placements improve the data retrieval performance
by up to 4.0 times for relational data and by up to 4.8 times for
two-dimensional spatial data of approximately 320 Mbytes compared with those of
existing data placements. Further, these improvements are expected to be more
marked as the database size grows.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 06:18:34 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Kim",
"Yi-Reun",
""
],
[
"Whang",
"Kyu-Young",
""
],
[
"Kim",
"Min-Soo",
""
],
[
"Song",
"Il-Yeol",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0807.4581 | Moshe Mishali | Yonina C. Eldar and Moshe Mishali | Robust Recovery of Signals From a Structured Union of Subspaces | 5 figures. 30 pages. This work has been submitted to the IEEE for
possible publication | null | null | null | nlin.CG cs.IT math.IT nlin.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional sampling theories consider the problem of reconstructing an
unknown signal $x$ from a series of samples. A prevalent assumption which often
guarantees recovery from the given measurements is that $x$ lies in a known
subspace. Recently, there has been growing interest in nonlinear but structured
signal models, in which $x$ lies in a union of subspaces. In this paper we
develop a general framework for robust and efficient recovery of such signals
from a given set of samples. More specifically, we treat the case in which $x$
lies in a sum of $k$ subspaces, chosen from a larger set of $m$ possibilities.
The samples are modelled as inner products with an arbitrary set of sampling
functions. To derive an efficient and robust recovery algorithm, we show that
our problem can be formulated as that of recovering a block-sparse vector whose
non-zero elements appear in fixed blocks. We then propose a mixed
$\ell_2/\ell_1$ program for block sparse recovery. Our main result is an
equivalence condition under which the proposed convex algorithm is guaranteed
to recover the original signal. This result relies on the notion of block
restricted isometry property (RIP), which is a generalization of the standard
RIP used extensively in the context of compressed sensing. Based on RIP we also
prove stability of our approach in the presence of noise and modelling errors.
A special case of our framework is that of recovering multiple measurement
vectors (MMV) that share a joint sparsity pattern. Adapting our results to this
context leads to new MMV recovery methods as well as equivalence conditions
under which the entire set can be determined efficiently.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 06:19:58 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Mar 2009 17:30:06 GMT"
}
]
| 2009-03-30T00:00:00 | [
[
"Eldar",
"Yonina C.",
""
],
[
"Mishali",
"Moshe",
""
]
]
| [
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "nlin.SI",
"description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems",
"span": "(Exactly Solvable and Integrable Systems)"
}
]
|
0807.4582 | Ashish Goel | Douglas E. Carroll and Ashish Goel | Lower Bounds for Embedding into Distributions over Excluded Minor Graph
Families | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It was shown recently by Fakcharoenphol et al that arbitrary finite metrics
can be embedded into distributions over tree metrics with distortion O(log n).
It is also known that this bound is tight since there are expander graphs which
cannot be embedded into distributions over trees with better than Omega(log n)
distortion.
We show that this same lower bound holds for embeddings into distributions
over any minor excluded family. Given a family of graphs F which excludes minor
M where |M|=k, we explicitly construct a family of graphs with treewidth-(k+1)
which cannot be embedded into a distribution over F with better than Omega(log
n) distortion. Thus, while these minor excluded families of graphs are more
expressive than trees, they do not provide asymptotically better approximations
in general. An important corollary of this is that graphs of treewidth-k cannot
be embedded into distributions over graphs of treewidth-(k-3) with distortion
less than Omega(log n).
We also extend a result of Alon et al by showing that for any k, planar
graphs cannot be embedded into distributions over treewidth-k graphs with
better than Omega(log n) distortion.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 07:52:57 GMT"
}
]
| 2008-07-30T00:00:00 | [
[
"Carroll",
"Douglas E.",
""
],
[
"Goel",
"Ashish",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0807.4609 | Achmad Benny Mutiara | A.B. Mutiara | Analisis Kinerja Sistem Cluster Terhadapa Aplikasi Simulasi Dinamika
Molekular NAMD Memanfaatkan Pustaka CHARM++ | 8 pages, 3 Figures (in Indonesian) | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tingkat kompleksitas dari program simulasi dinamika molekular membutuhkan
mesin pemroses dengan kemampuan yang sangat besar. Mesin-mesin paralel terbukti
memiliki potensi untuk menjawab tantangan komputasi ini. Untuk memanfaatkan
potensi ini secara maksimal, diperlukan suatu program paralel dengan tingkat
efisiensi, efektifitas, skalabilitas, dan ekstensibilitas yang maksimal pula.
Program NAMD yang dibahas pada penulisan ini dianggap mampu untuk memenuhi
semua kriteria yang diinginkan. Program ini dirancang dengan
mengimplementasikan pustaka Charm++ untuk pembagian tugas perhitungan secara
paralel. NAMD memiliki sistem automatic load balancing secara periodik yang
cerdas, sehingga dapat memaksimalkan penggunaan kemampuan mesin yang tersedia.
Program ini juga dirancang secara modular, sehingga dapat dimodifikasi dan
ditambah dengan sangat mudah. NAMD menggunakan banyak kombinasi algoritma
perhitungan dan tehnik-tehnik numerik lainnya dalam melakukan tugasnya. NAMD
2.5 mengimplementasikan semua tehnik dan persamaan perhitungan yang digunakan
dalam dunia simulasi dinamika molekular saat ini. NAMD dapat berjalan diatas
berbagai mesin paralel termasuk arsitektur cluster, dengan hasil speedup yang
mengejutkan. Tulisan ini akan menjelaskan dan membuktikan kemampuan NAMD secara
paralel diatas lima buah mesin cluster. Penulisan ini juga akan memaparkan
kinerja NAMD pada beberapa.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 09:18:21 GMT"
}
]
| 2008-07-30T00:00:00 | [
[
"Mutiara",
"A. B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0807.4618 | Tobias Kuhn | Tobias Kuhn | AceWiki: A Natural and Expressive Semantic Wiki | To be published as: Proceedings of Semantic Web User Interaction at
CHI 2008: Exploring HCI Challenges, CEUR Workshop Proceedings | In Proceedings of the Fifth International Workshop on Semantic Web
User Interaction (SWUI 2008), CEUR Workshop Proceedings, Volume 543, 2009 | null | null | cs.HC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present AceWiki, a prototype of a new kind of semantic wiki using the
controlled natural language Attempto Controlled English (ACE) for representing
its content. ACE is a subset of English with a restricted grammar and a formal
semantics. The use of ACE has two important advantages over existing semantic
wikis. First, we can improve the usability and achieve a shallow learning
curve. Second, ACE is more expressive than the formal languages of existing
semantic wikis. Our evaluation shows that people who are not familiar with the
formal foundations of the Semantic Web are able to deal with AceWiki after a
very short learning phase and without the help of an expert.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 09:54:44 GMT"
}
]
| 2009-12-07T00:00:00 | [
[
"Kuhn",
"Tobias",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0807.4619 | Ian Petersen | A. J. Shaiju, I. R. Petersen, and M. R. James | Guaranteed Cost LQG Control of Uncertain Linear Quantum Stochastic
Systems | 15 pages, 2 figures | null | null | null | quant-ph cs.SY math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we formulate and solve a guaranteed cost control problem for a
class of uncertain linear stochastic quantum systems. For these quantum
systems, a connection with an associated classical (non-quantum) system is
first established. Using this connection, the desired guaranteed cost results
are established. The theory presented is illustrated using an example from
quantum optics.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 10:02:43 GMT"
}
]
| 2011-07-29T00:00:00 | [
[
"Shaiju",
"A. J.",
""
],
[
"Petersen",
"I. R.",
""
],
[
"James",
"M. R.",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0807.4620 | Christoph Koch | Christoph Koch | A Compositional Query Algebra for Second-Order Logic and Uncertain
Databases | 22 pages, 1 figure | null | null | null | cs.DB cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | World-set algebra is a variable-free query language for uncertain databases.
It constitutes the core of the query language implemented in MayBMS, an
uncertain database system. This paper shows that world-set algebra captures
exactly second-order logic over finite structures, or equivalently, the
polynomial hierarchy. The proofs also imply that world-set algebra is closed
under composition, a previously open problem.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 11:22:01 GMT"
}
]
| 2008-07-30T00:00:00 | [
[
"Koch",
"Christoph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0807.4623 | Tobias Kuhn | Tobias Kuhn | AceWiki: Collaborative Ontology Management in Controlled Natural
Language | null | In Proceedings of the 3rd Semantic Wiki Workshop, CEUR Workshop
Proceedings, 2008 | null | null | cs.HC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | AceWiki is a prototype that shows how a semantic wiki using controlled
natural language - Attempto Controlled English (ACE) in our case - can make
ontology management easy for everybody. Sentences in ACE can automatically be
translated into first-order logic, OWL, or SWRL. AceWiki integrates the OWL
reasoner Pellet and ensures that the ontology is always consistent. Previous
results have shown that people with no background in logic are able to add
formal knowledge to AceWiki without being instructed or trained in advance.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 10:15:38 GMT"
}
]
| 2008-07-30T00:00:00 | [
[
"Kuhn",
"Tobias",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0807.4626 | Assaf Naor | Subhash Khot and Assaf Naor | Approximate kernel clustering | null | null | null | null | cs.DS cs.CC math.FA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the kernel clustering problem we are given a large $n\times n$ positive
semi-definite matrix $A=(a_{ij})$ with $\sum_{i,j=1}^na_{ij}=0$ and a small
$k\times k$ positive semi-definite matrix $B=(b_{ij})$. The goal is to find a
partition $S_1,...,S_k$ of $\{1,... n\}$ which maximizes the quantity $$
\sum_{i,j=1}^k (\sum_{(i,j)\in S_i\times S_j}a_{ij})b_{ij}. $$ We study the
computational complexity of this generic clustering problem which originates in
the theory of machine learning. We design a constant factor polynomial time
approximation algorithm for this problem, answering a question posed by Song,
Smola, Gretton and Borgwardt. In some cases we manage to compute the sharp
approximation threshold for this problem assuming the Unique Games Conjecture
(UGC). In particular, when $B$ is the $3\times 3$ identity matrix the UGC
hardness threshold of this problem is exactly $\frac{16\pi}{27}$. We present
and study a geometric conjecture of independent interest which we show would
imply that the UGC threshold when $B$ is the $k\times k$ identity matrix is
$\frac{8\pi}{9}(1-\frac{1}{k})$ for every $k\ge 3$.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 10:40:55 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Dec 2008 20:48:32 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Khot",
"Subhash",
""
],
[
"Naor",
"Assaf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
}
]
|
0807.4655 | Scott Kominers | Paul M. Kominers, Scott D. Kominers | Candy-passing Games on General Graphs, II | 3 pages | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a new proof that any candy-passing game on a graph G with at least
4|E(G)|-|V(G)| candies stabilizes. (This result was first proven in
arXiv:0807.4450.) Unlike the prior literature on candy-passing games, we use
methods from the general theory of chip-firing games which allow us to obtain a
polynomial bound on the number of rounds before stabilization.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 17:19:47 GMT"
}
]
| 2008-07-30T00:00:00 | [
[
"Kominers",
"Paul M.",
""
],
[
"Kominers",
"Scott D.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0807.4656 | Jean-Marie Gorce | Ruifeng Zhang (CITI, INRIA Rh\^one-Alpes / CITI), Jean-Marie Gorce
(CITI, INRIA Rh\^one-Alpes / CITI), Katia Jaffr\`es-Runser (CITI, WNET) | Energy-delay bounds analysis in wireless multi-hop networks with
unreliable radio links | null | null | null | RR-6598 | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Energy efficiency and transmission delay are very important parameters for
wireless multi-hop networks. Previous works that study energy efficiency and
delay are based on the assumption of reliable links. However, the unreliability
of the channel is inevitable in wireless multi-hop networks. This paper
investigates the trade-off between the energy consumption and the end-to-end
delay of multi-hop communications in a wireless network using an unreliable
link model. It provides a closed form expression of the lower bound on the
energy-delay trade-off for different channel models (AWGN, Raleigh flat fading
and Nakagami block-fading) in a linear network. These analytical results are
also verified in 2-dimensional Poisson networks using simulations. The main
contribution of this work is the use of a probabilistic link model to define
the energy efficiency of the system and capture the energy-delay trade-offs.
Hence, it provides a more realistic lower bound on both the energy efficiency
and the energy-delay trade-off since it does not restrict the study to the set
of perfect links as proposed in earlier works.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 13:32:50 GMT"
}
]
| 2008-07-30T00:00:00 | [
[
"Zhang",
"Ruifeng",
"",
"CITI, INRIA Rhône-Alpes / CITI"
],
[
"Gorce",
"Jean-Marie",
"",
"CITI, INRIA Rhône-Alpes / CITI"
],
[
"Jaffrès-Runser",
"Katia",
"",
"CITI, WNET"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0807.4671 | Dae San Kim | Dae San Kim (Sogang University) | Codes Associated with $O^+(2n,2^r)$ and Power Moments of Kloosterman
Sums | null | null | null | null | math.NT cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we construct three binary linear codes $C(SO^+(2,q))$,
$C(O^+(2,q))$, $C(SO^+(4,q))$, respectively associated with the orthogonal
groups $SO^+(2,q)$, $O^+(2,q)$, $SO^+(4,q)$, with $q$ powers of two. Then we
obtain recursive formulas for the power moments of Kloosterman and
2-dimensional Kloosterman sums in terms of the frequencies of weights in the
codes. This is done via Pless power moment identity and by utilizing the
explicit expressions of Gauss sums for the orthogonal groups. We emphasize
that, when the recursive formulas for the power moments of Kloosterman sums are
compared, the present one is computationally more effective than the previous
one constructed from the special linear group $SL(2,q)$. We illustrate our
results with some examples.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 14:07:01 GMT"
}
]
| 2008-07-30T00:00:00 | [
[
"Kim",
"Dae San",
"",
"Sogang University"
]
]
| [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.4680 | Sergio Miguel Tome | Sergio Miguel | Hacia una teoria de unificacion para los comportamientos cognitivos | 63 pages, 4 figures, Spanish, mistakes erased | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Each cognitive science tries to understand a set of cognitive behaviors. The
structuring of knowledge of this nature's aspect is far from what it can be
expected about a science. Until now universal standard consistently describing
the set of cognitive behaviors has not been found, and there are many questions
about the cognitive behaviors for which only there are opinions of members of
the scientific community. This article has three proposals. The first proposal
is to raise to the scientific community the necessity of unified the cognitive
behaviors. The second proposal is claim the application of the Newton's
reasoning rules about nature of his book, Philosophiae Naturalis Principia
Mathematica, to the cognitive behaviors. The third is to propose a scientific
theory, currently developing, that follows the rules established by Newton to
make sense of nature, and could be the theory to explain all the cognitive
behaviors.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 15:11:12 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jul 2008 11:54:51 GMT"
},
{
"version": "v3",
"created": "Sun, 19 Oct 2008 12:01:24 GMT"
}
]
| 2008-10-19T00:00:00 | [
[
"Miguel",
"Sergio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0807.4701 | Amelia Sparavigna | A. Sparavigna, R. Marazzato | An image processing analysis of skin textures | null | Skin Research and Technology, Volume 16 Issue 2, Pages 161 - 167,
2010 | 10.1111/j.1600-0846.2009.00413.x | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Colour and coarseness of skin are visually different. When image processing
is involved in the skin analysis, it is important to quantitatively evaluate
such differences using texture features. In this paper, we discuss a texture
analysis and measurements based on a statistical approach to the pattern
recognition. Grain size and anisotropy are evaluated with proper diagrams. The
possibility to determine the presence of pattern defects is also discussed.
| [
{
"version": "v1",
"created": "Tue, 29 Jul 2008 16:28:44 GMT"
}
]
| 2010-05-11T00:00:00 | [
[
"Sparavigna",
"A.",
""
],
[
"Marazzato",
"R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0807.4753 | Patrick M. Hayden | Patrick Hayden and Andreas Winter | Counterexamples to the maximal p-norm multiplicativity conjecture for
all p > 1 | Merger of arXiv:0707.0402 and arXiv:0707.3291 containing new and
improved analysis of counterexamples. 17 pages | Comm. Math. Phys. 284(1):263-280, 2008. | 10.1007/s00220-008-0624-0 | null | quant-ph cs.IT math-ph math.IT math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For all p > 1, we demonstrate the existence of quantum channels with
non-multiplicative maximal output p-norms. Equivalently, for all p >1, the
minimum output Renyi entropy of order p of a quantum channel is not additive.
The violations found are large; in all cases, the minimum output Renyi entropy
of order p for a product channel need not be significantly greater than the
minimum output entropy of its individual factors. Since p=1 corresponds to the
von Neumann entropy, these counterexamples demonstrate that if the additivity
conjecture of quantum information theory is true, it cannot be proved as a
consequence of any channel-independent guarantee of maximal p-norm
multiplicativity. We also show that a class of channels previously studied in
the context of approximate encryption lead to counterexamples for all p > 2.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2008 14:29:28 GMT"
}
]
| 2012-07-06T00:00:00 | [
[
"Hayden",
"Patrick",
""
],
[
"Winter",
"Andreas",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
]
|
0807.4770 | Zhang Shengli | Shengli Zhang, Soung-Chang Liew | Channel Coding and Decoding in a Relay System Operated with Physical
layer Network Coding | null | IEEE journal on selection area in communications, Jun. 2009 | 10.1109/JSAC.2009.090618 | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Physical-layer Network Coding (PNC) can significantly improve the throughput
of wireless two way relay channel (TWRC) by allowing the two end nodes to
transmit messages to the relay simultaneously. To achieve reliable
communication, channel coding could be applied on top of PNC. This paper
investigates link-by-link channel-coded PNC, in which a critical process at the
relay is to transform the superimposed channel-coded packets received from the
two end nodes plus noise, Y3=X1+X2+W3, to the network-coded combination of the
source packets, S1 XOR S2 . This is in distinct to the traditional
multiple-access problem, in which the goal is to obtain S1 and S2 separately.
The transformation from Y3 to (S1 XOR S2) is referred to as the
Channel-decoding-Network-Coding process (CNC) in that it involves both channel
decoding and network coding operations. A contribution of this paper is the
insight that in designing CNC, we should first (i) channel-decode Y3 to the
superimposed source symbols S1+S2 before (ii) transforming S1+S2 to the
network-coded packets (S1 XOR S2) . Compared with previously proposed
strategies for CNC, this strategy reduces the channel-coding network-coding
mismatch. It is not obvious, however, that an efficient decoder for step (i)
exists. A second contribution of this paper is to provide an explicit
construction of such a decoder based on the use of the Repeat Accumulate (RA)
code. Specifically, we redesign the belief propagation algorithm of the RA code
for traditional point-to-point channel to suit the need of the PNC
multiple-access channel. Simulation results show that our new scheme
outperforms the previously proposed schemes significantly in terms of BER
without added complexity.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2008 02:44:37 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Jan 2010 07:04:05 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Zhang",
"Shengli",
""
],
[
"Liew",
"Soung-Chang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.4846 | Natalia Silberstein | Tuvi Etzion and Natalia Silberstein | Error-Correcting Codes in Projective Spaces via Rank-Metric Codes and
Ferrers Diagrams | Revised for IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Coding in the projective space has received recently a lot of attention due
to its application in network coding. Reduced row echelon form of the linear
subspaces and Ferrers diagram can play a key role for solving coding problems
in the projective space. In this paper we propose a method to design
error-correcting codes in the projective space. We use a multilevel approach to
design our codes. First, we select a constant weight code. Each codeword
defines a skeleton of a basis for a subspace in reduced row echelon form. This
skeleton contains a Ferrers diagram on which we design a rank-metric code. Each
such rank-metric code is lifted to a constant dimension code. The union of
these codes is our final constant dimension code. In particular the codes
constructed recently by Koetter and Kschischang are a subset of our codes. The
rank-metric codes used for this construction form a new class of rank-metric
codes. We present a decoding algorithm to the constructed codes in the
projective space. The efficiency of the decoding depends on the efficiency of
the decoding for the constant weight codes and the rank-metric codes. Finally,
we use puncturing on our final constant dimension codes to obtain large codes
in the projective space which are not constant dimension.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2008 12:18:22 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Oct 2008 06:45:43 GMT"
},
{
"version": "v3",
"created": "Sun, 8 Feb 2009 10:16:42 GMT"
},
{
"version": "v4",
"created": "Sat, 14 Mar 2009 20:04:58 GMT"
}
]
| 2009-03-14T00:00:00 | [
[
"Etzion",
"Tuvi",
""
],
[
"Silberstein",
"Natalia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.4881 | Mabruk Gheryani MG | Mabruk Gheryani, Zhiyuan Wu, and Yousef R. Shayan | Capacity and Performance of Adaptive MIMO System Based on Beam-Nulling | 15 pages, 11 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a scheme called "beam-nulling" for MIMO adaptation.
In the beam-nulling scheme, the eigenvector of the weakest subchannel is fed
back and then signals are sent over a generated subspace orthogonal to the
weakest subchannel. Theoretical analysis and numerical results show that the
capacity of beam-nulling is closed to the optimal water-filling at medium SNR.
Additionally, signal-to-interference-plus-noise ratio (SINR) of MMSE receiver
is derived for beam-nulling. Then the paper presents the associated average
bit-error rate (BER) of beam-nulling numerically which is verified by
simulation. Simulation results are also provided to compare beam-nulling with
beamforming. To improve performance further, beam-nulling is concatenated with
linear dispersion code. Simulation results are also provided to compare the
concatenated beam-nulling scheme with the beamforming scheme at the same data
rate. Additionally, the existing beamforming and new proposed beam-nulling can
be extended if more than one eigenvector is available at the transmitter. The
new extended schemes are called multi-dimensional (MD) beamforming and MD
beam-nulling. Theoretical analysis and numerical results in terms of capacity
are also provided to evaluate the new extended schemes. Simulation results show
that the MD scheme with LDC can outperform the MD scheme with STBC
significantly when the data rate is high.
| [
{
"version": "v1",
"created": "Wed, 23 Jul 2008 16:17:07 GMT"
}
]
| 2008-07-31T00:00:00 | [
[
"Gheryani",
"Mabruk",
""
],
[
"Wu",
"Zhiyuan",
""
],
[
"Shayan",
"Yousef R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.4912 | Holger Kienle | Holger M. Kienle and Hausi A. M\"uller | Research Challenges in Management and Compliance of Policies on the Web | 10 pages, 1 figure, 10th IEEE International Symposium on Web Site
Evolution (WSE 2008), Beijing, China, http://wse2008.fbk.eu/ | null | null | null | cs.CY cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we argue that policies are an increasing concern for
organizations that are operating a web site. Examples of policies that are
relevant in the domain of the web address issues such as privacy of personal
data, accessibility for the disabled, user conduct, e-commerce, and
intellectual property. Web site policies--and the overarching concept of web
site governance--are cross-cutting concerns that have to be addressed and
implemented at different levels (e.g., policy documents, legal statements,
business processes, contracts, auditing, and software systems). For web sites,
policies are also reflected in the legal statements that the web site posts,
and in the behavior and features that the web site offers to its users. Both
policies and software tend to evolve independently, but at the same time they
both have to be kept in sync. This is a practical challenge for operators of
web sites that is poorly addressed right now and is, we believe, a promising
avenue for future research. In this paper, we discuss various challenges that
policy poses for web sites with an emphasis on privacy and data protection and
identify open issues for future research.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2008 18:40:28 GMT"
}
]
| 2008-07-31T00:00:00 | [
[
"Kienle",
"Holger M.",
""
],
[
"Müller",
"Hausi A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0807.4995 | Kwankyu Lee | Kwankyu Lee and Michael E. O'Sullivan | Algebraic Soft-Decision Decoding of Hermitian Codes | 17 pages, submitted to IEEE Transaction on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An algebraic soft-decision decoder for Hermitian codes is presented. We apply
Koetter and Vardy's soft-decision decoding framework, now well established for
Reed-Solomon codes, to Hermitian codes. First we provide an algebraic
foundation for soft-decision decoding. Then we present an interpolation
algorithm finding the Q-polynomial that plays a key role in the decoding. With
some simulation results, we compare performances of the algebraic soft-decision
decoders for Hermitian codes and Reed-Solomon codes, favorable to the former.
| [
{
"version": "v1",
"created": "Thu, 31 Jul 2008 07:05:27 GMT"
}
]
| 2008-08-01T00:00:00 | [
[
"Lee",
"Kwankyu",
""
],
[
"O'Sullivan",
"Michael E.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.5091 | Sujay Sanghavi | Sujay Sanghavi, Devavrat Shah and Alan Willsky | Message-passing for Maximum Weight Independent Set | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2030448 | null | cs.AI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the use of message-passing algorithms for the problem of
finding the max-weight independent set (MWIS) in a graph. First, we study the
performance of the classical loopy max-product belief propagation. We show that
each fixed point estimate of max-product can be mapped in a natural way to an
extreme point of the LP polytope associated with the MWIS problem. However,
this extreme point may not be the one that maximizes the value of node weights;
the particular extreme point at final convergence depends on the initialization
of max-product. We then show that if max-product is started from the natural
initialization of uninformative messages, it always solves the correct LP -- if
it converges. This result is obtained via a direct analysis of the iterative
algorithm, and cannot be obtained by looking only at fixed points.
The tightness of the LP relaxation is thus necessary for max-product
optimality, but it is not sufficient. Motivated by this observation, we show
that a simple modification of max-product becomes gradient descent on (a
convexified version of) the dual of the LP, and converges to the dual optimum.
We also develop a message-passing algorithm that recovers the primal MWIS
solution from the output of the descent algorithm. We show that the MWIS
estimate obtained using these two algorithms in conjunction is correct when the
graph is bipartite and the MWIS is unique.
Finally, we show that any problem of MAP estimation for probability
distributions over finite domains can be reduced to an MWIS problem. We believe
this reduction will yield new insights and algorithms for MAP estimation.
| [
{
"version": "v1",
"created": "Thu, 31 Jul 2008 15:26:27 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Sanghavi",
"Sujay",
""
],
[
"Shah",
"Devavrat",
""
],
[
"Willsky",
"Alan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0807.5111 | Atish Das Sarma | Atish Das Sarma, Amit Deshpande, Ravi Kannan | Finding Dense Subgraphs in G(n,1/2) | 6 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Finding the largest clique is a notoriously hard problem, even on random
graphs. It is known that the clique number of a random graph G(n,1/2) is almost
surely either k or k+1, where k = 2log n - 2log(log n) - 1. However, a simple
greedy algorithm finds a clique of size only (1+o(1))log n, with high
probability, and finding larger cliques -- that of size even (1+ epsilon)log n
-- in randomized polynomial time has been a long-standing open problem. In this
paper, we study the following generalization: given a random graph G(n,1/2),
find the largest subgraph with edge density at least (1-delta). We show that a
simple modification of the greedy algorithm finds a subset of 2log n vertices
whose induced subgraph has edge density at least 0.951, with high probability.
To complement this, we show that almost surely there is no subset of 2.784log n
vertices whose induced subgraph has edge density 0.951 or more.
| [
{
"version": "v1",
"created": "Thu, 31 Jul 2008 17:12:25 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Sep 2008 15:23:43 GMT"
}
]
| 2008-09-22T00:00:00 | [
[
"Sarma",
"Atish Das",
""
],
[
"Deshpande",
"Amit",
""
],
[
"Kannan",
"Ravi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0807.5120 | Andreas Grau | Stefan Dirnstorfer, Andreas J. Grau | Accelerated Option Pricing in Multiple Scenarios | 17 pages: Page 17, References corrected | null | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper covers a massive acceleration of Monte-Carlo based pricing method
for financial products and financial derivatives. The method is applicable in
risk management settings, where a financial product has to be priced under a
number of potential future scenarios. Instead of starting a separate nested
Monte Carlo simulation for each scenario under consideration, the new method
covers the utilization of very few representative nested simulations and
estimating the product prices at each scenario by a smoothing method based on
the state-space. This smoothing technique can be e.g. non-parametric regression
or kernel smoothing.
| [
{
"version": "v1",
"created": "Thu, 31 Jul 2008 17:40:55 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Sep 2008 10:24:51 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Dirnstorfer",
"Stefan",
""
],
[
"Grau",
"Andreas J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
]
|
0808.0012 | Ariel Caticha | Ariel Caticha | Lectures on Probability, Entropy, and Statistical Physics | 170 pages. Invited lectures at MaxEnt 2008, the 28th International
Workshop on Bayesian Inference and Maximum Entropy Methods in Science and
Engineering (July 8-13, 2008, Boraceia Beach, Sao Paulo, Brazil) | null | null | null | physics.data-an cond-mat.stat-mech cs.IT math.IT math.ST physics.gen-ph stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | These lectures deal with the problem of inductive inference, that is, the
problem of reasoning under conditions of incomplete information. Is there a
general method for handling uncertainty? Or, at least, are there rules that
could in principle be followed by an ideally rational mind when discussing
scientific matters? What makes one statement more plausible than another? How
much more plausible? And then, when new information is acquired how do we
change our minds? Or, to put it differently, are there rules for learning? Are
there rules for processing information that are objective and consistent? Are
they unique? And, come to think of it, what, after all, is information? It is
clear that data contains or conveys information, but what does this precisely
mean? Can information be conveyed in other ways? Is information physical? Can
we measure amounts of information? Do we need to? Our goal is to develop the
main tools for inductive inference--probability and entropy--from a thoroughly
Bayesian point of view and to illustrate their use in physics with examples
borrowed from the foundations of classical statistical physics.
| [
{
"version": "v1",
"created": "Thu, 31 Jul 2008 21:11:32 GMT"
}
]
| 2016-09-08T00:00:00 | [
[
"Caticha",
"Ariel",
""
]
]
| [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Physics",
"code": "physics.gen-ph",
"description": "Description coming soon",
"span": "(General Physics)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0808.0023 | Gabor Pataki | Gabor Pataki and Mustafa Tural | Branching proofs of infeasibility in low density subset sum problems | null | null | null | null | cs.CC cs.CR math.CO math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that the subset sum problem has a polynomial time computable
certificate of infeasibility for all $a$ weight vectors with density at most
$1/(2n)$ and for almost all integer right hand sides. The certificate is
branching on a hyperplane, i.e. by a methodology dual to the one explored by
Lagarias and Odlyzko; Frieze; Furst and Kannan; and Coster et. al.
The proof has two ingredients. We first prove that a vector that is near
parallel to $a$ is a suitable branching direction, regardless of the density.
Then we show that for a low density $a$ such a near parallel vector can be
computed using diophantine approximation, via a methodology introduced by Frank
and Tardos.
We also show that there is a small number of long intervals whose disjoint
union covers the integer right hand sides, for which the infeasibility is
proven by branching on the above hyperplane.
| [
{
"version": "v1",
"created": "Thu, 31 Jul 2008 20:59:00 GMT"
}
]
| 2008-08-10T00:00:00 | [
[
"Pataki",
"Gabor",
""
],
[
"Tural",
"Mustafa",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0808.0036 | Vasanthan Raghavan | Vasanthan Raghavan, Jayesh H. Kotecha, Akbar M. Sayeed | Why Does a Kronecker Model Result in Misleading Capacity Estimates? | 39 pages, 5 figures, under review with IEEE Trans. Inform. Theory | null | 10.1109/TIT.2010.2059811 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many recent works that study the performance of multi-input multi-output
(MIMO) systems in practice assume a Kronecker model where the variances of the
channel entries, upon decomposition on to the transmit and the receive
eigen-bases, admit a separable form. Measurement campaigns, however, show that
the Kronecker model results in poor estimates for capacity. Motivated by these
observations, a channel model that does not impose a separable structure has
been recently proposed and shown to fit the capacity of measured channels
better. In this work, we show that this recently proposed modeling framework
can be viewed as a natural consequence of channel decomposition on to its
canonical coordinates, the transmit and/or the receive eigen-bases. Using tools
from random matrix theory, we then establish the theoretical basis behind the
Kronecker mismatch at the low- and the high-SNR extremes: 1) Sparsity of the
dominant statistical degrees of freedom (DoF) in the true channel at the
low-SNR extreme, and 2) Non-regularity of the sparsity structure (disparities
in the distribution of the DoF across the rows and the columns) at the high-SNR
extreme.
| [
{
"version": "v1",
"created": "Thu, 31 Jul 2008 23:10:42 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Raghavan",
"Vasanthan",
""
],
[
"Kotecha",
"Jayesh H.",
""
],
[
"Sayeed",
"Akbar M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0037 | Caleb Lo | Caleb K. Lo, Sriram Vishwanath and Robert W. Heath Jr | An Energy-Based Comparison of Long-Hop and Short-Hop Routing in MIMO
Networks | 27 pages, 12 figures, submitted to IEEE Transactions on Vehicular
Technology in March 2009, revised in July 2009 | null | 10.1109/TVT.2009.2033075 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the problem of selecting either routes that consist of
long hops or routes that consist of short hops in a network of multiple-antenna
nodes, where each transmitting node employs spatial multiplexing. This
distance-dependent route selection problem is approached from the viewpoint of
energy efficiency, where a route is selected with the objective of minimizing
the transmission energy consumed while satisfying a target outage criterion at
the final destination. Deterministic line networks and two-dimensional random
networks are considered. It is shown that when 1) the number of hops traversed
between the source and destination grows large or 2) when the target success
probability approaches one or 3) when the number of transmit and/or receive
antennas grows large, short-hop routing requires less energy than long-hop
routing. It is also shown that if both routing strategies are subject to the
same delay constraint, long-hop routing requires less energy than short-hop
routing as the target success probability approaches one. In addition,
numerical analysis indicates that given loose outage constraints, only a small
number of transmit antennas are needed for short-hop routing to have its
maximum advantage over long-hop routing, while given stringent outage
constraints, the advantage of short-hop over long-hop routing always increases
with additional transmit antennas.
| [
{
"version": "v1",
"created": "Thu, 31 Jul 2008 23:30:33 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Sep 2008 00:13:07 GMT"
},
{
"version": "v3",
"created": "Thu, 19 Mar 2009 00:34:44 GMT"
},
{
"version": "v4",
"created": "Tue, 14 Jul 2009 02:15:11 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Lo",
"Caleb K.",
""
],
[
"Vishwanath",
"Sriram",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0055 | Olivier Passalacqua | Olivier Passalacqua (LISTIC), Eric Benoit (LISTIC, LAMII),
Marc-Philippe Huget (LISTIC), Patrice Moreaux (LISTIC) | Integrating OPC Data into GSN Infrastructures | null | IADIS International Conference APPLIED COMPUTING 2008, Algarve :
Portugal (2008) | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the design and the implementation of an interface
software component between OLE for Process Control (OPC) formatted data and the
Global Sensor Network (GSN) framework for management of data from sensors. This
interface, named wrapper in the GSN context, communicates in Data Access mode
with an OPC server and converts the received data to the internal GSN format,
according to several temporal modes. This work is realized in the context of a
Ph.D. Thesis about the control of distributed information fusion systems. The
developed component allows the injection of OPC data, like measurements or
industrial processes states information, into a distributed information fusion
system deployed in a GSN framework. The component behaves as a client of the
OPC server. Developed in Java and based on the Opensaca Utgard, it can be
deployed on any computation node supporting a Java virtual machine. The
experiments show the component conformity according to the Data Access 2.05a
specification of the OPC standard and to the temporal modes.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 04:38:22 GMT"
}
]
| 2008-08-04T00:00:00 | [
[
"Passalacqua",
"Olivier",
"",
"LISTIC"
],
[
"Benoit",
"Eric",
"",
"LISTIC, LAMII"
],
[
"Huget",
"Marc-Philippe",
"",
"LISTIC"
],
[
"Moreaux",
"Patrice",
"",
"LISTIC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0808.0056 | Emanuel Diamant | Emanuel Diamant | I'm sorry to say, but your understanding of image processing
fundamentals is absolutely wrong | To be published as chapter 5 in "Frontiers in Brain, Vision and AI",
I-TECH Publisher, Viena, 2008 | null | null | null | cs.AI cs.CV cs.IR cs.RO q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ongoing discussion whether modern vision systems have to be viewed as
visually-enabled cognitive systems or cognitively-enabled vision systems is
groundless, because perceptual and cognitive faculties of vision are separate
components of human (and consequently, artificial) information processing
system modeling.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 04:45:17 GMT"
}
]
| 2008-09-25T00:00:00 | [
[
"Diamant",
"Emanuel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
]
|
0808.0059 | Miklos Santha | Miklos Santha | Quantum walk based search algorithms | 16 pages, survey paper | 5th Theory and Applications of Models of Computation (TAMC08),
Xian, April 2008, LNCS 4978, 31-46 | null | null | quant-ph cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this survey paper we give an intuitive treatment of the discrete time
quantization of classical Markov chains. Grover search and the quantum walk
based search algorithms of Ambainis, Szegedy and Magniez et al. will be stated
as quantum analogues of classical search procedures. We present a rather
detailed description of a somewhat simplified version of the MNRS algorithm.
Finally, in the query complexity model, we show how quantum walks can be
applied to the following search problems: Element Distinctness, Matrix Product
Verification, Restricted Range Associativity, Triangle, and Group
Commutativity.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 06:01:37 GMT"
}
]
| 2008-08-04T00:00:00 | [
[
"Santha",
"Miklos",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0808.0075 | Rui Zhang | Rui Zhang, Ying-Chang Liang, Chin Choy Chai, and Shuguang Cui | Optimal Beamforming for Two-Way Multi-Antenna Relay Channel with
Analogue Network Coding | to appear in JSAC, 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the wireless two-way relay channel (TWRC), where two
source nodes, S1 and S2, exchange information through an assisting relay node,
R. It is assumed that R receives the sum signal from S1 and S2 in one
time-slot, and then amplifies and forwards the received signal to both S1 and
S2 in the next time-slot. By applying the principle of analogue network (ANC),
each of S1 and S2 cancels the so-called "self-interference" in the received
signal from R and then decodes the desired message. Assuming that S1 and S2 are
each equipped with a single antenna and R with multi-antennas, this paper
analyzes the capacity region of an ANC-based TWRC with linear processing
(beamforming) at R. The capacity region contains all the achievable
bidirectional rate-pairs of S1 and S2 under the given transmit power
constraints at S1, S2, and R. We present the optimal relay beamforming
structure as well as an efficient algorithm to compute the optimal beamforming
matrix based on convex optimization techniques. Low-complexity suboptimal relay
beamforming schemes are also presented, and their achievable rates are compared
against the capacity with the optimal scheme.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 08:49:56 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Oct 2008 06:48:09 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Feb 2009 02:15:26 GMT"
},
{
"version": "v4",
"created": "Fri, 29 May 2009 11:01:39 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Zhang",
"Rui",
""
],
[
"Liang",
"Ying-Chang",
""
],
[
"Chai",
"Chin Choy",
""
],
[
"Cui",
"Shuguang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0084 | Frederic Magniez | Frederic Magniez, Ashwin Nayak, Peter C. Richter, and Miklos Santha | On the hitting times of quantum versus random walks | null | null | null | null | quant-ph cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we define new Monte Carlo type classical and quantum hitting
times, and we prove several relationships among these and the already existing
Las Vegas type definitions. In particular, we show that for some marked state
the two types of hitting time are of the same order in both the classical and
the quantum case.
Further, we prove that for any reversible ergodic Markov chain $P$, the
quantum hitting time of the quantum analogue of $P$ has the same order as the
square root of the classical hitting time of $P$. We also investigate the
(im)possibility of achieving a gap greater than quadratic using an alternative
quantum walk.
Finally, we present new quantum algorithms for the detection and finding
problems. The complexities of both algorithms are related to the new,
potentially smaller, quantum hitting times. The detection algorithm is based on
phase estimation and is particularly simple. The finding algorithm combines a
similar phase estimation based procedure with ideas of Tulsi from his recent
theorem for the 2D grid. Extending his result, we show that for any
state-transitive Markov chain with unique marked state, the quantum hitting
time is of the same order for both the detection and finding problems.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 14:45:51 GMT"
}
]
| 2018-03-22T00:00:00 | [
[
"Magniez",
"Frederic",
""
],
[
"Nayak",
"Ashwin",
""
],
[
"Richter",
"Peter C.",
""
],
[
"Santha",
"Miklos",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.0103 | Edwin Henneken | Edwin A. Henneken, Michael J. Kurtz, Alberto Accomazzi, Carolyn S.
Grant, Donna Thompson, Elizabeth Bohlen, Stephen S. Murray | Use of Astronomical Literature - A Report on Usage Patterns | 12 pages, 8 figures, 2 tables. Accepted by Journal of Informetrics | null | 10.1016/j.joi.2008.10.001 | null | cs.DL astro-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a number of metrics for usage of the SAO/NASA
Astrophysics Data System (ADS). Since the ADS is used by the entire
astronomical community, these are indicative of how the astronomical literature
is used. We will show how the use of the ADS has changed both quantitatively
and qualitatively. We will also show that different types of users access the
system in different ways. Finally, we show how use of the ADS has evolved over
the years in various regions of the world.
The ADS is funded by NASA Grant NNG06GG68G.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 17:55:14 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Oct 2008 14:08:15 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Henneken",
"Edwin A.",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Thompson",
"Donna",
""
],
[
"Bohlen",
"Elizabeth",
""
],
[
"Murray",
"Stephen S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
null
]
|
0808.0111 | Florian Hartig | Florian Hartig and Martin Drechsler | Stay by thy neighbor? Social organization determines the efficiency of
biodiversity markets with spatial incentives | 11 pages, 6 figures | Ecological Complexity, 2010, 7, 91-99 | 10.1016/j.ecocom.2009.07.001 | null | physics.soc-ph cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Market-based conservation instruments, such as payments, auctions or tradable
permits, are environmental policies that create financial incentives for
landowners to engage in voluntary conservation on their land. But what if
ecological processes operate across property boundaries and land use decisions
on one property influence ecosystem functions on neighboring sites? This paper
examines how to account for such spatial externalities when designing
market-based conservation instruments. We use an agent-based model to analyze
different spatial metrics and their implications on land use decisions in a
dynamic cost environment. The model contains a number of alternative submodels
which differ in incentive design and social interactions of agents, the latter
including coordinating as well as cooperating behavior of agents. We find that
incentive design and social interactions have a strong influence on the spatial
allocation and the costs of the conservation market.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 14:24:19 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Sep 2010 17:17:34 GMT"
}
]
| 2010-09-06T00:00:00 | [
[
"Hartig",
"Florian",
""
],
[
"Drechsler",
"Martin",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0808.0112 | Didier Sornette | V.I. Yukalov and D. Sornette | Mathematical Structure of Quantum Decision Theory | 40 pages | Advances in Complex Systems 13, 659-698 (2010) | null | null | cs.AI math-ph math.MP quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the most complex systems is the human brain whose formalized
functioning is characterized by decision theory. We present a "Quantum Decision
Theory" of decision making, based on the mathematical theory of separable
Hilbert spaces. This mathematical structure captures the effect of
superposition of composite prospects, including many incorporated intentions,
which allows us to explain a variety of interesting fallacies and anomalies
that have been reported to particularize the decision making of real human
beings. The theory describes entangled decision making, non-commutativity of
subsequent decisions, and intention interference of composite prospects. We
demonstrate how the violation of the Savage's sure-thing principle (disjunction
effect) can be explained as a result of the interference of intentions, when
making decisions under uncertainty. The conjunction fallacy is also explained
by the presence of the interference terms. We demonstrate that all known
anomalies and paradoxes, documented in the context of classical decision
theory, are reducible to just a few mathematical archetypes, all of which
finding straightforward explanations in the frame of the developed quantum
approach.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 13:14:20 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Oct 2010 09:05:25 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Oct 2010 10:28:03 GMT"
}
]
| 2010-10-29T00:00:00 | [
[
"Yukalov",
"V. I.",
""
],
[
"Sornette",
"D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0808.0148 | James Lee | Punyashloka Biswal, James R. Lee, Satish Rao | Eigenvalue bounds, spectral partitioning, and metrical deformations via
flows | Minor revisions | null | null | null | cs.DS cs.CG math.MG math.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new method for upper bounding the second eigenvalue of the
Laplacian of graphs. Our approach uses multi-commodity flows to deform the
geometry of the graph; we embed the resulting metric into Euclidean space to
recover a bound on the Rayleigh quotient. Using this, we show that every
$n$-vertex graph of genus $g$ and maximum degree $d$ satisfies $\lambda_2(G) =
O((g+1)^3 d/n)$. This recovers the $O(d/n)$ bound of Spielman and Teng for
planar graphs, and compares to Kelner's bound of $O((g+1) poly(d)/n)$, but our
proof does not make use of conformal mappings or circle packings. We are thus
able to extend this to resolve positively a conjecture of Spielman and Teng, by
proving that $\lambda_2(G) = O(d h^6 \log h/n)$ whenever $G$ is $K_h$-minor
free. This shows, in particular, that spectral partitioning can be used to
recover $O(\sqrt{n})$-sized separators in bounded degree graphs that exclude a
fixed minor. We extend this further by obtaining nearly optimal bounds on
$\lambda_2$ for graphs which exclude small-depth minors in the sense of
Plotkin, Rao, and Smith. Consequently, we show that spectral algorithms find
small separators in a general class of geometric graphs.
Moreover, while the standard "sweep" algorithm applied to the second
eigenvector may fail to find good quotient cuts in graphs of unbounded degree,
our approach produces a vector that works for arbitrary graphs. This yields an
alternate proof of the result of Alon, Seymour, and Thomas that every
excluded-minor family of graphs has $O(\sqrt{n})$-node balanced separators.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 16:45:16 GMT"
},
{
"version": "v2",
"created": "Sat, 9 Aug 2008 15:54:35 GMT"
}
]
| 2008-08-09T00:00:00 | [
[
"Biswal",
"Punyashloka",
""
],
[
"Lee",
"James R.",
""
],
[
"Rao",
"Satish",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Mathematics",
"code": "math.SP",
"description": "Schrodinger operators, operators on manifolds, general differential operators, numerical studies, integral operators, discrete models, resonances, non-self-adjoint operators, random operators/matrices",
"span": "(Spectral Theory)"
}
]
|
0808.0156 | Paul Bunn | Yair Amir, Paul Bunn, Rafail Ostrovksy | Authenticated Adversarial Routing | Corrected typos. TCC '09 (to appear) | null | null | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this paper is to demonstrate the feasibility of authenticated
throughput-efficient routing in an unreliable and dynamically changing
synchronous network in which the majority of malicious insiders try to destroy
and alter messages or disrupt communication in any way. More specifically, in
this paper we seek to answer the following question: Given a network in which
the majority of nodes are controlled by a malicious adversary and whose
topology is changing every round, is it possible to develop a protocol with
polynomially-bounded memory per processor that guarantees throughput-efficient
and correct end-to-end communication? We answer the question affirmatively for
extremely general corruption patterns: we only request that the topology of the
network and the corruption pattern of the adversary leaves at least one path
each round connecting the sender and receiver through honest nodes (though this
path may change at every round). Out construction works in the public-key
setting and enjoys bounded memory per processor (that does not depend on the
amount of traffic and is polynomial in the network size.) Our protocol achieves
optimal transfer rate with negligible decoding error. We stress that our
protocol assumes no knowledge of which nodes are corrupted nor which path is
reliable at any round, and is also fully distributed with nodes making
decisions locally, so that they need not know the topology of the network at
any time.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 19:11:37 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Oct 2008 15:27:06 GMT"
},
{
"version": "v3",
"created": "Sat, 3 Jan 2009 23:25:43 GMT"
}
]
| 2009-01-04T00:00:00 | [
[
"Amir",
"Yair",
""
],
[
"Bunn",
"Paul",
""
],
[
"Ostrovksy",
"Rafail",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.0159 | Eli Ben-Naim | T. Antal, D. ben-Avraham, E. Ben-Naim, P.L. Krapivsky | Front Propagation with Rejuvenation in Flipping Processes | 10 pages, 9 figures, 4 tables | J. Phys. A 41, 465002 (2008) | 10.1088/1751-8113/41/46/465002 | null | cond-mat.stat-mech cs.DS math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a directed flipping process that underlies the performance of the
random edge simplex algorithm. In this stochastic process, which takes place on
a one-dimensional lattice whose sites may be either occupied or vacant,
occupied sites become vacant at a constant rate and simultaneously cause all
sites to the right to change their state. This random process exhibits rich
phenomenology. First, there is a front, defined by the position of the
left-most occupied site, that propagates at a nontrivial velocity. Second, the
front involves a depletion zone with an excess of vacant sites. The total
excess D_k increases logarithmically, D_k ~ ln k, with the distance k from the
front. Third, the front exhibits rejuvenation -- young fronts are vigorous but
old fronts are sluggish. We investigate these phenomena using a quasi-static
approximation, direct solutions of small systems, and numerical simulations.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 17:44:13 GMT"
}
]
| 2008-10-16T00:00:00 | [
[
"Antal",
"T.",
""
],
[
"ben-Avraham",
"D.",
""
],
[
"Ben-Naim",
"E.",
""
],
[
"Krapivsky",
"P. L.",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0808.0163 | Daniel A. Spielman | Joshua Batson, Daniel A. Spielman, Nikhil Srivastava | Twice-Ramanujan Sparsifiers | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that every graph has a spectral sparsifier with a number of edges
linear in its number of vertices. As linear-sized spectral sparsifiers of
complete graphs are expanders, our sparsifiers of arbitrary graphs can be
viewed as generalizations of expander graphs.
In particular, we prove that for every $d>1$ and every undirected, weighted
graph $G=(V,E,w)$ on $n$ vertices, there exists a weighted graph
$H=(V,F,\tilde{w})$ with at most $\ceil{d(n-1)}$ edges such that for every $x
\in \R^{V}$, \[ x^{T}L_{G}x \leq x^{T}L_{H}x \leq
(\frac{d+1+2\sqrt{d}}{d+1-2\sqrt{d}})\cdot x^{T}L_{G}x \] where $L_{G}$ and
$L_{H}$ are the Laplacian matrices of $G$ and $H$, respectively. Thus, $H$
approximates $G$ spectrally at least as well as a Ramanujan expander with
$dn/2$ edges approximates the complete graph. We give an elementary
deterministic polynomial time algorithm for constructing $H$.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 18:19:17 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Dec 2008 19:13:09 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Nov 2009 07:27:03 GMT"
}
]
| 2009-11-18T00:00:00 | [
[
"Batson",
"Joshua",
""
],
[
"Spielman",
"Daniel A.",
""
],
[
"Srivastava",
"Nikhil",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0808.0202 | Yong Gao | Yong Gao | The Degree Distribution of Random k-Trees | null | null | 10.1016/j.tcs.2008.10.015 | null | cs.DM cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A power law degree distribution is established for a graph evolution model
based on the graph class of k-trees. This k-tree-based graph process can be
viewed as an idealized model that captures some characteristics of the
preferential attachment and copying mechanisms that existing evolving graph
processes fail to model due to technical obstacles. The result also serves as a
further cautionary note reinforcing the point of view that a power law degree
distribution should not be regarded as the only important characteristic of a
complex network, as has been previously argued.
| [
{
"version": "v1",
"created": "Fri, 1 Aug 2008 20:51:27 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Gao",
"Yong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.0234 | S Birenjith | K. Sreeram, S. Birenjith, P. Vijay Kumar | DMT of Multi-hop Cooperative Networks - Part I: Basic Results | This submission is Part-I of a two-part paper, which is a detailed
version of the previous submission arXiv:0802.1888 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this two-part paper, the DMT of cooperative multi-hop networks is
examined. The focus is on single-source single-sink (ss-ss) multi-hop relay
networks having slow-fading links and relays that potentially possess multiple
antennas. The present paper examines the two end-points of the DMT of
full-duplex networks. In particular, the maximum achievable diversity of
arbitrary multi-terminal wireless networks is shown to be equal to the min-cut.
The maximum multiplexing gain of arbitrary full-duplex ss-ss networks is shown
to be equal to the min-cut rank, using a new connection to a deterministic
network. We also prove some basic results including a proof that the colored
noise encountered in AF protocols for cooperative networks can be treated as
white noise for DMT computations. The DMT of a parallel channel with
independent MIMO links is also computed here. As an application of these basic
results, we prove that a linear tradeoff between maximum diversity and maximum
multiplexing gain is achievable for full-duplex networks with single antenna
nodes. All protocols in this paper are explicit and rely only upon
amplify-and-forward (AF) relaying. Half duplex networks are studied, and
explicit codes for all protocols proposed in both parts, are provided in the
companion paper.
| [
{
"version": "v1",
"created": "Sat, 2 Aug 2008 07:29:50 GMT"
}
]
| 2008-08-05T00:00:00 | [
[
"Sreeram",
"K.",
""
],
[
"Birenjith",
"S.",
""
],
[
"Kumar",
"P. Vijay",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0235 | S Birenjith | K. Sreeram, S. Birenjith, P. Vijay Kumar | DMT of Multi-hop Cooperative Networks - Part II: Half-Duplex Networks
with Full-Duplex Performance | This submission is Part-II of a two-part paper, which is a detailed
version of the previous submission arXiv:0802.1888 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider single-source single-sink (ss-ss) multi-hop relay networks, with
slow-fading links and single-antenna half-duplex relay nodes. In a companion
paper, we established some basic results which laid the foundation for the
results presented here. In the present paper, we consider two families of
networks of half-duplex networks. KPP networks may be viewed as the union of K
node-disjoint parallel relaying paths. Generalizations of these networks
include KPP(I) networks, which permit interference between paths and KPP(D)
networks, which possess a direct link between source and sink. We characterize
the DMT of these families of networks completely and show that they can achieve
the cut-set bound, thus proving that full-duplex performance can be obtained
even in the presence of the half-duplex constraint. We then consider layered
networks, and prove that a linear DMT between maximum diversity and maximum
multiplexing gain is achievable. All protocols in this paper are explicit and
use only amplify-and-forward relaying. We also construct codes that achieve the
optimal DMT for all the proposed schemes. Two key implications of the results
in the paper are that the half-duplex constraint does not entail any rate loss
for a large class of cooperative networks and that AF protocols are often
optimal.
| [
{
"version": "v1",
"created": "Sat, 2 Aug 2008 07:38:14 GMT"
}
]
| 2008-08-05T00:00:00 | [
[
"Sreeram",
"K.",
""
],
[
"Birenjith",
"S.",
""
],
[
"Kumar",
"P. Vijay",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0247 | Danilo Gligoroski | Danilo Gligoroski and Smile Markovski and Svein Johan Knapskog | A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups | This is an extended and updated version of a paper "Multivariate
Quadratic Trapdoor Functions Based on Multivariate Quadratic Quasigroups",
Proceedings of the American Conference On Applied Mathematics (MATH '08),
Cambridge, Massachusetts, USA, March 24-26, 2008 | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have designed a new class of public key algorithms based on quasigroup
string transformations using a specific class of quasigroups called
multivariate quadratic quasigroups (MQQ). Our public key algorithm is a
bijective mapping, it does not perform message expansions and can be used both
for encryption and signatures. The public key consist of n quadratic
polynomials with n variables where n=140, 160, ... . A particular
characteristic of our public key algorithm is that it is very fast and highly
parallelizable. More concretely, it has the speed of a typical modern symmetric
block cipher - the reason for the phrase "A Public Key Block Cipher" in the
title of this paper. Namely the reference C code for the 160-bit variant of the
algorithm performs decryption in less than 11,000 cycles (on Intel Core 2 Duo
-- using only one processor core), and around 6,000 cycles using two CPU cores
and OpenMP 2.0 library. However, implemented in Xilinx Virtex-5 FPGA that is
running on 249.4 MHz it achieves decryption throughput of 399 Mbps, and
implemented on four Xilinx Virtex-5 chips that are running on 276.7 MHz it
achieves encryption throughput of 44.27 Gbps. Compared to fastest RSA
implementations on similar FPGA platforms, MQQ algorithm is more than 10,000
times faster.
| [
{
"version": "v1",
"created": "Sat, 2 Aug 2008 09:48:16 GMT"
}
]
| 2008-08-05T00:00:00 | [
[
"Gligoroski",
"Danilo",
""
],
[
"Markovski",
"Smile",
""
],
[
"Knapskog",
"Svein Johan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0808.0272 | Ki-Moon Lee | Ki-Moon Lee, Hayder Radha, and Beom-Jin Kim | Kovalenko's Full-Rank Limit and Overhead as Lower Bounds for
Error-Performances of LDPC and LT Codes over Binary Erasure Channels | A short version of this paper was presented at ISITA 2008, Auckland
NZ. The first draft was submitted to IEEE Transactions on Information Theory,
2008/06 | null | 10.1109/ISITA.2008.4895488 | null | cs.IT cs.DM math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present Kovalenko's full-rank limit as a tight lower bound for decoding
error probability of LDPC codes and LT codes over BEC. From the limit, we
derive a full-rank overhead as a lower bound for stable overheads for
successful maximum-likelihood decoding of the codes.
| [
{
"version": "v1",
"created": "Sat, 2 Aug 2008 18:03:31 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jan 2009 08:02:00 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Lee",
"Ki-Moon",
""
],
[
"Radha",
"Hayder",
""
],
[
"Kim",
"Beom-Jin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0284 | Ji\v{r}\'i Lebl | Jiri Lebl and Daniel Lichtblau | Uniqueness of certain polynomials constant on a line | 20 pages, latex; removed section 10 and address referee suggestions;
accepted to Linear Algebra and its Applications | Linear Algebra and Its Applications 433 (2010) pp. 824-837 | 10.1016/j.laa.2010.04.020 | null | math.CV cs.CG math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a question with connections to linear algebra, real algebraic
geometry, combinatorics, and complex analysis. Let $p(x,y)$ be a polynomial of
degree $d$ with $N$ positive coefficients and no negative coefficients, such
that $p=1$ when $x+y=1$. A sharp estimate $d \leq 2N-3$ is known. In this paper
we study the $p$ for which equality holds. We prove some new results about the
form of these "sharp" polynomials. Using these new results and using two
independent computational methods we give a complete classification of these
polynomials up to $d=17$. The question is motivated by the problem of
classification of CR maps between spheres in different dimensions.
| [
{
"version": "v1",
"created": "Sun, 3 Aug 2008 00:22:30 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Nov 2008 19:30:49 GMT"
},
{
"version": "v3",
"created": "Wed, 31 Mar 2010 18:18:48 GMT"
}
]
| 2010-05-26T00:00:00 | [
[
"Lebl",
"Jiri",
""
],
[
"Lichtblau",
"Daniel",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CV",
"description": "Holomorphic functions, automorphic group actions and forms, pseudoconvexity, complex geometry, analytic spaces, analytic sheaves",
"span": "(Complex Variables)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
]
|
0808.0291 | Olympia Hadjiliadis | Olympia Hadjiliadis, Hongzhong Zhang and H.V. Poor | One shot schemes for decentralized quickest change detection | Proceedings of the Eleventh International Conference on Information
Fusion, Cologne, Germany, June 30- July 3, 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work considers the problem of quickest detection with N distributed
sensors that receive continuous sequential observations from the environment.
These sensors employ cumulative sum (CUSUM) strategies and communicate to a
central fusion center by one shot schemes. One shot schemes are schemes in
which the sensors communicate with the fusion center only once, after which
they must signal a detection. The communication is clearly asynchronous and the
case is considered in which the fusion center employs a minimal strategy, which
means that it declares an alarm when the first communication takes place. It is
assumed that the observations received at the sensors are independent and that
the time points at which the appearance of a signal can take place are
different. It is shown that there is no loss of performance of one shot schemes
as compared to the centralized case in an extended Lorden min-max sense, since
the minimum of N CUSUMs is asymptotically optimal as the mean time between
false alarms increases without bound.
| [
{
"version": "v1",
"created": "Sun, 3 Aug 2008 03:09:30 GMT"
}
]
| 2008-08-05T00:00:00 | [
[
"Hadjiliadis",
"Olympia",
""
],
[
"Zhang",
"Hongzhong",
""
],
[
"Poor",
"H. V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0298 | Dmitrii V. Pasechnik | Edith Elkind and Dmitrii V. Pasechnik | Computing the nucleolus of weighted voting games | LaTeX, 12 pages, COMSOC-2008 workshop | Proceedings of SODA 2009, pp. 327-335 | 10.1145/1496770.1496807 | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Weighted voting games (WVG) are coalitional games in which an agent's
contribution to a coalition is given by his it weight, and a coalition wins if
its total weight meets or exceeds a given quota. These games model
decision-making in political bodies as well as collaboration and surplus
division in multiagent domains. The computational complexity of various
solution concepts for weighted voting games received a lot of attention in
recent years. In particular, Elkind et al.(2007) studied the complexity of
stability-related solution concepts in WVGs, namely, of the core, the least
core, and the nucleolus. While they have completely characterized the
algorithmic complexity of the core and the least core, for the nucleolus they
have only provided an NP-hardness result. In this paper, we solve an open
problem posed by Elkind et al. by showing that the nucleolus of WVGs, and, more
generally, k-vector weighted voting games with fixed k, can be computed in
pseudopolynomial time, i.e., there exists an algorithm that correctly computes
the nucleolus and runs in time polynomial in the number of players and the
maximum weight. In doing so, we propose a general framework for computing the
nucleolus, which may be applicable to a wider of class of games.
| [
{
"version": "v1",
"created": "Sun, 3 Aug 2008 05:22:47 GMT"
}
]
| 2010-10-21T00:00:00 | [
[
"Elkind",
"Edith",
""
],
[
"Pasechnik",
"Dmitrii V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.0309 | Siddharth Arora Mr. | Chirag Jain, Siddharth Arora, and Prasanta K. Panigrahi | A Reliable SVD based Watermarking Schem | 8 Pages, 7 Figures | null | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel scheme for watermarking of digital images based on
singular value decomposition (SVD), which makes use of the fact that the SVD
subspace preserves significant amount of information of an image, as compared
to its singular value matrix, Zhang and Li (2005). The principal components of
the watermark are embedded in the original image, leaving the detector with a
complimentary set of singular vectors for watermark extraction. The above step
invariably ensures that watermark extraction from the embedded watermark image,
using a modified matrix, is not possible, thereby removing a major drawback of
an earlier proposed algorithm by Liu and Tan (2002).
| [
{
"version": "v1",
"created": "Sun, 3 Aug 2008 10:17:03 GMT"
}
]
| 2008-08-05T00:00:00 | [
[
"Jain",
"Chirag",
""
],
[
"Arora",
"Siddharth",
""
],
[
"Panigrahi",
"Prasanta K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0808.0347 | Holger Kienle | Holger M. Kienle and Hausi A. M\"uller | Towards a Process for Developing Maintenance Tools in Academia | 10 pages, 2 figures, 15th Working Conference on Reverse Engineering
(WCRE 2008), Antwerp, Belgium | null | null | null | cs.SE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Building of tools--from simple prototypes to industrial-strength
applications--is a pervasive activity in academic research. When proposing a
new technique for software maintenance, effective tool support is typically
required to demonstrate the feasibility and effectiveness of the approach.
However, even though tool building is both pervasive and requiring significant
time and effort, it is still pursued in an ad hoc manner. In this paper, we
address these issues by proposing a dedicated development process for tool
building that takes the unique characteristics of an academic research
environment into account. We first identify process requirements based on a
review of the literature and our extensive tool building experience in the
domain of maintenance tools. We then outline a process framework based on work
products that accommodates the requirements while providing needed flexibility
for tailoring the process to account for specific tool building approaches and
project constraints. The work products are concrete milestones of the process,
tracking progress, rationalizing (design) decisions, and documenting the
current state of the tool building project. Thus, the work products provide
important input for strategic project decisions and rapid initiation of new
team members. Leveraging a dedicated tool building process promises tools that
are designed, build, and maintained in a more disciplined, predictable and
efficient manner.
| [
{
"version": "v1",
"created": "Sun, 3 Aug 2008 20:14:30 GMT"
}
]
| 2008-08-05T00:00:00 | [
[
"Kienle",
"Holger M.",
""
],
[
"Müller",
"Hausi A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0808.0374 | Eri Prasetyo Wibowo | Eri Prasetyo, Hamzah Afandi, Nurul Huda Dominique Ginhac, Michel
Paindavoine | A 8 bits Pipeline Analog to Digital Converter Design for High Speed
Camera Application | 5 pages, 5 authors, conference | EEPIS, 2007 | null | null | cs.RO cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | - This paper describes a pipeline analog-to-digital converter is implemented
for high speed camera. In the pipeline ADC design, prime factor is designing
operational amplifier with high gain so ADC have been high speed. The other
advantage of pipeline is simple on concept, easy to implement in layout and
have flexibility to increase speed. We made design and simulation using Mentor
Graphics Software with 0.6 \mu m CMOS technology with a total power dissipation
of 75.47 mW. Circuit techniques used include a precise comparator, operational
amplifier and clock management. A switched capacitor is used to sample and
multiplying at each stage. Simulation a worst case DNL and INL of 0.75 LSB. The
design operates at 5 V dc. The ADC achieves a SNDR of 44.86 dB. keywords:
pipeline, switched capacitor, clock management
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2008 03:23:20 GMT"
}
]
| 2008-08-05T00:00:00 | [
[
"Prasetyo",
"Eri",
""
],
[
"Afandi",
"Hamzah",
""
],
[
"Ginhac",
"Nurul Huda Dominique",
""
],
[
"Paindavoine",
"Michel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0808.0387 | Eri Prasetyo Wibowo | Eri Prasetyo, Dominique Ginhac, Michel Paindavoine | Design and Implementation a 8 bits Pipeline Analog to Digital Converter
in the Technology 0.6 \mu m CMOS Process | 5 pages, Conference in Paris | null | null | null | cs.RO cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a 8 bits, 20 Msamples/s pipeline analog-to-digital
converter implemented in 0.6 \mu m CMOS technology with a total power
dissipation of 75.47 mW. Circuit techniques used include a precise comparator,
operational amplifier and clock management. A switched capacitor is used to
sample and multiplying at each stage. Simulation a worst case DNL and INL of
0.75 LSB. The design operate at 5 V dc. The ADC achieves a SNDR of 44.86 dB.
keywords : pipeline, switched capacitor, clock management
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2008 07:19:57 GMT"
}
]
| 2008-08-05T00:00:00 | [
[
"Prasetyo",
"Eri",
""
],
[
"Ginhac",
"Dominique",
""
],
[
"Paindavoine",
"Michel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0808.0441 | Martin Escardo | Martin Escardo | Exhaustible sets in higher-type computation | null | Logical Methods in Computer Science, Volume 4, Issue 3 (August 27,
2008) lmcs:693 | 10.2168/LMCS-4(3:3)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We say that a set is exhaustible if it admits algorithmic universal
quantification for continuous predicates in finite time, and searchable if
there is an algorithm that, given any continuous predicate, either selects an
element for which the predicate holds or else tells there is no example. The
Cantor space of infinite sequences of binary digits is known to be searchable.
Searchable sets are exhaustible, and we show that the converse also holds for
sets of hereditarily total elements in the hierarchy of continuous functionals;
moreover, a selection functional can be constructed uniformly from a
quantification functional. We prove that searchable sets are closed under
intersections with decidable sets, and under the formation of computable images
and of finite and countably infinite products. This is related to the fact,
established here, that exhaustible sets are topologically compact. We obtain a
complete description of exhaustible total sets by developing a computational
version of a topological Arzela--Ascoli type characterization of compact
subsets of function spaces. We also show that, in the non-empty case, they are
precisely the computable images of the Cantor space. The emphasis of this paper
is on the theory of exhaustible and searchable sets, but we also briefly sketch
applications.
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2008 13:41:09 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Aug 2008 21:18:36 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Escardo",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0808.0469 | Stephen D. Miller | Stephen D. Miller and Ramarathnam Venkatesan | Non-degeneracy of Pollard Rho Collisions | 10 pages | null | null | null | math.NT cs.CR cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Pollard Rho algorithm is a widely used algorithm for solving discrete
logarithms on general cyclic groups, including elliptic curves. Recently the
first nontrivial runtime estimates were provided for it, culminating in a sharp
O(sqrt(n)) bound for the collision time on a cyclic group of order n. In this
paper we show that for n satisfying a mild arithmetic condition, the collisions
guaranteed by these results are nondegenerate with high probability: that is,
the Pollard Rho algorithm successfully finds the discrete logarithm.
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2008 17:46:39 GMT"
},
{
"version": "v2",
"created": "Sun, 31 Aug 2008 16:24:38 GMT"
}
]
| 2008-08-31T00:00:00 | [
[
"Miller",
"Stephen D.",
""
],
[
"Venkatesan",
"Ramarathnam",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0808.0509 | Shweta Bansal | Shweta Bansal, Shashank Khandelwal, Lauren Ancel Meyers | Evolving Clustered Random Networks | null | BMC Bioinformatics, Vol 10: 405, 2009 | 10.1186/1471-2105-10-405 | null | cs.DM physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a Markov chain simulation method to generate simple connected
random graphs with a specified degree sequence and level of clustering. The
networks generated by our algorithm are random in all other respects and can
thus serve as generic models for studying the impacts of degree distributions
and clustering on dynamical processes as well as null models for detecting
other structural properties in empirical networks.
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2008 21:10:37 GMT"
}
]
| 2010-02-09T00:00:00 | [
[
"Bansal",
"Shweta",
""
],
[
"Khandelwal",
"Shashank",
""
],
[
"Meyers",
"Lauren Ancel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0808.0518 | Philipp Mayr | Philipp Mayr, Vivien Petras | Building a terminology network for search: the KoMoHe project | 5 pages, 2 figure, Dublin Core Conference 2008 | null | 10.18452/1264 | null | cs.DL cs.DB | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The paper reports about results on the GESIS-IZ project "Competence Center
Modeling and Treatment of Semantic Heterogeneity" (KoMoHe). KoMoHe supervised a
terminology mapping effort, in which 'cross-concordances' between major
controlled vocabularies were organized, created and managed. In this paper we
describe the establishment and implementation of cross-concordances for search
in a digital library (DL).
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2008 22:11:45 GMT"
}
]
| 2019-01-15T00:00:00 | [
[
"Mayr",
"Philipp",
""
],
[
"Petras",
"Vivien",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0808.0521 | Ian Pratt-Hartmann | Ian Pratt-Hartmann and Lawrence S. Moss | Logics for the Relational Syllogistic | null | null | null | null | cs.LO cs.CC cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Aristotelian syllogistic cannot account for the validity of many
inferences involving relational facts. In this paper, we investigate the
prospects for providing a relational syllogistic. We identify several fragments
based on (a) whether negation is permitted on all nouns, including those in the
subject of a sentence; and (b) whether the subject noun phrase may contain a
relative clause. The logics we present are extensions of the classical
syllogistic, and we pay special attention to the question of whether reductio
ad absurdum is needed. Thus our main goal is to derive results on the existence
(or non-existence) of syllogistic proof systems for relational fragments. We
also determine the computational complexity of all our fragments.
| [
{
"version": "v1",
"created": "Mon, 4 Aug 2008 22:26:38 GMT"
}
]
| 2008-08-06T00:00:00 | [
[
"Pratt-Hartmann",
"Ian",
""
],
[
"Moss",
"Lawrence S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0808.0540 | Paul Tarau | Paul Tarau | Executable Set Theory and Arithmetic Encodings in Prolog | Unpublished draft | null | null | null | cs.LO cs.DM cs.DS cs.MS cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper is organized as a self-contained literate Prolog program that
implements elements of an executable finite set theory with focus on
combinatorial generation and arithmetic encodings. The complete Prolog code is
available at http://logic.csci.unt.edu/tarau/research/2008/pHFS.zip . First,
ranking and unranking functions for some "mathematically elegant" data types in
the universe of Hereditarily Finite Sets with Urelements are provided,
resulting in arithmetic encodings for powersets, hypergraphs, ordinals and
choice functions. After implementing a digraph representation of Hereditarily
Finite Sets we define {\em decoration functions} that can recover well-founded
sets from encodings of their associated acyclic digraphs. We conclude with an
encoding of arbitrary digraphs and discuss a concept of duality induced by the
set membership relation. In the process, we uncover the surprising possibility
of internally sharing isomorphic objects, independently of their language level
types and meanings.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 04:59:56 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Tarau",
"Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0808.0544 | Jae Won Kang | Jae Won Kang, Younghoon Whang, Hyo Yol Park and Kwang Soon Kim | Generalized Cross-correlation Properties of Chu Sequences | 22 pages, 1figure, 1 table | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper, we analyze the cross-correlation properties for Chu sequences,
which provide information on the distribution of the maximum magnitudes of the
cross-correlation function. Furthermore, we can obtain the number of available
sequences for a given maximum magnitude of the cross-correlation function and
the sequence length.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 03:41:37 GMT"
}
]
| 2008-08-06T00:00:00 | [
[
"Kang",
"Jae Won",
""
],
[
"Whang",
"Younghoon",
""
],
[
"Park",
"Hyo Yol",
""
],
[
"Kim",
"Kwang Soon",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0548 | Yoshiyuki Kabashima | Yoshiyuki Kabashima | How could the replica method improve accuracy of performance assessment
of channel coding? | 13 pages, 1 figure, submitted to the International Workshop on
Statistical-Mechanical Informatics (IW-SMI2008), Sendai | null | 10.1088/1742-6596/143/1/012018 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We explore the relation between the techniques of statistical mechanics and
information theory for assessing the performance of channel coding. We base our
study on a framework developed by Gallager in {\em IEEE Trans. Inform. Theory}
{\bf 11}, 3 (1965), where the minimum decoding error probability is
upper-bounded by an average of a generalized Chernoff's bound over a code
ensemble. We show that the resulting bound in the framework can be directly
assessed by the replica method, which has been developed in statistical
mechanics of disordered systems, whereas in Gallager's original methodology
further replacement by another bound utilizing Jensen's inequality is
necessary. Our approach associates a seemingly {\em ad hoc} restriction with
respect to an adjustable parameter for optimizing the bound with a phase
transition between two replica symmetric solutions, and can improve the
accuracy of performance assessments of general code ensembles including low
density parity check codes, although its mathematical justification is still
open.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 04:21:38 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Kabashima",
"Yoshiyuki",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0549 | Dong Huang | Dong Huang, Chunyan Miao, Cyril Leung, Zhiqi Shen | Resource Allocation of MU-OFDM Based Cognitive Radio Systems Under
Partial Channel State Information | This paper has been withdrawn | null | null | null | cs.IT cs.NE math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn by the author due to some errors.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 04:27:00 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Aug 2008 07:42:17 GMT"
},
{
"version": "v3",
"created": "Fri, 29 Aug 2008 03:32:44 GMT"
},
{
"version": "v4",
"created": "Mon, 1 Dec 2008 04:41:16 GMT"
},
{
"version": "v5",
"created": "Fri, 26 Feb 2010 07:41:18 GMT"
}
]
| 2010-02-26T00:00:00 | [
[
"Huang",
"Dong",
""
],
[
"Miao",
"Chunyan",
""
],
[
"Leung",
"Cyril",
""
],
[
"Shen",
"Zhiqi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0554 | Paul Tarau | Paul Tarau | Ranking and Unranking of Hereditarily Finite Functions and Permutations | unpublished draft | null | null | null | cs.LO cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Prolog's ability to return multiple answers on backtracking provides an
elegant mechanism to derive reversible encodings of combinatorial objects as
Natural Numbers i.e. {\em ranking} and {\em unranking} functions. Starting from
a generalization of Ackerman's encoding of Hereditarily Finite Sets with
Urelements and a novel tupling/untupling operation, we derive encodings for
Finite Functions and use them as building blocks for an executable theory of
{\em Hereditarily Finite Functions}. The more difficult problem of {\em
ranking} and {\em unranking} {\em Hereditarily Finite Permutations} is then
tackled using Lehmer codes and factoradics.
The paper is organized as a self-contained literate Prolog program available
at \url{http://logic.csci.unt.edu/tarau/research/2008/pHFF.zip}
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 05:20:51 GMT"
}
]
| 2008-08-06T00:00:00 | [
[
"Tarau",
"Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0808.0555 | Paul Tarau | Paul Tarau | Pairing Functions, Boolean Evaluation and Binary Decision Diagrams in
Prolog | also in the informal proceedings of CICLOPS 2008 workshop at:
http://clip.dia.fi.upm.es/Conferences/CICLOPS-2008/CICLOPS-2008-proceedings.pdf | null | null | null | cs.LO cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A "pairing function" J associates a unique natural number z to any two
natural numbers x,y such that for two "unpairing functions" K and L, the
equalities K(J(x,y))=x, L(J(x,y))=y and J(K(z),L(z))=z hold. Using pairing
functions on natural number representations of truth tables, we derive an
encoding for Binary Decision Diagrams with the unique property that its boolean
evaluation faithfully mimics its structural conversion to a a natural number
through recursive application of a matching pairing function. We then use this
result to derive {\em ranking} and {\em unranking} functions for BDDs and
reduced BDDs. The paper is organized as a self-contained literate Prolog
program, available at http://logic.csci.unt.edu/tarau/research/2008/pBDD.zip
Keywords: logic programming and computational mathematics, pairing/unpairing
functions, encodings of boolean functions, binary decision diagrams, natural
number representations of truth tables
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 05:33:09 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Feb 2009 03:25:22 GMT"
}
]
| 2009-02-04T00:00:00 | [
[
"Tarau",
"Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0808.0556 | Paul Tarau | Paul Tarau | Logic Engines as Interactors | unpublished draft | null | null | null | cs.PL cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new programming language construct, Interactors, supporting
the agent-oriented view that programming is a dialog between simple,
self-contained, autonomous building blocks.
We define Interactors as an abstraction of answer generation and refinement
in Logic Engines resulting in expressive language extension and metaprogramming
patterns, including emulation of Prolog's dynamic database.
A mapping between backtracking based answer generation in the callee and
"forward" recursion in the caller enables interaction between different
branches of the callee's search process and provides simplified design patterns
for algorithms involving combinatorial generation and infinite answer streams.
Interactors extend language constructs like Ruby, Python and C#'s multiple
coroutining block returns through yield statements and they can emulate the
action of monadic constructs and catamorphisms in functional languages.
Keywords: generalized iterators, logic engines, agent oriented programming
language constructs, interoperation with stateful objects, metaprogramming
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 05:48:32 GMT"
}
]
| 2008-08-07T00:00:00 | [
[
"Tarau",
"Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.