id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0808.0558 | Shreeshankar Bodas | Sandeep Bhadra, Shreeshankar Bodas, Sanjay Shakkottai, Sriram
Vishwanath | Communication Through Jamming over a Slotted ALOHA Channel | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work derives bounds on the jamming capacity of a slotted ALOHA system. A
system with n legitimate users, each with a Bernoulli arrival process is
considered. Packets are temporarily stored at the corresponding user queues,
and a slotted ALOHA strategy is used for packet transmissions over the shared
channel. The scenario considered is that of a pair of illegitimate users that
jam legitimate transmissions in order to communicate over the slotted ALOHA
channel. Jamming leads to binary signaling between the illegitimate users, with
packet collisions due to legitimate users treated as (multiplicative) noise in
this channel. Further, the queueing dynamics at the legitimate users
stochastically couples the jamming strategy used by the illegitimate users and
the channel evolution.
By considering various i.i.d. jamming strategies, achievable jamming rates
over the slotted ALOHA channel are derived. Further, an upper bound on the
jamming capacity over the class of all ergodic jamming policies is derived.
These bounds are shown to be tight in the limit where the offered system load
approaches unity.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 05:53:40 GMT"
}
]
| 2008-08-06T00:00:00 | [
[
"Bhadra",
"Sandeep",
""
],
[
"Bodas",
"Shreeshankar",
""
],
[
"Shakkottai",
"Sanjay",
""
],
[
"Vishwanath",
"Sriram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0584 | Daniele De Martino | Daniele De Martino, Luca Dall'Asta, Ginestra Bianconi and Matteo
Marsili | Congestion phenomena on complex networks | 4 pages, 4 figures, submitted to PRL | null | 10.1103/PhysRevE.79.015101 | null | physics.soc-ph cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define a minimal model of traffic flows in complex networks containing the
most relevant features of real routing schemes, i.e. a trade--off strategy
between topological-based and traffic-based routing. The resulting collective
behavior, obtained analytically for the ensemble of uncorrelated networks, is
physically very rich and reproduces results recently observed in traffic
simulations on scale-free networks. We find that traffic control is useless in
homogeneous graphs but may improves global performance in inhomogeneous
networks, enlarging the free-flow region in parameter space. Traffic control
also introduces non-linear effects and, beyond a critical strength, may trigger
the appearance of a congested phase in a discontinuous manner.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 14:48:14 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"De Martino",
"Daniele",
""
],
[
"Dall'Asta",
"Luca",
""
],
[
"Bianconi",
"Ginestra",
""
],
[
"Marsili",
"Matteo",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.0586 | Xavier Leroy | Xavier Leroy (INRIA Rocquencourt), Herv\'e Grall (INRIA Rennes, LINA) | Coinductive big-step operational semantics | null | Information and Computation (2007) | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using a call-by-value functional language as an example, this article
illustrates the use of coinductive definitions and proofs in big-step
operational semantics, enabling it to describe diverging evaluations in
addition to terminating evaluations. We formalize the connections between the
coinductive big-step semantics and the standard small-step semantics, proving
that both semantics are equivalent. We then study the use of coinductive
big-step semantics in proofs of type soundness and proofs of semantic
preservation for compilers. A methodological originality of this paper is that
all results have been proved using the Coq proof assistant. We explain the
proof-theoretic presentation of coinductive definitions and proofs offered by
Coq, and show that it facilitates the discovery and the presentation of the
results.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 14:47:32 GMT"
}
]
| 2008-08-06T00:00:00 | [
[
"Leroy",
"Xavier",
"",
"INRIA Rocquencourt"
],
[
"Grall",
"Hervé",
"",
"INRIA Rennes, LINA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0808.0596 | Ido Tal | Ido Tal, Tuvi Etzion, Ron M. Roth | On row-by-row coding for 2-D constraints | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A constant-rate encoder--decoder pair is presented for a fairly large family
of two-dimensional (2-D) constraints. Encoding and decoding is done in a
row-by-row manner, and is sliding-block decodable.
Essentially, the 2-D constraint is turned into a set of independent and
relatively simple one-dimensional (1-D) constraints; this is done by dividing
the array into fixed-width vertical strips. Each row in the strip is seen as a
symbol, and a graph presentation of the respective 1-D constraint is
constructed. The maxentropic stationary Markov chain on this graph is next
considered: a perturbed version of the corresponding probability distribution
on the edges of the graph is used in order to build an encoder which operates
in parallel on the strips. This perturbation is found by means of a network
flow, with upper and lower bounds on the flow through the edges.
A key part of the encoder is an enumerative coder for constant-weight binary
words. A fast realization of this coder is shown, using floating-point
arithmetic.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 10:14:08 GMT"
}
]
| 2008-08-06T00:00:00 | [
[
"Tal",
"Ido",
""
],
[
"Etzion",
"Tuvi",
""
],
[
"Roth",
"Ron M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0634 | Tomasz Truderung | Ralf Kuesters and Tomasz Truderung | Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn
Theory Based Approach | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the Horn theory based approach for cryptographic protocol analysis,
cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories
and security analysis boils down to solving the derivation problem for Horn
theories. This approach and the tools based on this approach, including
ProVerif, have been very successful in the automatic analysis of cryptographic
protocols w.r.t. an unbounded number of sessions. However, dealing with the
algebraic properties of operators such as the exclusive OR (XOR) has been
problematic. In particular, ProVerif cannot deal with XOR. In this paper, we
show how to reduce the derivation problem for Horn theories with XOR to the
XOR-free case. Our reduction works for an expressive class of Horn theories. A
large class of intruder capabilities and protocols that employ the XOR operator
can be modeled by these theories. Our reduction allows us to carry out protocol
analysis by tools, such as ProVerif, that cannot deal with XOR, but are very
efficient in the XOR-free case. We implemented our reduction and, in
combination with ProVerif, applied it in the automatic analysis of several
protocols that use the XOR operator. In one case, we found a new attack.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 13:02:24 GMT"
}
]
| 2008-08-06T00:00:00 | [
[
"Kuesters",
"Ralf",
""
],
[
"Truderung",
"Tomasz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0808.0647 | Barnaby Martin | Barnaby Martin | Model Checking Positive Equality-free FO: Boolean Structures and
Digraphs of Size Three | null | null | null | null | cs.CC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the model checking problem, for fixed structures A, over positive
equality-free first-order logic -- a natural generalisation of the non-uniform
quantified constraint satisfaction problem QCSP(A). We prove a complete
complexity classification for this problem when A ranges over 1.) boolean
structures and 2.) digraphs of size (less than or equal to) three. The former
class displays dichotomy between Logspace and Pspace-complete, while the latter
class displays tetrachotomy between Logspace, NP-complete, co-NP-complete and
Pspace-complete.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 13:33:43 GMT"
}
]
| 2008-08-06T00:00:00 | [
[
"Martin",
"Barnaby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0808.0665 | Celine Fouard | C\'eline Fouard (INRIA Sophia Antipolis), Robin Strand (CBA), Gunilla
Borgefors (CBA) | Weighted distance transforms generalized to modules and their
computation on point lattices | null | Pattern Recognition 40, 9 (2007) 2453--2474 | 10.1016/j.patcog.2007.01.001 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the generalization of weighted distances to modules and
their computation through the chamfer algorithm on general point lattices. The
first part is dedicated to formalization of definitions and properties
(distance, metric, norm) of weighted distances on modules. It resumes tools
found in literature to express the weighted distance of any point of a module
and to compute optimal weights in the general case to get rotation invariant
distances. The second part of this paper proves that, for any point lattice,
the sequential two-scan chamfer algorithm produces correct distance maps.
Finally, the definitions and computation of weighted distances are applied to
the face-centered cubic (FCC) and body-centered cubic (BCC) grids.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 14:44:45 GMT"
}
]
| 2008-08-06T00:00:00 | [
[
"Fouard",
"Céline",
"",
"INRIA Sophia Antipolis"
],
[
"Strand",
"Robin",
"",
"CBA"
],
[
"Borgefors",
"Gunilla",
"",
"CBA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0808.0684 | Selcuk Kavut | Selcuk Kavut and Melek Diker Yucel | 9-variable Boolean Functions with Nonlinearity 242 in the Generalized
Rotation Class | This work is based on (i) "Generalized Rotation Symmetric and
Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with
Nonlinearity 242", AAECC-17 Symposium, LNCS Vol. 4851, pp. 321-329,
Bangalore, India, 2007 and (ii) "Random Permutations on Input Vectors of
Boolean Functions", BFCA 2008, Copenhagen, Denmark, 2008 | null | null | null | cs.CR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In 2006, 9-variable Boolean functions having nonlinearity 241, which is
strictly greater than the bent concatenation bound of 240, have been discovered
in the class of Rotation Symmetric Boolean Functions (RSBFs) by Kavut, Maitra
and Yucel. To improve this nonlinearity result, we have firstly defined some
subsets of the n-variable Boolean functions as the "generalized classes of
k-RSBFs and k-DSBFs (k-Dihedral Symmetric Boolean Functions)", where k is a
positive integer dividing n and k-RSBFs is a subset of l-RSBFs if k < l.
Secondly, utilizing the steepest-descent like iterative heuristic search
algorithm used previously to identify the 9-variable RSBFs with nonlinearity
241, we have made a search within the classes of 3-RSBFs and 3-DSBFs. The
search has accomplished to find 9-variable Boolean functions with nonlinearity
242 in both of these classes. It should be emphasized that although the class
of 3-RSBFs contains functions with nonlinearity 242; 1-RSBFs or simply RSBFs,
which is a subset of 3-RSBFs, does not contain any. This result also shows that
the covering radius of the first order Reed-Muller code R(1, 9) is at least
equal to 242. Thirdly, motivated by the fact that RSBFs are invariant under a
special permutation of the input vector, we have classified all possible
permutations up to the linear equivalence of Boolean functions that are
invariant under those permutations. Specifically, for 9-variable Boolean
functions, 9! possible permutations are classified into 30 classes; and the
search algorithm identifies some of these classes as "rich". The rich classes
yield new Boolean functions with nonlinearity 242 having different
autocorrelation spectra from those of the functions found in the generalized
3-RSBF and 3-DSBF classes.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 17:06:16 GMT"
}
]
| 2008-08-06T00:00:00 | [
[
"Kavut",
"Selcuk",
""
],
[
"Yucel",
"Melek Diker",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0732 | Dusko Pavlovic | Dusko Pavlovic | Dynamics, robustness and fragility of trust | 17 pages; simplified the statement and the proof of the main theorem;
FAST 2008 | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Trust is often conveyed through delegation, or through recommendation. This
makes the trust authorities, who process and publish trust recommendations,
into an attractive target for attacks and spoofing. In some recent empiric
studies, this was shown to lead to a remarkable phenomenon of *adverse
selection*: a greater percentage of unreliable or malicious web merchants were
found among those with certain types of trust certificates, then among those
without. While such findings can be attributed to a lack of diligence in trust
authorities, or even to conflicts of interest, our analysis of trust dynamics
suggests that public trust networks would probably remain vulnerable even if
trust authorities were perfectly diligent. The reason is that the process of
trust building, if trust is not breached too often, naturally leads to
power-law distributions: the rich get richer, the trusted attract more trust.
The evolutionary processes with such distributions, ubiquitous in nature, are
known to be robust with respect to random failures, but vulnerable to adaptive
attacks. We recommend some ways to decrease the vulnerability of trust
building, and suggest some ideas for exploration.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 23:31:20 GMT"
},
{
"version": "v2",
"created": "Sun, 28 Sep 2008 18:52:42 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Oct 2008 18:42:57 GMT"
}
]
| 2008-10-24T00:00:00 | [
[
"Pavlovic",
"Dusko",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0808.0745 | Caleb Lo | Caleb K. Lo, John J. Hasenbein, Sriram Vishwanath and Robert W. Heath
Jr | Relay-Assisted User Scheduling in Wireless Networks with Hybrid-ARQ | 14 pages, 5 figures, submitted to the IEEE Transactions on Vehicular
Technology in October 2008, revised in March 2009 and May 2009 | null | 10.1109/TVT.2009.2027711 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the problem of relay-assisted user scheduling for downlink
wireless transmission. The base station or access point employs hybrid
automatic-repeat-request (HARQ) with the assistance of a set of fixed relays to
serve a set of mobile users. By minimizing a cost function of the queue lengths
at the base station and the number of retransmissions of the head-of-line
packet for each user, the base station can schedule an appropriate user in each
time slot and an appropriate transmitter to serve it. It is shown that a
priority-index policy is optimal for a linear cost function with packets
arriving according to a Poisson process and for an increasing convex cost
function where packets must be drained from the queues at the base station.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2008 23:53:26 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Oct 2008 00:03:40 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Oct 2008 18:07:18 GMT"
},
{
"version": "v4",
"created": "Thu, 19 Mar 2009 00:14:59 GMT"
},
{
"version": "v5",
"created": "Sat, 16 May 2009 23:30:33 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Lo",
"Caleb K.",
""
],
[
"Hasenbein",
"John J.",
""
],
[
"Vishwanath",
"Sriram",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0753 | Paul Tarau | Paul Tarau | Ranking Catamorphisms and Unranking Anamorphisms on Hereditarily Finite
Datatypes | unpublished draft | null | null | null | cs.SC cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using specializations of unfold and fold on a generic tree data type we
derive unranking and ranking functions providing natural number encodings for
various Hereditarily Finite datatypes.
In this context, we interpret unranking operations as instances of a generic
anamorphism and ranking operations as instances of the corresponding
catamorphism.
Starting with Ackerman's Encoding from Hereditarily Finite Sets to Natural
Numbers we define pairings and tuple encodings that provide building blocks for
a theory of Hereditarily Finite Functions.
The more difficult problem of ranking and unranking Hereditarily Finite
Permutations is then tackled using Lehmer codes and factoradics.
The self-contained source code of the paper, as generated from a literate
Haskell program, is available at
\url{http://logic.csci.unt.edu/tarau/research/2008/fFUN.zip}.
Keywords: ranking/unranking, pairing/tupling functions, Ackermann encoding,
hereditarily finite sets, hereditarily finite functions, permutations and
factoradics, computational mathematics, Haskell data representations
| [
{
"version": "v1",
"created": "Wed, 6 Aug 2008 00:54:05 GMT"
}
]
| 2008-08-07T00:00:00 | [
[
"Tarau",
"Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.0754 | Paul Tarau | Paul Tarau | A Functional Hitchhiker's Guide to Hereditarily Finite Sets, Ackermann
Encodings and Pairing Functions | unpublished draft | null | null | null | cs.MS cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper is organized as a self-contained literate Haskell program that
implements elements of an executable finite set theory with focus on
combinatorial generation and arithmetic encodings. The code, tested under GHC
6.6.1, is available at http://logic.csci.unt.edu/tarau/research/2008/fSET.zip .
We introduce ranking and unranking functions generalizing Ackermann's
encoding to the universe of Hereditarily Finite Sets with Urelements. Then we
build a lazy enumerator for Hereditarily Finite Sets with Urelements that
matches the unranking function provided by the inverse of Ackermann's encoding
and we describe functors between them resulting in arithmetic encodings for
powersets, hypergraphs, ordinals and choice functions. After implementing a
digraph representation of Hereditarily Finite Sets we define {\em decoration
functions} that can recover well-founded sets from encodings of their
associated acyclic digraphs. We conclude with an encoding of arbitrary digraphs
and discuss a concept of duality induced by the set membership relation.
Keywords: hereditarily finite sets, ranking and unranking functions,
executable set theory, arithmetic encodings, Haskell data representations,
functional programming and computational mathematics
| [
{
"version": "v1",
"created": "Wed, 6 Aug 2008 01:05:09 GMT"
}
]
| 2008-08-07T00:00:00 | [
[
"Tarau",
"Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.0760 | Paul Tarau | Paul Tarau | Declarative Combinatorics: Boolean Functions, Circuit Synthesis and BDDs
in Haskell | unpublished draft | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe Haskell implementations of interesting combinatorial generation
algorithms with focus on boolean functions and logic circuit representations.
First, a complete exact combinational logic circuit synthesizer is described
as a combination of catamorphisms and anamorphisms.
Using pairing and unpairing functions on natural number representations of
truth tables, we derive an encoding for Binary Decision Diagrams (BDDs) with
the unique property that its boolean evaluation faithfully mimics its
structural conversion to a a natural number through recursive application of a
matching pairing function.
We then use this result to derive ranking and unranking functions for BDDs
and reduced BDDs.
Finally, a generalization of the encoding techniques to Multi-Terminal BDDs
is provided.
The paper is organized as a self-contained literate Haskell program,
available at http://logic.csci.unt.edu/tarau/research/2008/fBDD.zip .
Keywords: exact combinational logic synthesis, binary decision diagrams,
encodings of boolean functions, pairing/unpairing functions, ranking/unranking
functions for BDDs and MTBDDs, declarative combinatorics in Haskell
| [
{
"version": "v1",
"created": "Wed, 6 Aug 2008 01:41:51 GMT"
}
]
| 2008-08-07T00:00:00 | [
[
"Tarau",
"Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.0768 | Mark Burgin | Mark Burgin | Foundations of Information Theory | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Information is the basic concept of information theory. However, there is no
definition of this concept that can encompass all uses of the term information
in information theories and beyond. Many question a possibility of such a
definition. However, foundations of information theory developed in the context
of the general theory of information made it possible to build such a relevant
and at the same time, encompassing definition. Foundations of information
theory are built in a form of ontological principles, which reflect basic
features of information and information processes.
| [
{
"version": "v1",
"created": "Wed, 6 Aug 2008 04:04:55 GMT"
}
]
| 2008-08-07T00:00:00 | [
[
"Burgin",
"Mark",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0845 | Jian Ma | Jian Ma and Zengqi Sun | Mutual information is copula entropy | null | null | null | null | cs.IT cs.LG math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that mutual information is actually negative copula entropy, based
on which a method for mutual information estimation is proposed.
| [
{
"version": "v1",
"created": "Wed, 6 Aug 2008 14:20:56 GMT"
}
]
| 2008-08-07T00:00:00 | [
[
"Ma",
"Jian",
""
],
[
"Sun",
"Zengqi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0808.0876 | Nan Liu | Nan Liu and Andrea Goldsmith | Capacity Regions and Bounds for a Class of Z-interference Channels | submitted to IEEE Trans. on Information Theory. This material was
presented in part at the IEEE International Symposium on Information Theory,
Toronto, Canada, July 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define a class of Z-interference channels for which we obtain a new upper
bound on the capacity region. The bound exploits a technique first introduced
by Korner and Marton. A channel in this class has the property that, for the
transmitter-receiver pair that suffers from interference, the conditional
output entropy at the receiver is invariant with respect to the transmitted
codewords. We compare the new capacity region upper bound with the
Han/Kobayashi achievable rate region for interference channels. This comparison
shows that our bound is tight in some cases, thereby yielding specific points
on the capacity region as well as sum capacity for certain Z-interference
channels. In particular, this result can be used as an alternate method to
obtain sum capacity of Gaussian Z-interference channels. We then apply an
additional restriction on our channel class: the transmitter-receiver pair that
suffers from interference achieves its maximum output entropy with a single
input distribution irrespective of the interference distribution. For these
channels we show that our new capacity region upper bound coincides with the
Han/Kobayashi achievable rate region, which is therefore capacity-achieving. In
particular, for these channels superposition encoding with partial decoding is
shown to be optimal and a single-letter characterization for the capacity
region is obtained.
| [
{
"version": "v1",
"created": "Wed, 6 Aug 2008 16:30:09 GMT"
}
]
| 2008-08-07T00:00:00 | [
[
"Liu",
"Nan",
""
],
[
"Goldsmith",
"Andrea",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0920 | Mahesh Arumugam | Mahesh Arumugam | A Distributed and Deterministic TDMA Algorithm for
Write-All-With-Collision Model | 14 pages | null | null | null | cs.OS cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several self-stabilizing time division multiple access (TDMA) algorithms are
proposed for sensor networks. In addition to providing a collision-free
communication service, such algorithms enable the transformation of programs
written in abstract models considered in distributed computing literature into
a model consistent with sensor networks, i.e., write all with collision (WAC)
model. Existing TDMA slot assignment algorithms have one or more of the
following properties: (i) compute slots using a randomized algorithm, (ii)
assume that the topology is known upfront, and/or (iii) assign slots
sequentially. If these algorithms are used to transform abstract programs into
programs in WAC model then the transformed programs are probabilistically
correct, do not allow the addition of new nodes, and/or converge in a
sequential fashion. In this paper, we propose a self-stabilizing deterministic
TDMA algorithm where a sensor is aware of only its neighbors. We show that the
slots are assigned to the sensors in a concurrent fashion and starting from
arbitrary initial states, the algorithm converges to states where
collision-free communication among the sensors is restored. Moreover, this
algorithm facilitates the transformation of abstract programs into programs in
WAC model that are deterministically correct.
| [
{
"version": "v1",
"created": "Wed, 6 Aug 2008 20:33:56 GMT"
}
]
| 2008-08-08T00:00:00 | [
[
"Arumugam",
"Mahesh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.0948 | Wei Kang | Wei Kang, Sennur Ulukus | Capacity of a Class of Diamond Channels | 15 pages, 3 figures, submitted to IEEE Trans. on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a special class of diamond channels which was introduced by Schein
in 2001. In this special class, each diamond channel consists of a transmitter,
a noisy relay, a noiseless relay and a receiver. We prove the capacity of this
class of diamond channels by providing an achievable scheme and a converse. The
capacity we show is strictly smaller than the cut-set bound. Our result also
shows the optimality of a combination of decode-and-forward (DAF) and
compress-and-forward (CAF) at the noisy relay node. This is the first example
where a combination of DAF and CAF is shown to be capacity achieving. Finally,
we note that there exists a duality between this diamond channel coding problem
and the Kaspi-Berger source coding problem.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 02:45:36 GMT"
}
]
| 2008-08-08T00:00:00 | [
[
"Kang",
"Wei",
""
],
[
"Ulukus",
"Sennur",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0954 | Sang Joon Kim | Sang Joon Kim, Natasha Devroye, Patrick Mitran, Vahid Tarokh | Achievable rate regions for bi-directional relaying | 42 pages, 17 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a bi-directional relay channel, two nodes wish to exchange independent
messages over a shared wireless half-duplex channel with the help of a relay.
In this paper, we derive achievable rate regions for four new half-duplex
protocols and compare these to four existing half-duplex protocols and outer
bounds. In time, our protocols consist of either two or three phases. In the
two phase protocols, both users simultaneously transmit during the first phase
and the relay alone transmits during the second phase, while in the three phase
protocol the two users sequentially transmit followed by a transmission from
the relay. The relay may forward information in one of four manners; we outline
existing Amplify and Forward (AF), Decode and Forward (DF) and Compress and
Forward (CF) relaying schemes and introduce the novel Mixed Forward scheme. The
latter is a combination of CF in one direction and DF in the other. We derive
achievable rate regions for the CF and Mixed relaying schemes for the two and
three phase protocols. In the last part of this work we provide a comprehensive
treatment of 8 possible half-duplex bi-directional relaying protocols in
Gaussian noise, obtaining their respective achievable rate regions, outer
bounds, and their relative performance under different SNR and relay
geometries.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 04:15:59 GMT"
},
{
"version": "v2",
"created": "Fri, 15 May 2009 21:11:15 GMT"
}
]
| 2009-05-16T00:00:00 | [
[
"Kim",
"Sang Joon",
""
],
[
"Devroye",
"Natasha",
""
],
[
"Mitran",
"Patrick",
""
],
[
"Tarokh",
"Vahid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0962 | Amin Ansari | Amin Ansari | Verification of Peterson's Algorithm for Leader Election in a
Unidirectional Asynchronous Ring Using NuSMV | 11 pages, 6 figures | null | null | null | cs.LO cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The finite intrinsic nature of the most distributed algorithms gives us this
ability to use model checking tools for verification of this type of
algorithms. In this paper, I attempt to use NuSMV as a model checking tool for
verifying necessary properties of Peterson's algorithm for leader election
problem in a unidirectional asynchronous ring topology. Peterson's algorithm
for an asynchronous ring supposes that each node in the ring has a unique ID
and also a queue for dealing with storage problem. By considering that the
queue can have any combination of values, a constructed model for a ring with
only four nodes will have more than a billion states. Although it seems that
model checking is not a feasible approach for this problem, I attempt to use
several effective limiting assumptions for hiring formal model checking
approach without losing the correct functionality of the Peterson's algorithm.
These enforced limiting assumptions target the degree of freedom in the model
checking process and significantly decrease the CPU time, memory usage and the
total number of page faults. By deploying these limitations, the number of
nodes can be increased from four to eight in the model checking process with
NuSMV.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 06:02:59 GMT"
}
]
| 2008-08-08T00:00:00 | [
[
"Ansari",
"Amin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.0973 | Chaitanya Chemudugunta | Chaitanya Chemudugunta, Padhraic Smyth and Mark Steyvers | Text Modeling using Unsupervised Topic Models and Concept Hierarchies | null | null | null | null | cs.AI cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Statistical topic models provide a general data-driven framework for
automated discovery of high-level knowledge from large collections of text
documents. While topic models can potentially discover a broad range of themes
in a data set, the interpretability of the learned topics is not always ideal.
Human-defined concepts, on the other hand, tend to be semantically richer due
to careful selection of words to define concepts but they tend not to cover the
themes in a data set exhaustively. In this paper, we propose a probabilistic
framework to combine a hierarchy of human-defined semantic concepts with
statistical topic models to seek the best of both worlds. Experimental results
using two different sources of concept hierarchies and two collections of text
documents indicate that this combination leads to systematic improvements in
the quality of the associated language models as well as enabling new
techniques for inferring and visualizing the semantics of a document.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 07:59:29 GMT"
}
]
| 2008-08-08T00:00:00 | [
[
"Chemudugunta",
"Chaitanya",
""
],
[
"Smyth",
"Padhraic",
""
],
[
"Steyvers",
"Mark",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0808.0978 | Gesualdo Scutari | Gesualdo Scutari, Daniel P. Palomar, Sergio Barbarossa | Cognitive MIMO Radio: A Competitive Optimality Design Based on Subspace
Projections | null | IEEE Signal Processing Magazine Special Issue on Signal Processing
for Cognitive Radio Networks, November 2008 | 10.1109/MSP.2008.929297 | null | cs.IT cs.GT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cognitive MIMO Radio: A Competitive Optimality Design Based on Subspace
Projections
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 13:54:45 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Scutari",
"Gesualdo",
""
],
[
"Palomar",
"Daniel P.",
""
],
[
"Barbarossa",
"Sergio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.0980 | Gregory Gutin | Peter Dankelmann, Gregory Gutin, Eun Jung Kim | On Complexity of Minimum Leaf Out-branching Problem | null | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a digraph $D$, the Minimum Leaf Out-Branching problem (MinLOB) is the
problem of finding in $D$ an out-branching with the minimum possible number of
leaves, i.e., vertices of out-degree 0. Gutin, Razgon and Kim (2008) proved
that MinLOB is polynomial time solvable for acyclic digraphs which are exactly
the digraphs of directed path-width (DAG-width, directed tree-width,
respectively) 0. We investigate how much one can extend this polynomiality
result. We prove that already for digraphs of directed path-width (directed
tree-width, DAG-width, respectively) 1, MinLOB is NP-hard. On the other hand,
we show that for digraphs of restricted directed tree-width (directed
path-width, DAG-width, respectively) and a fixed integer $k$, the problem of
checking whether there is an out-branching with at most $k$ leaves is
polynomial time solvable.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 08:41:48 GMT"
}
]
| 2008-08-08T00:00:00 | [
[
"Dankelmann",
"Peter",
""
],
[
"Gutin",
"Gregory",
""
],
[
"Kim",
"Eun Jung",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0808.0987 | Marcin Wiczanowski | Marcin Wiczanowski, Holger Boche | A new graph perspective on max-min fairness in Gaussian parallel
channels | 41 pages, 8 figures. submitted to IEEE Transactions on Information
Theory on August the 6th, 2008 | null | 10.1109/ISITA.2008.4895521 | null | cs.IT cs.DM math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we are concerned with the problem of achieving max-min fairness
in Gaussian parallel channels with respect to a general performance function,
including channel capacity or decoding reliability as special cases. As our
central results, we characterize the laws which determine the value of the
achievable max-min fair performance as a function of channel sharing policy and
power allocation (to channels and users). In particular, we show that the
max-min fair performance behaves as a specialized version of the Lovasz
function, or Delsarte bound, of a certain graph induced by channel sharing
combinatorics. We also prove that, in addition to such graph, merely a certain
2-norm distance dependent on the allowable power allocations and used
performance functions, is sufficient for the characterization of max-min fair
performance up to some candidate interval. Our results show also a specific
role played by odd cycles in the graph induced by the channel sharing policy
and we present an interesting relation between max-min fairness in parallel
channels and optimal throughput in an associated interference channel.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 09:26:12 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Wiczanowski",
"Marcin",
""
],
[
"Boche",
"Holger",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.1000 | Dong Huang | Dong Huang, Chunyan Miao, Cyril Leung | Fitness Landscape Analysis for Dynamic Resource Allocation in Multiuser
OFDM Based Cognitive Radio Systems | This paper has been withdrawn | null | null | null | cs.IT cs.NE math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 11:07:22 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Aug 2008 02:55:17 GMT"
},
{
"version": "v3",
"created": "Sun, 7 Mar 2010 12:56:29 GMT"
}
]
| 2010-03-09T00:00:00 | [
[
"Huang",
"Dong",
""
],
[
"Miao",
"Chunyan",
""
],
[
"Leung",
"Cyril",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.1007 | Igor Bjelakovic | I. Bjelakovic, H. Boche, J. Noetzel | On Quantum Capacity of Compound Channels | 16 pages, no figures | null | 10.1103/PhysRevA.78.042331 | null | quant-ph cs.IT math-ph math.IT math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we address the issue of universal or robust communication over
quantum channels. Specifically, we consider memoryless communication scenario
with channel uncertainty which is an analog of compound channel in classical
information theory. We determine the quantum capacity of finite compound
channels and arbitrary compound channels with informed decoder. Our approach in
the finite case is based on the observation that perfect channel knowledge at
the decoder does not increase the capacity of finite quantum compound channels.
As a consequence we obtain coding theorem for finite quantum averaged channels,
the simplest class of channels with long-term memory. The extension of these
results to quantum compound channels with uninformed encoder and decoder, and
infinitely many constituents remains an open problem.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 13:03:46 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Bjelakovic",
"I.",
""
],
[
"Boche",
"H.",
""
],
[
"Noetzel",
"J.",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
]
|
0808.1062 | Qinglin Zhao | Qinglin Zhao, Soung C. Liew | Optimization of Location Management for PCS Networks with CTRW Mobility
Model | null | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the design of the optimal locationupdate area (LA) of
the distance-based scheme for personal communication service (PCS) networks. We
focus on the optimization of two design parameters associated with the LA: 1)
initial position upon LA update; 2) distance threshold for triggering of LA
update. Based on the popular continuous-time random walk (CTRW) mobility model,
we propose a novel analytical framework that uses a diffusion equation to
minimize the location management cost. In this framework, a number of
measurable physical parameters, such as length of road section, angle between
road sections, and road section crossing time, can be integrated into the
system design. This framework allows us to easily evaluate the total cost under
general call arrival distributions and LA of different shapes. For the
particular case of circular LA and small Poisson call-arrival rate, we prove
the following: (1) When the drift is weak, the optimal initial position
approaches the center of the LA; when the drift is strong, it approaches the
boundary of the LA. (2) Comparing the optimal initial-position and
center-initial-position solutions (which is assumed in most prior work), when
the drift is weak, the optimal distance threshold and the minimum total cost
are roughly equal; when the drift is strong, the optimal distance threshold in
the later is about 1.260 times that in the former, and the minimum total cost
in the later is about 1.587 times that in the former. That is, optimizing on
initial position, which previous work did not consider, has the potential of
reducing the cost measure by 37%.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 16:32:51 GMT"
}
]
| 2008-08-08T00:00:00 | [
[
"Zhao",
"Qinglin",
""
],
[
"Liew",
"Soung C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0808.1108 | Nicolas Bock | Nicolas Bock and Emanuel H. Rubensson and Pawe{\l} Sa{\l}ek and Anders
M. N. Niklasson and Matt Challacombe | Cache oblivious storage and access heuristics for blocked matrix-matrix
multiplication | Fixed typos | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate effects of ordering in blocked matrix--matrix multiplication.
We find that submatrices do not have to be stored contiguously in memory to
achieve near optimal performance. Instead it is the choice of execution order
of the submatrix multiplications that leads to a speedup of up to four times
for small block sizes. This is in contrast to results for single matrix
elements showing that contiguous memory allocation quickly becomes irrelevant
as the blocksize increases.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 22:49:29 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Aug 2008 14:34:31 GMT"
}
]
| 2008-08-15T00:00:00 | [
[
"Bock",
"Nicolas",
""
],
[
"Rubensson",
"Emanuel H.",
""
],
[
"Sałek",
"Paweł",
""
],
[
"Niklasson",
"Anders M. N.",
""
],
[
"Challacombe",
"Matt",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.1119 | Seenu Reddi | Seenu S. Reddi | Graham's Schedules and the Number Partition Problem | 6 pages, 1 table | null | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show the equivalence of the Number Partition Problem and the two processor
scheduling problem. We establish a priori bounds on the completion times for
the scheduling problem which are tighter than Graham's but almost on par with a
posteriori bounds of Coffman and Sethi. We conclude the paper with a
characterization of the asymptotic behavior of the scheduling problem which
relates to the spread of the processing times and the number of jobs.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 22:17:56 GMT"
}
]
| 2008-08-11T00:00:00 | [
[
"Reddi",
"Seenu S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0808.1125 | Omid David-Tabibi | Omid David-Tabibi and Nathan S. Netanyahu | Verified Null-Move Pruning | 9 pages | ICGA Journal, International Computer Games Association, Vol. 25,
No. 3, pp. 153--161, September 2002 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we review standard null-move pruning and introduce our
extended version of it, which we call verified null-move pruning. In verified
null-move pruning, whenever the shallow null-move search indicates a fail-high,
instead of cutting off the search from the current node, the search is
continued with reduced depth.
Our experiments with verified null-move pruning show that on average, it
constructs a smaller search tree with greater tactical strength in comparison
to standard null-move pruning. Moreover, unlike standard null-move pruning,
which fails badly in zugzwang positions, verified null-move pruning manages to
detect most zugzwangs and in such cases conducts a re-search to obtain the
correct result. In addition, verified null-move pruning is very easy to
implement, and any standard null-move pruning program can use verified
null-move pruning by modifying only a few lines of code.
| [
{
"version": "v1",
"created": "Fri, 8 Aug 2008 12:44:10 GMT"
}
]
| 2008-08-11T00:00:00 | [
[
"David-Tabibi",
"Omid",
""
],
[
"Netanyahu",
"Nathan S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0808.1128 | Mihai Patrascu | Timothy M. Chan and Mihai Patrascu and Liam Roditty | Dynamic Connectivity: Connecting to Networks and Geometry | Full version of a paper to appear in FOCS 2008 | null | null | null | cs.DS cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamic connectivity is a well-studied problem, but so far the most
compelling progress has been confined to the edge-update model: maintain an
understanding of connectivity in an undirected graph, subject to edge
insertions and deletions. In this paper, we study two more challenging, yet
equally fundamental problems.
Subgraph connectivity asks to maintain an understanding of connectivity under
vertex updates: updates can turn vertices on and off, and queries refer to the
subgraph induced by "on" vertices. (For instance, this is closer to
applications in networks of routers, where node faults may occur.)
We describe a data structure supporting vertex updates in O (m^{2/3})
amortized time, where m denotes the number of edges in the graph. This greatly
improves over the previous result [Chan, STOC'02], which required fast matrix
multiplication and had an update time of O(m^0.94). The new data structure is
also simpler.
Geometric connectivity asks to maintain a dynamic set of n geometric objects,
and query connectivity in their intersection graph. (For instance, the
intersection graph of balls describes connectivity in a network of sensors with
bounded transmission radius.)
Previously, nontrivial fully dynamic results were known only for special
cases like axis-parallel line segments and rectangles. We provide similarly
improved update times, O (n^{2/3}), for these special cases. Moreover, we show
how to obtain sublinear update bounds for virtually all families of geometric
objects which allow sublinear-time range queries, such as arbitrary 2D line
segments, d-dimensional simplices, and d-dimensional balls.
| [
{
"version": "v1",
"created": "Thu, 7 Aug 2008 22:16:15 GMT"
}
]
| 2008-08-11T00:00:00 | [
[
"Chan",
"Timothy M.",
""
],
[
"Patrascu",
"Mihai",
""
],
[
"Roditty",
"Liam",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0808.1207 | Dirk Bradler | Dirk Bradler and Jussi Kangasharju and Max Muehlhaeuser | Optimally Efficient Prefix Search and Multicast in Structured P2P
Networks | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Searching in P2P networks is fundamental to all overlay networks.
P2P networks based on Distributed Hash Tables (DHT) are optimized for single
key lookups, whereas unstructured networks offer more complex queries at the
cost of increased traffic and uncertain success rates. Our Distributed Tree
Construction (DTC) approach enables structured P2P networks to perform prefix
search, range queries, and multicast in an optimal way. It achieves this by
creating a spanning tree over the peers in the search area, using only
information available locally on each peer. Because DTC creates a spanning
tree, it can query all the peers in the search area with a minimal number of
messages. Furthermore, we show that the tree depth has the same upper bound as
a regular DHT lookup which in turn guarantees fast and responsive runtime
behavior. By placing objects with a region quadtree, we can perform a prefix
search or a range query in a freely selectable area of the DHT. Our DTC
algorithm is DHT-agnostic and works with most existing DHTs. We evaluate the
performance of DTC over several DHTs by comparing the performance to existing
application-level multicast solutions, we show that DTC sends 30-250% fewer
messages than common solutions.
| [
{
"version": "v1",
"created": "Fri, 8 Aug 2008 13:03:44 GMT"
}
]
| 2008-08-11T00:00:00 | [
[
"Bradler",
"Dirk",
""
],
[
"Kangasharju",
"Jussi",
""
],
[
"Muehlhaeuser",
"Max",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.1211 | W Saba | Walid S. Saba | Commonsense Knowledge, Ontology and Ordinary Language | To appear in Int. J. Reasoning-based Intelligent Systems | null | null | null | cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Over two decades ago a "quite revolution" overwhelmingly replaced
knowledgebased approaches in natural language processing (NLP) by quantitative
(e.g., statistical, corpus-based, machine learning) methods. Although it is our
firm belief that purely quantitative approaches cannot be the only paradigm for
NLP, dissatisfaction with purely engineering approaches to the construction of
large knowledge bases for NLP are somewhat justified. In this paper we hope to
demonstrate that both trends are partly misguided and that the time has come to
enrich logical semantics with an ontological structure that reflects our
commonsense view of the world and the way we talk about in ordinary language.
In this paper it will be demonstrated that assuming such an ontological
structure a number of challenges in the semantics of natural language (e.g.,
metonymy, intensionality, copredication, nominal compounds, etc.) can be
properly and uniformly addressed.
| [
{
"version": "v1",
"created": "Fri, 8 Aug 2008 14:37:45 GMT"
}
]
| 2008-08-11T00:00:00 | [
[
"Saba",
"Walid S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0808.1215 | Joseph Y. Halpern | Joseph Y. Halpern and Vicky Weissman | A Formal Foundation for XrML | null | null | null | null | cs.CR cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | XrML is becoming a popular language in industry for writing software
licenses. The semantics for XrML is implicitly given by an algorithm that
determines if a permission follows from a set of licenses. We focus on a
fragment of the language and use it to highlight some problematic aspects of
the algorithm. We then correct the problems, introduce formal semantics, and
show that our semantics captures the (corrected) algorithm. Next, we consider
the complexity of determining if a permission is implied by a set of XrML
licenses. We prove that the general problem is undecidable, but it is
polynomial-time computable for an expressive fragment of the language. We
extend XrML to capture a wider range of licenses by adding negation to the
language. Finally, we discuss the key differences between XrML and MPEG-21, an
international standard based on XrML.
| [
{
"version": "v1",
"created": "Fri, 8 Aug 2008 16:25:58 GMT"
}
]
| 2008-08-11T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Weissman",
"Vicky",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0808.1246 | Mugurel Ionut Andreica | Mugurel Ionut Andreica, Romulus Andreica, Angela Andreica | Minimum Dissatisfaction Personnel Scheduling | Some of the algorithmic techniques presented in this paper were later
used by the first author for developing solutions to several algorithmic
contest tasks (see the attached zip archive for some examples) | ARA Congress, Boston : United States (2008) | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider two problems regarding the scheduling of available
personnel in order to perform a given quantity of work, which can be
arbitrarily decomposed into a sequence of activities. We are interested in
schedules which minimize the overall dissatisfaction, where each employee's
dissatisfaction is modeled as a time-dependent linear function. For the two
situations considered we provide a detailed mathematical analysis, as well as
efficient algorithms for determining optimal schedules.
| [
{
"version": "v1",
"created": "Fri, 8 Aug 2008 17:15:34 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Jan 2013 17:26:48 GMT"
}
]
| 2013-01-22T00:00:00 | [
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Andreica",
"Romulus",
""
],
[
"Andreica",
"Angela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.1247 | Damien Chablat | S\'ebastien Briot (DGMA), Ilian Bonev (GPA), Damien Chablat (IRCCyN),
Philippe Wenger (IRCCyN), Vigen Arakelian (DGMA) | Self-Motions of General 3-RPR Planar Parallel Robots | null | International Journal of Robotics Research 27, 7 (2008) pp.
855-866 | 10.1177/0278364908092466 | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the kinematic geometry of general 3-RPR planar parallel
robots with actuated base joints. These robots, while largely overlooked, have
simple direct kinematics and large singularity-free workspace. Furthermore,
their kinematic geometry is the same as that of a newly developed parallel
robot with SCARA-type motions. Starting from the direct and inverse kinematic
model, the expressions for the singularity loci of 3-RPR planar parallel robots
are determined. Then, the global behaviour at all singularities is
geometrically described by studying the degeneracy of the direct kinematic
model. Special cases of self-motions are then examined and the degree of
freedom gained in such special configurations is kinematically interpreted.
Finally, a practical example is discussed and experimental validations
performed on an actual robot prototype are presented.
| [
{
"version": "v1",
"created": "Fri, 8 Aug 2008 17:17:23 GMT"
}
]
| 2008-08-11T00:00:00 | [
[
"Briot",
"Sébastien",
"",
"DGMA"
],
[
"Bonev",
"Ilian",
"",
"GPA"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Arakelian",
"Vigen",
"",
"DGMA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0808.1343 | Holger Kienle | Holger M. Kienle, Andreas Lober, Hausi A. M\"uller | Policy and Legal Challenges of Virtual Worlds and Social Network Sites | 5 pages, 1 table, First International Workshop on Requirements
Engineering and Law (RELAW 2008), Barcelona, Spain.
http://www4.ncsu.edu/~tdbreaux/relaw/ | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses policy challenges of complex virtual environments such
as virtual worlds, social network sites, and massive multiplayer online games.
The complexity of these environments--apparent by the rich user interactions
and sophisticated user-generated content that they offer--poses unique
challenges for policy management and compliance. These challenges are also
impacting the life cycle of the software system that implements the virtual
environment. The goal of this paper is to identify and sketch important legal
and policy challenges of virtual environments and how they affect stakeholders
(i.e., operators, users, and lawmakers). Given the increasing significance of
virtual environments, we expect that tackling these challenges will become
increasingly important in the future.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2008 10:15:38 GMT"
}
]
| 2008-08-12T00:00:00 | [
[
"Kienle",
"Holger M.",
""
],
[
"Lober",
"Andreas",
""
],
[
"Müller",
"Hausi A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0808.1354 | Mehrnoosh Sadrzadeh | Mehrnoosh Sadrzadeh | Ockham's razor and reasoning about information flow | 15 pages | null | null | null | math.LO cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | What is the minimal algebraic structure to reason about information flow? Do
we really need the full power of Boolean algebras with co-closure and de Morgan
dual operators? How much can we weaken and still be able to reason about
multi-agent scenarios in a tidy compositional way? This paper provides some
answers.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2008 13:51:44 GMT"
}
]
| 2008-08-12T00:00:00 | [
[
"Sadrzadeh",
"Mehrnoosh",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0808.1364 | Than Quang Khoat | Th\^an Quang Kho\'at | On Bounded Integer Programming | The preliminary version of this paper appeared in Proceedings of the
2008 IEEE International Conference on Research, Innovation & Vision for the
Future - RIVF, July 2008, pages 23-28, Ho Chi Minh city, Vietnam, entitled
"On the Bounded Integer Programming" | null | null | null | cs.CC cs.DM | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We present an efficient reduction from the Bounded integer programming (BIP)
to the Subspace avoiding problem (SAP) in lattice theory. The reduction has
some special properties with some interesting consequences. The first is the
new upper time bound for BIP, $poly(\varphi)\cdot n^{n+o(n)}$ (where $n$ and
$\varphi$ are the dimension and the input size of the problem, respectively).
This is the best bound up to now for BIP. The second consequence is the proof
that #SAP, for some norms, is #P-hard under semi-reductions. It follows that
the counting version of the Generalized closest vector problem is also #P-hard
under semi-reductions. Furthermore, we also show that under some reasonable
assumptions, BIP is solvable in probabilistic time $2^{O(n)}$.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2008 17:04:44 GMT"
}
]
| 2008-08-12T00:00:00 | [
[
"Khoát",
"Thân Quang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0808.1368 | Shamgar Gurevich | Shamgar Gurevich (UC Berkeley), Ronny Hadani (University of Chicago),
Nir Sochen (Tel Aviv University) | On some deterministic dictionaries supporting sparsity | Accepted for publication in the special issue on sparsity (Editors:
Albert Cohen, Ronald DeVore, Michael Elad, Anna Gilbert) of the Journal of
Fourier Analysis and Applications (2008). Key words: Sparsity, deterministic
dictionaries, low coherence, Weil representation, commutative subgroups,
eigenfunctions, explicit algorithm | Special issue on sparsity, the Journal of Fourier Analysis and
Applications, Vol. 14, 859-876, Dec. 2008 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a new construction of an incoherent dictionary, referred to as
the oscillator dictionary, which is based on considerations in the
representation theory of finite groups. The oscillator dictionary consists of
order of p^5 unit vectors in a Hilbert space of dimension p, where p is an odd
prime, whose pairwise inner products have magnitude of at most 4/sqrt(p). An
explicit algorithm to construct a large portion of the oscillator dictionary is
presented.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2008 17:28:44 GMT"
},
{
"version": "v2",
"created": "Sat, 27 Dec 2008 08:11:55 GMT"
}
]
| 2008-12-30T00:00:00 | [
[
"Gurevich",
"Shamgar",
"",
"UC Berkeley"
],
[
"Hadani",
"Ronny",
"",
"University of Chicago"
],
[
"Sochen",
"Nir",
"",
"Tel Aviv University"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.1378 | George Eskander MSc | George S. Eskander, and Amir F. Atiya | A Novel Symbolic Type Neural Network Model- Application to River Flow
Forecasting | Published in ICENCO2007, Cairo, December 2007 | null | null | null | cs.NE cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce a new symbolic type neural tree network called
symbolic function network (SFN) that is based on using elementary functions to
model systems in a symbolic form. The proposed formulation permits feature
selection, functional selection, and flexible structure. We applied this model
on the River Flow forecasting problem. The results found to be superior in both
fitness and sparsity.
| [
{
"version": "v1",
"created": "Sat, 9 Aug 2008 22:05:48 GMT"
}
]
| 2008-08-12T00:00:00 | [
[
"Eskander",
"George S.",
""
],
[
"Atiya",
"Amir F.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0808.1400 | Smarajit Das | Smarajit Das, B. Sundar Rajan | A Class of Maximal-Rate, Low-PAPR, Non-square Complex Orthogonal Designs | Submitted to IEEE Transactions on Wireless Communication, 25 pages, 5
figures, 1 table | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Space-time block codes (STBCs) from non-square complex orthogonal designs are
bandwidth efficient when compared with those from square real/complex
orthogonal designs. Though there exists rate-1 ROD for any number of transmit
antennas, rate-1 complex orthogonal designs (COD) does not exist for more than
2 transmit antennas. Liang (IEEE Trans. Inform. Theory, 2003) and Lu et al
(IEEE Trans. Inform. Theory, 2005) have constructed a class of maximal rate
non-square CODs where the rate is ${1/2}+\frac{1}{n}$ if number of transmit
antennas $n$ is even and ${1/2}+\frac{1}{n+1}$ if $n$ is odd. In this paper, we
present a simple construction for maximal rate non-square CODs obtained from
square CODs which resembles the construction of rate-1 non-square RODs from
square RODs. These designs are shown to be amenable for construction of a class
of generalized CODs (called Coordinate-Interleaved Scaled CODs) with low
peak-to-average power ratio (PAPR) having the same parameters as the maximal
rate codes. Simulation results indicate that these codes perform better than
the existing maximal rate codes under peak power constraint while performing
the same under average power constraint.
| [
{
"version": "v1",
"created": "Sun, 10 Aug 2008 18:50:31 GMT"
}
]
| 2008-08-12T00:00:00 | [
[
"Das",
"Smarajit",
""
],
[
"Rajan",
"B. Sundar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.1410 | Ali Aboutalebi | H. B. Bahar, Ali Aboutalebi | Image Steganography, a New Approach for Transferring Security
Information | 7 pages, 3 figures | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Steganography is the art of hiding the fact that communication is taking
place, by hiding information in other information. Many different carrier file
formats can be used, but digital images are the most popular because of their
frequency on the Internet. For hiding secret information in images, there
exists a large variety of steganographic techniques some are more complex than
others and all of them have respective strong and weak points. Different
applications have different requirements of the steganography technique used.
For example, some applications may require absolute invisibility of the secret
information, while others require a larger secret message to be hidden. This
paper intends to give an overview of image steganography, its uses and
techniques. It also attempts to identify the requirements of a good
steganographic algorithm and briefly reflects on which steganographic
techniques are more suitable for which applications.
| [
{
"version": "v1",
"created": "Sun, 10 Aug 2008 15:07:15 GMT"
}
]
| 2008-08-12T00:00:00 | [
[
"Bahar",
"H. B.",
""
],
[
"Aboutalebi",
"Ali",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0808.1417 | Shamgar Gurevich | Shamgar Gurevich, Ronny Hadani, Nir Sochen | The finite harmonic oscillator and its associated sequences | Published in the Proceedings of the National Academy of Sciences of
the United States of America (Communicated by Joseph Bernstein, Tel Aviv
University, Tel Aviv, Israel) | PNAS, July 22, 2008 vol. 105 no. 29 9869-9873
http://www.pnas.org/content/105/29/9869.abstract | 10.1073/pnas.0801656105 | null | cs.IT cs.CR cs.DM math-ph math.GR math.IT math.MP math.NT math.PR math.QA math.RT math.SG quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A system of functions (signals) on the finite line, called the oscillator
system, is described and studied. Applications of this system for discrete
radar and digital communication theory are explained.
Keywords: Weil representation, commutative subgroups, eigenfunctions, random
behavior, deterministic construction
| [
{
"version": "v1",
"created": "Sun, 10 Aug 2008 17:49:20 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Dec 2008 08:10:33 GMT"
}
]
| 2022-06-08T00:00:00 | [
[
"Gurevich",
"Shamgar",
""
],
[
"Hadani",
"Ronny",
""
],
[
"Sochen",
"Nir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.QA",
"description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory",
"span": "(Quantum Algebra)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
},
{
"class": "Mathematics",
"code": "math.SG",
"description": "Hamiltonian systems, symplectic flows, classical integrable systems",
"span": "(Symplectic Geometry)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0808.1431 | Neil J. Gunther | Neil J. Gunther | A General Theory of Computational Scalability Based on Rational
Functions | 14 pages, 5 figures; several typos corrected, 1 reference updated,
page number reduced with 10 pt font | null | null | null | cs.PF cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The universal scalability law of computational capacity is a rational
function C_p = P(p)/Q(p) with P(p) a linear polynomial and Q(p) a second-degree
polynomial in the number of physical processors p, that has been long used for
statistical modeling and prediction of computer system performance. We prove
that C_p is equivalent to the synchronous throughput bound for a
machine-repairman with state-dependent service rate. Simpler rational
functions, such as Amdahl's law and Gustafson speedup, are corollaries of this
queue-theoretic bound. C_p is further shown to be both necessary and sufficient
for modeling all practical characteristics of computational scalability.
| [
{
"version": "v1",
"created": "Mon, 11 Aug 2008 00:06:16 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Aug 2008 16:20:42 GMT"
}
]
| 2008-08-25T00:00:00 | [
[
"Gunther",
"Neil J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.1455 | Ian Oliver | Ian Oliver and Jukka Honkola | Personal Semantic Web Through A Space Based Computing Environment | 14 pages, 6 figures. In proceedings: Middleware for the Semantic Web,
Seconds IEEE Interntional Conference on Semantic Computing, Santa Clara, CA,
USA, August 4-7, 2008 | null | null | null | cs.NI cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Semantic Web through technologies such to support the canonical
representation information and presenting it to users in a method by which its
meaning can be understood or at least communi- cated and interpreted by all
parties. As the Semantic Web evolves into more of a computing platform rather
than an information platform more dynamic structures, interactions and
behaviours will evolve leading to systems which localise and personalise this
Dynamic Semantic Web.
| [
{
"version": "v1",
"created": "Mon, 11 Aug 2008 07:13:43 GMT"
}
]
| 2008-08-12T00:00:00 | [
[
"Oliver",
"Ian",
""
],
[
"Honkola",
"Jukka",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0808.1470 | Sudhakar Sahoo | Sudhakar Sahoo, Sanjaya Sahoo, Birendra Kumar Nayak and Pabitra Pal
Choudhury | Encompression Using Two-dimensional Cellular Automata Rules | 5 pages, 4 figures | null | null | null | cs.DM cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we analyze the algebraic structure of some null boundary as
well as some periodic boundary 2-D Cellular Automata (CA) rules by introducing
a new matrix multiplication operation using only AND, OR instead of most
commonly used AND, EX-OR. This class includes any CA whose rule, when written
as an algebra, is a finite Abelean cyclic group in case of periodic boundary
and a finite commutative cyclic monoid in case of null boundary CA
respectively. The concept of 1-D Multiple Attractor Cellular Automata (MACA) is
extended to 2-D. Using the family of 2-D MACA and the finite Abelian cyclic
group, an efficient encompression algorithm is proposed for binary images.
| [
{
"version": "v1",
"created": "Mon, 11 Aug 2008 09:11:44 GMT"
}
]
| 2008-08-12T00:00:00 | [
[
"Sahoo",
"Sudhakar",
""
],
[
"Sahoo",
"Sanjaya",
""
],
[
"Nayak",
"Birendra Kumar",
""
],
[
"Choudhury",
"Pabitra Pal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0808.1495 | Shamgar Gurevich | Shamgar Gurevich, Ronny Hadani, Nir Sochen | The finite harmonic oscillator and its applications to sequences,
communication and radar | Accepted for publication in IEEE Transactions on Information Theory
(Communicated by Guang Gong, Department of Electrical and Computer
Engineering, University of Waterloo, Waterloo, Ontario, CANADA) | IEEE Transactions on Information Theory, vol. 54, no. 9, September
2008 | 10.1109/TIT.2008.926440 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A novel system, called the oscillator system, consisting of order of p^3
functions (signals) on the finite field F_p; with p an odd prime, is described
and studied. The new functions are proved to satisfy good auto-correlation,
cross-correlation and low peak-to-average power ratio properties. Moreover, the
oscillator system is closed under the operation of discrete Fourier transform.
Applications of the oscillator system for discrete radar and digital
communication theory are explained. Finally, an explicit algorithm to construct
the oscillator system is presented.
| [
{
"version": "v1",
"created": "Mon, 11 Aug 2008 16:50:00 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Dec 2008 07:41:28 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Gurevich",
"Shamgar",
""
],
[
"Hadani",
"Ronny",
""
],
[
"Sochen",
"Nir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.1505 | Joseph Y. Halpern | Ittai Abraham, Danny Dolev, and Joseph Y. Halpern | An Almost-Surely Terminating Polynomial Protocol for Asynchronous
Byzantine Agreement with Optimal Resilience | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider an asynchronous system with private channels and $n$ processes, up
to $t$ of which may be faulty. We settle a longstanding open question by
providing a Byzantine agreement protocol that simultaneously achieves three
properties:
1. (optimal) resilience: it works as long as $n>3t$
2. (almost-sure) termination: with probability one, all nonfaulty processes
terminate
3. (polynomial) efficiency: the expected computation time, memory
consumption, message size, and number of messages sent are all polynomial in
$n$.
Earlier protocols have achieved only two of these three properties. In
particular, the protocol of Bracha is not polynomially efficient, the protocol
of Feldman and Micali is not optimally resilient, and the protocol of Canetti
and Rabin does not have almost-sure termination. Our protocol utilizes a new
primitive called shunning (asynchronous) verifiable secret sharing (SVSS),
which ensures, roughly speaking, that either a secret is successfully shared or
a new faulty process is ignored from this point onwards by some nonfaulty
process.
| [
{
"version": "v1",
"created": "Mon, 11 Aug 2008 12:22:12 GMT"
}
]
| 2008-08-12T00:00:00 | [
[
"Abraham",
"Ittai",
""
],
[
"Dolev",
"Danny",
""
],
[
"Halpern",
"Joseph Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.1508 | Michel Rueher | H\'el\`ene Collavizza (I3S), Michel Rueher (I3S), Pascal Van
Hentenryck (Brown University) | Comparison between CPBPV, ESC/Java, CBMC, Blast, EUREKA and Why for
Bounded Program Verification | null | null | null | null | cs.SE cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This report describes experimental results for a set of benchmarks on program
verification. It compares the capabilities of CPBVP "Constraint Programming
framework for Bounded Program Verification" [4] with the following frameworks:
ESC/Java, CBMC, Blast, EUREKA and Why.
| [
{
"version": "v1",
"created": "Mon, 11 Aug 2008 12:55:19 GMT"
}
]
| 2008-08-12T00:00:00 | [
[
"Collavizza",
"Hélène",
"",
"I3S"
],
[
"Rueher",
"Michel",
"",
"I3S"
],
[
"Van Hentenryck",
"Pascal",
"",
"Brown University"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0808.1549 | Allon G. Percus | Allon G. Percus, Gabriel Istrate, Bruno Goncalves, Robert Z. Sumi and
Stefan Boettcher | The Peculiar Phase Structure of Random Graph Bisection | substantially revised section 2, changed figures 3, 4 and 6, made
minor stylistic changes and added references | J. Math. Phys. 49, 125219 (2008) | 10.1063/1.3043666 | LA-UR 08-5099 | cond-mat.stat-mech cond-mat.dis-nn cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The mincut graph bisection problem involves partitioning the n vertices of a
graph into disjoint subsets, each containing exactly n/2 vertices, while
minimizing the number of "cut" edges with an endpoint in each subset. When
considered over sparse random graphs, the phase structure of the graph
bisection problem displays certain familiar properties, but also some
surprises. It is known that when the mean degree is below the critical value of
2 log 2, the cutsize is zero with high probability. We study how the minimum
cutsize increases with mean degree above this critical threshold, finding a new
analytical upper bound that improves considerably upon previous bounds.
Combined with recent results on expander graphs, our bound suggests the unusual
scenario that random graph bisection is replica symmetric up to and beyond the
critical threshold, with a replica symmetry breaking transition possibly taking
place above the threshold. An intriguing algorithmic consequence is that
although the problem is NP-hard, we can find near-optimal cutsizes (whose ratio
to the optimal value approaches 1 asymptotically) in polynomial time for
typical instances near the phase transition.
| [
{
"version": "v1",
"created": "Mon, 11 Aug 2008 17:59:02 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Nov 2008 01:52:50 GMT"
}
]
| 2010-04-27T00:00:00 | [
[
"Percus",
"Allon G.",
""
],
[
"Istrate",
"Gabriel",
""
],
[
"Goncalves",
"Bruno",
""
],
[
"Sumi",
"Robert Z.",
""
],
[
"Boettcher",
"Stefan",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0808.1599 | Jeong Han Kim | Jeong Han Kim | Finding cores of random 2-SAT formulae via Poisson cloning | null | null | null | null | math.CO cs.CC math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For the random 2-SAT formula $F(n,p)$, let $F_C (n,p)$ be the formula left
after the pure literal algorithm applied to $F(n,p)$ stops. Using the recently
developed Poisson cloning model together with the cut-off line algorithm
(COLA), we completely analyze the structure of $F_{C} (n,p)$. In particular, it
is shown that, for $\gl:= p(2n-1) = 1+\gs $ with $\gs\gg n^{-1/3}$, the core of
$F(n,p)$ has $\thl^2 n +O((\thl n)^{1/2})$ variables and $\thl^2 \gl n+O((\thl
n))^{1/2}$ clauses, with high probability, where $\thl$ is the larger solution
of the equation $\th- (1-e^{-\thl \gl})=0$. We also estimate the probability of
$F(n,p)$ being satisfiable to obtain $$ \pr[ F_2(n, \sfrac{\gl}{2n-1}) is
satisfiable ] = \caseth{1-\frac{1+o(1)}{16\gs^3 n}}{if $\gl= 1-\gs$ with
$\gs\gg n^{-1/3}$}{}{}{e^{-\Theta(\gs^3n)}}{if $\gl=1+\gs$ with $\gs\gg
n^{-1/3}$,} $$ where $o(1)$ goes to 0 as $\gs$ goes to 0. This improves the
bounds of Bollob\'as et al. \cite{BBCKW}.
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2008 00:38:59 GMT"
}
]
| 2008-08-13T00:00:00 | [
[
"Kim",
"Jeong Han",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0808.1641 | Sudhakar Sahoo | Sudhakar Sahoo, Pabitra Pal Choudhury, Mithun Chakraborty | Characterization Of any Non-linear Boolean function Using A Set of
Linear Operators | 12 pages, 4 figures, 2 table. Submitted for possible publication in
the International Journal of Computer Mathematics and Applications, July 2008 | null | null | null | cs.CC nlin.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Global dynamics of a non-linear Cellular Automata is, in general irregular,
asymmetric and unpredictable as opposed to that of a linear CA, which is highly
systematic and tractable. In the past efforts have been made to systematize
non-linear CA evolutions in the light of Boolean derivatives and Jacobian
Matrices. In this paper two different efforts have been made: first we try to
systematize non-linear CA evolution in the light of deviant states and
non-deviant states. For all the non-deviant states the nearest linear rule
matrix is applicable where as for the deviant states we have a set of other
matrices. Second using algebraic manipulation, an efficient algorithm is
proposed by which every Non-linear Boolean function can be characterized by a
sequence of binary matrices.
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2008 11:04:47 GMT"
}
]
| 2008-08-13T00:00:00 | [
[
"Sahoo",
"Sudhakar",
""
],
[
"Choudhury",
"Pabitra Pal",
""
],
[
"Chakraborty",
"Mithun",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
}
]
|
0808.1657 | Jeffrey Shallit | Jean-Paul Allouche, Narad Rampersad, Jeffrey Shallit | Periodicity, repetitions, and orbits of an automatic sequence | preliminary version | null | null | null | cs.DM cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We revisit a technique of S. Lehr on automata and use it to prove old and new
results in a simple way. We give a very simple proof of the 1986 theorem of
Honkala that it is decidable whether a given k-automatic sequence is ultimately
periodic. We prove that it is decidable whether a given k-automatic sequence is
overlap-free (or squareefree, or cubefree, etc.) We prove that the
lexicographically least sequence in the orbit closure of a k-automatic sequence
is k-automatic, and use this last result to show that several related
quantities, such as the critical exponent, irrationality measure, and
recurrence quotient for Sturmian words with slope alpha, have automatic
continued fraction expansions if alpha does.
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2008 13:13:09 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Dec 2008 18:37:58 GMT"
},
{
"version": "v3",
"created": "Fri, 23 Jan 2009 20:16:22 GMT"
}
]
| 2009-04-12T00:00:00 | [
[
"Allouche",
"Jean-Paul",
""
],
[
"Rampersad",
"Narad",
""
],
[
"Shallit",
"Jeffrey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0808.1661 | Jocelyne Troccaz | Jocelyne Troccaz (TIMC) | Medical robotics: where we come from, where we are and where we could go | null | The Industrial Robot 35, 4 (2008) 289 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This short note presents a viewpoint about medical robotics.
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2008 13:21:52 GMT"
}
]
| 2008-08-13T00:00:00 | [
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0808.1671 | Shuchi Chawla | Shuchi Chawla and Jason Hartline and Robert Kleinberg | Algorithmic Pricing via Virtual Valuations | A preliminary version of this work appeared at the ACM EC'07
conference. The current version contains improved results and simpler
algorithms | null | null | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Algorithmic pricing is the computational problem that sellers (e.g., in
supermarkets) face when trying to set prices for their items to maximize their
profit in the presence of a known demand. Guruswami et al. (2005) propose this
problem and give logarithmic approximations (in the number of consumers) when
each consumer's values for bundles are known precisely. Subsequently several
versions of the problem have been shown to have poly-logarithmic
inapproximability. This problem has direct ties to the important open question
of better understanding the Bayesian optimal mechanism in multi-parameter
settings; however, logarithmic approximations are inadequate for this purpose.
It is therefore of vital interest to consider special cases where constant
approximations are possible. We consider the unit-demand variant of this
problem. Here a consumer has a valuation for each different item and their
value for a set of items is simply the maximum value they have for any item in
the set. We assume that the preferences of the consumers are drawn from a
distribution, the standard assumption in economics; furthermore, the setting of
a specific set of customers with known preferences, which is employed in all
prior work in algorithmic pricing, is a special case of this general problem,
where there is a discrete Bayesian distribution for preferences specified by
picking one consumer uniformly from the given set of consumers. Our work
complements these existing works by considering the case where the consumer's
valuations for the different items are independent random variables. Our main
result is a constant approximation that makes use of an interesting connection
between this problem and the concept of virtual valuations from the
single-parameter Bayesian optimal mechanism design literature.
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2008 18:08:21 GMT"
}
]
| 2008-08-13T00:00:00 | [
[
"Chawla",
"Shuchi",
""
],
[
"Hartline",
"Jason",
""
],
[
"Kleinberg",
"Robert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.1721 | Paul Fodor | Paul Fodor | Initial Results on the F-logic to OWL Bi-directional Translation on a
Tabled Prolog Engine | null | null | null | null | cs.AI cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we show our results on the bi-directional data exchange
between the F-logic language supported by the Flora2 system and the OWL
language. Most of the TBox and ABox axioms are translated preserving the
semantics between the two representations, such as: proper inclusion,
individual definition, functional properties, while some axioms and
restrictions require a change in the semantics, such as: numbered and qualified
cardinality restrictions. For the second case, we translate the OWL definite
style inference rules into F-logic style constraints. We also describe a set of
reasoning examples using the above translation, including the reasoning in
Flora2 of a variety of ABox queries.
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2008 19:58:59 GMT"
}
]
| 2008-08-13T00:00:00 | [
[
"Fodor",
"Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0808.1744 | Alex Brodsky | Alex Brodsky and Scott Lindenberg | Our Brothers' Keepers: Secure Routing with High Performance | 11 pages, 4 figures | null | null | null | cs.DC cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Trinity (Brodsky et al., 2007) spam classification system is based on a
distributed hash table that is implemented using a structured peer-to-peer
overlay. Such an overlay must be capable of processing hundreds of messages per
second, and must be able to route messages to their destination even in the
presence of failures and malicious peers that misroute packets or inject
fraudulent routing information into the system. Typically there is tension
between the requirements to route messages securely and efficiently in the
overlay.
We describe a secure and efficient routing extension that we developed within
the I3 (Stoica et al. 2004) implementation of the Chord (Stoica et al. 2001)
overlay. Secure routing is accomplished through several complementary
approaches: First, peers in close proximity form overlapping groups that police
themselves to identify and mitigate fraudulent routing information. Second, a
form of random routing solves the problem of entire packet flows passing
through a malicious peer. Third, a message authentication mechanism links each
message to it sender, preventing spoofing. Fourth, each peer's identifier links
the peer to its network address, and at the same time uniformly distributes the
peers in the key-space.
Lastly, we present our initial evaluation of the system, comprising a 255
peer overlay running on a local cluster. We describe our methodology and show
that the overhead of our secure implementation is quite reasonable.
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2008 22:03:52 GMT"
}
]
| 2008-08-14T00:00:00 | [
[
"Brodsky",
"Alex",
""
],
[
"Lindenberg",
"Scott",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.1753 | Andrew Krizhanovsky A | A. A. Krizhanovsky | Index wiki database: design and experiments | 18 pages, 4 tables, 4 figures; FLINS'08, Corpus Linguistics'08,
AIS/CAD'08; v2: table 3 changed | null | null | null | cs.IR cs.CL | http://creativecommons.org/licenses/publicdomain/ | With the fantastic growth of Internet usage, information search in documents
of a special type called a "wiki page" that is written using a simple markup
language, has become an important problem. This paper describes the software
architectural model for indexing wiki texts in three languages (Russian,
English, and German) and the interaction between the software components (GATE,
Lemmatizer, and Synarcher). The inverted file index database was designed using
visual tool DBDesigner. The rules for parsing Wikipedia texts are illustrated
by examples. Two index databases of Russian Wikipedia (RW) and Simple English
Wikipedia (SEW) are built and compared. The size of RW is by order of magnitude
higher than SEW (number of words, lexemes), though the growth rate of number of
pages in SEW was found to be 14% higher than in Russian, and the rate of
acquisition of new words in SEW lexicon was 7% higher during a period of five
months (from September 2007 to February 2008). The Zipf's law was tested with
both Russian and Simple Wikipedias. The entire source code of the indexing
software and the generated index databases are freely available under GPL (GNU
General Public License).
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2008 23:47:21 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Sep 2008 15:41:44 GMT"
}
]
| 2008-09-23T00:00:00 | [
[
"Krizhanovsky",
"A. A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0808.1762 | Zhiqiang Zhang | Yaoyun Shi, Zhiqiang Zhang | Communication Complexities of XOR functions | 9 pages | null | null | null | quant-ph cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We call $F:\{0, 1\}^n\times \{0, 1\}^n\to\{0, 1\}$ a symmetric XOR function
if for a function $S:\{0, 1, ..., n\}\to\{0, 1\}$, $F(x, y)=S(|x\oplus y|)$,
for any $x, y\in\{0, 1\}^n$, where $|x\oplus y|$ is the Hamming weight of the
bit-wise XOR of $x$ and $y$.
We show that for any such function, (a) the deterministic communication
complexity is always $\Theta(n)$ except for four simple functions that have a
constant complexity, and (b) up to a polylog factor, the error-bounded
randomized and quantum communication complexities are $\Theta(r_0+r_1)$, where
$r_0$ and $r_1$ are the minimum integers such that $r_0, r_1\leq n/2$ and
$S(k)=S(k+2)$ for all $k\in[r_0, n-r_1)$.
| [
{
"version": "v1",
"created": "Wed, 13 Aug 2008 00:48:36 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Aug 2008 01:35:17 GMT"
}
]
| 2008-08-20T00:00:00 | [
[
"Shi",
"Yaoyun",
""
],
[
"Zhang",
"Zhiqiang",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0808.1766 | Ping Li | Ping Li | The Optimal Quantile Estimator for Compressed Counting | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressed Counting (CC) was recently proposed for very efficiently computing
the (approximate) $\alpha$th frequency moments of data streams, where $0<\alpha
<= 2$. Several estimators were reported including the geometric mean estimator,
the harmonic mean estimator, the optimal power estimator, etc. The geometric
mean estimator is particularly interesting for theoretical purposes. For
example, when $\alpha -> 1$, the complexity of CC (using the geometric mean
estimator) is $O(1/\epsilon)$, breaking the well-known large-deviation bound
$O(1/\epsilon^2)$. The case $\alpha\approx 1$ has important applications, for
example, computing entropy of data streams.
For practical purposes, this study proposes the optimal quantile estimator.
Compared with previous estimators, this estimator is computationally more
efficient and is also more accurate when $\alpha> 1$.
| [
{
"version": "v1",
"created": "Wed, 13 Aug 2008 01:38:45 GMT"
}
]
| 2008-08-14T00:00:00 | [
[
"Li",
"Ping",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.1771 | Ping Li | Ping Li | A Very Efficient Scheme for Estimating Entropy of Data Streams Using
Compressed Counting | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressed Counting (CC)} was recently proposed for approximating the
$\alpha$th frequency moments of data streams, for $0<\alpha \leq 2$. Under the
relaxed strict-Turnstile model, CC dramatically improves the standard algorithm
based on symmetric stable random projections}, especially as $\alpha\to 1$. A
direct application of CC is to estimate the entropy, which is an important
summary statistic in Web/network measurement and often serves a crucial
"feature" for data mining. The R\'enyi entropy and the Tsallis entropy are
functions of the $\alpha$th frequency moments; and both approach the Shannon
entropy as $\alpha\to 1$. A recent theoretical work suggested using the
$\alpha$th frequency moment to approximate the Shannon entropy with
$\alpha=1+\delta$ and very small $|\delta|$ (e.g., $<10^{-4}$).
In this study, we experiment using CC to estimate frequency moments, R\'enyi
entropy, Tsallis entropy, and Shannon entropy, on real Web crawl data. We
demonstrate the variance-bias trade-off in estimating Shannon entropy and
provide practical recommendations. In particular, our experiments enable us to
draw some important conclusions:
(1) As $\alpha\to 1$, CC dramatically improves {\em symmetric stable random
projections} in estimating frequency moments, R\'enyi entropy, Tsallis entropy,
and Shannon entropy. The improvements appear to approach "infinity."
(2) Using {\em symmetric stable random projections} and $\alpha = 1+\delta$
with very small $|\delta|$ does not provide a practical algorithm because the
required sample size is enormous.
| [
{
"version": "v1",
"created": "Wed, 13 Aug 2008 03:05:33 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Aug 2008 17:36:19 GMT"
}
]
| 2008-08-21T00:00:00 | [
[
"Li",
"Ping",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.1787 | Arnab Bhattacharyya | Arnab Bhattacharyya, Elena Grigorescu, Kyomin Jung, Sofya
Raskhodnikova, David P. Woodruff | Transitive-Closure Spanners | Extended abstract with appendices | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a directed graph G = (V,E) and an integer k>=1, a
k-transitive-closure-spanner (k-TC-spanner) of G is a directed graph H = (V,
E_H) that has (1) the same transitive-closure as G and (2) diameter at most k.
These spanners were implicitly studied in access control, data structures, and
property testing, and properties of these spanners have been rediscovered over
the span of 20 years. The main goal in each of these applications is to obtain
the sparsest k-TC-spanners. We bring these diverse areas under the unifying
framework of TC-spanners.
We initiate the study of approximability of the size of the sparsest
k-TC-spanner for a given directed graph. We completely resolve the
approximability of 2-TC-spanners, showing that it is Theta(log n) unless P =
NP. For k>2, we present a polynomial-time algorithm that finds a k-TC-spanner
with size within O((n log n)^{1-1/k}) of the optimum. Our algorithmic
techniques also yield algorithms with the best-known approximation ratio for
well-studied problems on directed spanners when k>3: DIRECTED k-SPANNER,
CLIENT/SERVER DIRECTED k-SPANNER, and k-DIAMETER SPANNING SUBGRAPH. For
constant k>=3, we show that the size of the sparsest k-TC-spanner is hard to
approximate with 2^{log^{1-eps} n} ratio unless NP \subseteq DTIME(n^{polylog
n}}). Finally, we study the size of the sparsest k-TC-spanners for H-minor-free
graph families. Combining our constructions with our insight that 2-TC-spanners
can be used for designing property testers, we obtain a monotonicity tester
with O(log^2 n /eps) queries for any poset whose transitive reduction is an
H-minor free digraph, improving the Theta(sqrt(n) log n/eps)-queries required
of the tester due to Fischer et al (2002).
| [
{
"version": "v1",
"created": "Wed, 13 Aug 2008 06:44:10 GMT"
}
]
| 2008-08-14T00:00:00 | [
[
"Bhattacharyya",
"Arnab",
""
],
[
"Grigorescu",
"Elena",
""
],
[
"Jung",
"Kyomin",
""
],
[
"Raskhodnikova",
"Sofya",
""
],
[
"Woodruff",
"David P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0808.1802 | Robert Grossman | Robert L. Grossman, Yunhong Gu, Michael Sabala and Wanzhi Zhang | Compute and Storage Clouds Using Wide Area High Performance Networks | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a cloud based infrastructure that we have developed that is
optimized for wide area, high performance networks and designed to support data
mining applications. The infrastructure consists of a storage cloud called
Sector and a compute cloud called Sphere. We describe two applications that we
have built using the cloud and some experimental studies.
| [
{
"version": "v1",
"created": "Wed, 13 Aug 2008 09:48:37 GMT"
}
]
| 2008-08-14T00:00:00 | [
[
"Grossman",
"Robert L.",
""
],
[
"Gu",
"Yunhong",
""
],
[
"Sabala",
"Michael",
""
],
[
"Zhang",
"Wanzhi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.1928 | Jeffrey Shallit | Janusz Brzozowski, Jeffrey Shallit, and Zhi Xu | Decision Problems For Convex Languages | preliminary version. This version corrected one typo in Section
2.1.1, line 4 | Proc. LATA 2009 Conference, LNICS #5457, pp. 247-258 | 10.1007/978-3-642-00982-2_21 | null | cs.CC cs.DM cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we examine decision problems associated with various classes of
convex languages, studied by Ang and Brzozowski (under the name "continuous
languages"). We show that we can decide whether a given language L is prefix-,
suffix-, factor-, or subword-convex in polynomial time if L is represented by a
DFA, but that the problem is PSPACE-hard if L is represented by an NFA. In the
case that a regular language is not convex, we prove tight upper bounds on the
length of the shortest words demonstrating this fact, in terms of the number of
states of an accepting DFA. Similar results are proved for some subclasses of
convex languages: the prefix-, suffix-, factor-, and subword-closed languages,
and the prefix-, suffix-, factor-, and subword-free languages.
| [
{
"version": "v1",
"created": "Thu, 14 Aug 2008 01:50:07 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Dec 2008 17:15:07 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Brzozowski",
"Janusz",
""
],
[
"Shallit",
"Jeffrey",
""
],
[
"Xu",
"Zhi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0808.2017 | Ittai Abraham | Ittai Abraham, Yair Bartal, and Ofer Neiman | Nearly Tight Low Stretch Spanning Trees | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that any graph $G$ with $n$ points has a distribution $\mathcal{T}$
over spanning trees such that for any edge $(u,v)$ the expected stretch $E_{T
\sim \mathcal{T}}[d_T(u,v)/d_G(u,v)]$ is bounded by $\tilde{O}(\log n)$. Our
result is obtained via a new approach of building ``highways'' between portals
and a new strong diameter probabilistic decomposition theorem.
| [
{
"version": "v1",
"created": "Thu, 14 Aug 2008 15:58:55 GMT"
}
]
| 2008-08-15T00:00:00 | [
[
"Abraham",
"Ittai",
""
],
[
"Bartal",
"Yair",
""
],
[
"Neiman",
"Ofer",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0808.2045 | Grenville Croll | Louise Pryor | Correctness is not enough | 6 Pages, 1 Table, 2 Figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2003 117-122
ISBN 1 86166 199 1 | null | null | cs.SE cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The usual aim of spreadsheet audit is to verify correctness. There are two
problems with this: first, it is often difficult to tell whether the
spreadsheets in question are correct, and second, even if they are, they may
still give the wrong results. These problems are explained in this paper, which
presents the key criteria for judging a spreadsheet and discusses how those
criteria can be achieved
| [
{
"version": "v1",
"created": "Thu, 14 Aug 2008 19:03:10 GMT"
}
]
| 2008-08-15T00:00:00 | [
[
"Pryor",
"Louise",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0808.2059 | Deniz Gunduz | Deniz Gunduz, Andrea Goldsmith, H. Vincent Poor | Diversity-Multiplexing Tradeoffs in MIMO Relay Channels | To appear at IEEE Global Communications Conf. (Globecom), New
Orleans, LA, Nov. 2008 | null | 10.1109/GLOCOM.2008.ECP.194 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A multi-hop relay channel with multiple antenna terminals in a quasi-static
slow fading environment is considered. For both full-duplex and half-duplex
relays the fundamental diversity-multiplexing tradeoff (DMT) is analyzed. It is
shown that, while decode-and-forward (DF) relaying achieves the optimal DMT in
the full-duplex relay scenario, the dynamic decode-and-forward (DDF) protocol
is needed to achieve the optimal DMT if the relay is constrained to half-duplex
operation. For the latter case, static protocols are considered as well, and
the corresponding achievable DMT performance is characterized.
| [
{
"version": "v1",
"created": "Thu, 14 Aug 2008 20:09:51 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Gunduz",
"Deniz",
""
],
[
"Goldsmith",
"Andrea",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2073 | Alexandros Dimakis | A. G. Dimakis, M. J. Wainwright, K. Ramchandran | Lower Bounds on the Rate-Distortion Function of LDGM Codes | 22 Pages, Submitted for publication | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A recent line of work has focused on the use of low-density generator matrix
(LDGM) codes for lossy source coding. In this paper, wedevelop a generic
technique for deriving lower bounds on the rate-distortion functions of binary
linear codes, with particular interest on the effect of bounded degrees. The
underlying ideas can be viewing as the source coding analog of the classical
result of Gallager, providing bounds for channel coding over the binary
symmetric channel using bounded degree LDPC codes. We illustrate this method
for different random ensembles of LDGM codes, including the check-regular
ensemble and bit-check-regular ensembles, by deriving explicit lower bounds on
their rate-distortion performance as a function of the degrees.
| [
{
"version": "v1",
"created": "Fri, 15 Aug 2008 00:19:31 GMT"
}
]
| 2008-08-18T00:00:00 | [
[
"Dimakis",
"A. G.",
""
],
[
"Wainwright",
"M. J.",
""
],
[
"Ramchandran",
"K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2081 | Martin Hoefer | Heiner Ackermann, Petra Berenbrink, Simon Fischer, Martin Hoefer | Concurrent Imitation Dynamics in Congestion Games | 28 pages, 1 figure | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Imitating successful behavior is a natural and frequently applied approach to
trust in when facing scenarios for which we have little or no experience upon
which we can base our decision. In this paper, we consider such behavior in
atomic congestion games. We propose to study concurrent imitation dynamics that
emerge when each player samples another player and possibly imitates this
agents' strategy if the anticipated latency gain is sufficiently large. Our
main focus is on convergence properties. Using a potential function argument,
we show that our dynamics converge in a monotonic fashion to stable states. In
such a state none of the players can improve its latency by imitating somebody
else. As our main result, we show rapid convergence to approximate equilibria.
At an approximate equilibrium only a small fraction of agents sustains a
latency significantly above or below average. In particular, imitation dynamics
behave like fully polynomial time approximation schemes (FPTAS). Fixing all
other parameters, the convergence time depends only in a logarithmic fashion on
the number of agents. Since imitation processes are not innovative they cannot
discover unused strategies. Furthermore, strategies may become extinct with
non-zero probability. For the case of singleton games, we show that the
probability of this event occurring is negligible. Additionally, we prove that
the social cost of a stable state reached by our dynamics is not much worse
than an optimal state in singleton congestion games with linear latency
function. Finally, we discuss how the protocol can be extended such that, in
the long run, dynamics converge to a Nash equilibrium.
| [
{
"version": "v1",
"created": "Fri, 15 Aug 2008 02:45:30 GMT"
},
{
"version": "v2",
"created": "Sat, 4 Oct 2008 01:58:08 GMT"
}
]
| 2008-10-04T00:00:00 | [
[
"Ackermann",
"Heiner",
""
],
[
"Berenbrink",
"Petra",
""
],
[
"Fischer",
"Simon",
""
],
[
"Hoefer",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0808.2083 | Daniel Lemire | Owen Kaser, Daniel Lemire, Kamel Aouiche | Histogram-Aware Sorting for Enhanced Word-Aligned Compression in Bitmap
Indexes | To appear in proceedings of DOLAP 2008 | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bitmap indexes must be compressed to reduce input/output costs and minimize
CPU usage. To accelerate logical operations (AND, OR, XOR) over bitmaps, we use
techniques based on run-length encoding (RLE), such as Word-Aligned Hybrid
(WAH) compression. These techniques are sensitive to the order of the rows: a
simple lexicographical sort can divide the index size by 9 and make indexes
several times faster. We investigate reordering heuristics based on computed
attribute-value histograms. Simply permuting the columns of the table based on
these histograms can increase the sorting efficiency by 40%.
| [
{
"version": "v1",
"created": "Fri, 15 Aug 2008 03:14:55 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Sep 2008 02:54:59 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Jan 2009 15:22:33 GMT"
}
]
| 2009-01-19T00:00:00 | [
[
"Kaser",
"Owen",
""
],
[
"Lemire",
"Daniel",
""
],
[
"Aouiche",
"Kamel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0808.2089 | Jialing Liu | Jialing Liu, Nicola Elia, and Sekhar Tatikonda | Capacity-achieving Feedback Scheme for Gaussian Finite-State Markov
Channels with Channel State Information | Submitted to the IEEE Transactions on Information Theory. 31 pages | null | 10.1109/TIT.2015.2437380 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose capacity-achieving communication schemes for
Gaussian finite-state Markov channels (FSMCs) subject to an average channel
input power constraint, under the assumption that the transmitters can have
access to delayed noiseless output feedback as well as instantaneous or delayed
channel state information (CSI). We show that the proposed schemes reveals
connections between feedback communication and feedback control.
| [
{
"version": "v1",
"created": "Fri, 15 Aug 2008 03:53:57 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Oct 2010 04:03:25 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Liu",
"Jialing",
""
],
[
"Elia",
"Nicola",
""
],
[
"Tatikonda",
"Sekhar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2092 | Hirosuke Yamamoto | Marat V. Burnashev and Hirosuke Yamamoto | On zero-rate error exponent for BSC with noisy feedback | 23 Pages including 4 figures | Problems of Information Transmission, vol. 44, no. 3, pp. 33-49,
2008 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For the information transmission a binary symmetric channel is used. There is
also another noisy binary symmetric channel (feedback channel), and the
transmitter observes without delay all the outputs of the forward channel via
that feedback channel. The transmission of a nonexponential number of messages
(i.e. the transmission rate equals zero) is considered. The achievable decoding
error exponent for such a combination of channels is investigated. It is shown
that if the crossover probability of the feedback channel is less than a
certain positive value, then the achievable error exponent is better than the
similar error exponent of the no-feedback channel.
The transmission method described and the corresponding lower bound for the
error exponent can be strengthened, and also extended to the positive
transmission rates.
| [
{
"version": "v1",
"created": "Fri, 15 Aug 2008 04:57:40 GMT"
}
]
| 2008-08-18T00:00:00 | [
[
"Burnashev",
"Marat V.",
""
],
[
"Yamamoto",
"Hirosuke",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2181 | Kaibin Huang | Kaibin Huang, Vincent K. N. Lau, Yan Chen | Spectrum Sharing Between Cellular and Mobile Ad Hoc Networks:
Transmission-Capacity Trade-Off | 23 pages, 7 figures, submitted for publication | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spectrum sharing between wireless networks improves the efficiency of
spectrum usage, and thereby alleviates spectrum scarcity due to growing demands
for wireless broadband access. To improve the usual underutilization of the
cellular uplink spectrum, this paper studies spectrum sharing between a
cellular uplink and a mobile ad hoc networks. These networks access either all
frequency sub-channels or their disjoint sub-sets, called spectrum underlay and
spectrum overlay, respectively. Given these spectrum sharing methods, the
capacity trade-off between the coexisting networks is analyzed based on the
transmission capacity of a network with Poisson distributed transmitters. This
metric is defined as the maximum density of transmitters subject to an outage
constraint for a given signal-to-interference ratio (SIR). Using tools from
stochastic geometry, the transmission-capacity trade-off between the coexisting
networks is analyzed, where both spectrum overlay and underlay as well as
successive interference cancelation (SIC) are considered. In particular, for
small target outage probability, the transmission capacities of the coexisting
networks are proved to satisfy a linear equation, whose coefficients depend on
the spectrum sharing method and whether SIC is applied. This linear equation
shows that spectrum overlay is more efficient than spectrum underlay.
Furthermore, this result also provides insight into the effects of different
network parameters on transmission capacities, including link diversity gains,
transmission distances, and the base station density. In particular, SIC is
shown to increase transmission capacities of both coexisting networks by a
linear factor, which depends on the interference-power threshold for qualifying
canceled interferers.
| [
{
"version": "v1",
"created": "Fri, 15 Aug 2008 18:35:56 GMT"
},
{
"version": "v2",
"created": "Sat, 16 Aug 2008 07:38:23 GMT"
}
]
| 2008-08-18T00:00:00 | [
[
"Huang",
"Kaibin",
""
],
[
"Lau",
"Vincent K. N.",
""
],
[
"Chen",
"Yan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2220 | Cristian S. Calude | Cristian S. Calude, Nicholas J. Hay | Every Computably Enumerable Random Real Is Provably Computably
Enumerable Random | 28 pages, minor update. Logic Journal of the IGPL, to appear in 2009 | null | null | CDMTCS Research Report 328, 2008 | cs.CC cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that every computably enumerable (c.e.) random real is provable in
Peano Arithmetic (PA) to be c.e. random. A major step in the proof is to show
that the theorem stating that "a real is c.e. and random iff it is the halting
probability of a universal prefix-free Turing machine" can be proven in PA. Our
proof, which is simpler than the standard one, can also be used for the
original theorem.
Our positive result can be contrasted with the case of computable functions,
where not every computable function is provably computable in PA, or even more
interestingly, with the fact that almost all random finite strings are not
provably random in PA.
We also prove two negative results: a) there exists a universal machine whose
universality cannot be proved in PA, b) there exists a universal machine $U$
such that, based on $U$, PA cannot prove the randomness of its halting
probability.
The paper also includes a sharper form of the Kraft-Chaitin Theorem, as well
as a formal proof of this theorem written with the proof assistant Isabelle.
| [
{
"version": "v1",
"created": "Fri, 15 Aug 2008 23:46:48 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Aug 2008 03:33:39 GMT"
},
{
"version": "v3",
"created": "Wed, 10 Sep 2008 16:25:29 GMT"
},
{
"version": "v4",
"created": "Fri, 12 Sep 2008 05:33:16 GMT"
},
{
"version": "v5",
"created": "Sun, 7 Jun 2009 19:50:04 GMT"
}
]
| 2009-06-08T00:00:00 | [
[
"Calude",
"Cristian S.",
""
],
[
"Hay",
"Nicholas J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0808.2222 | Andrew McGregor | Alexandr Andoni, Andrew McGregor, Krzysztof Onak, Rina Panigrahy | Better Bounds for Frequency Moments in Random-Order Streams | 4 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Estimating frequency moments of data streams is a very well studied problem
and tight bounds are known on the amount of space that is necessary and
sufficient when the stream is adversarially ordered. Recently, motivated by
various practical considerations and applications in learning and statistics,
there has been growing interest into studying streams that are randomly
ordered. In the paper we improve the previous lower bounds on the space
required to estimate the frequency moments of a randomly ordered streams.
| [
{
"version": "v1",
"created": "Sat, 16 Aug 2008 00:43:14 GMT"
}
]
| 2008-08-19T00:00:00 | [
[
"Andoni",
"Alexandr",
""
],
[
"McGregor",
"Andrew",
""
],
[
"Onak",
"Krzysztof",
""
],
[
"Panigrahy",
"Rina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.2227 | Chinmoy Bhattacharya | C Bhattacharya | Higher Order Moments Generation by Mellin Transform for Compound Models
of Clutter | 4pages, 1 figure | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The compound models of clutter statistics are found suitable to describe the
nonstationary nature of radar backscattering from high-resolution observations.
In this letter, we show that the properties of Mellin transform can be utilized
to generate higher order moments of simple and compound models of clutter
statistics in a compact manner.
| [
{
"version": "v1",
"created": "Sat, 16 Aug 2008 01:34:48 GMT"
}
]
| 2008-08-19T00:00:00 | [
[
"Bhattacharya",
"C",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0808.2246 | Philipp Mayr | Boris Lauser, Gudrun Johannsen, Caterina Caracciolo, Johannes Keizer,
Willem Robert van Hage, Philipp Mayr | Comparing human and automatic thesaurus mapping approaches in the
agricultural domain | 10 pages, Int'l Conf. on Dublin Core and Metadata Applications 2008 | null | 10.18452/1251 | null | cs.DL | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Knowledge organization systems (KOS), like thesauri and other controlled
vocabularies, are used to provide subject access to information systems across
the web. Due to the heterogeneity of these systems, mapping between
vocabularies becomes crucial for retrieving relevant information. However,
mapping thesauri is a laborious task, and thus big efforts are being made to
automate the mapping process. This paper examines two mapping approaches
involving the agricultural thesaurus AGROVOC, one machine-created and one human
created. We are addressing the basic question "What are the pros and cons of
human and automatic mapping and how can they complement each other?" By
pointing out the difficulties in specific cases or groups of cases and grouping
the sample into simple and difficult types of mappings, we show the limitations
of current automatic methods and come up with some basic recommendations on
what approach to use when.
| [
{
"version": "v1",
"created": "Sat, 16 Aug 2008 10:10:21 GMT"
}
]
| 2019-01-15T00:00:00 | [
[
"Lauser",
"Boris",
""
],
[
"Johannsen",
"Gudrun",
""
],
[
"Caracciolo",
"Caterina",
""
],
[
"Keizer",
"Johannes",
""
],
[
"van Hage",
"Willem Robert",
""
],
[
"Mayr",
"Philipp",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0808.2296 | Massimiliano Laddomada Ph.D. | Massimiliano Laddomada | Fixed-Point Design of Generalized Comb Filters: A Statistical Approach | 10 pages, 10 figures | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is concerned with the problem of designing computationally
efficient Generalized Comb Filters (GCF). Basically, GCF filters are
anti-aliasing filters that guarantee superior performance in terms of
selectivity and quantization noise rejection compared to classical comb
filters, when used as decimation filters in multistage architectures. Upon
employing a partial polyphase (PP) architecture proposed in a companion paper,
we develop a sensitivity analysis in order to investigate the effects of the
coefficients' quantization on the frequency response of the designed filters.
We show that the sensitivity of the filter response to errors in the
coefficients is dependent on the particular split of the decimation factor
between the two sub-filters constituting the PP architecture. The sensitivity
analysis is then used for developing a fixed-point implementation of a sample
filter from the class of GCF filters, used as reference filter throughout the
paper. Finally, we present computer simulations in order to evaluate the
performance of the designed fixed-point filters.
| [
{
"version": "v1",
"created": "Sun, 17 Aug 2008 15:41:54 GMT"
}
]
| 2008-08-19T00:00:00 | [
[
"Laddomada",
"Massimiliano",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0808.2314 | Sriram Sridharan | Sriram Sridharan, Amin Jafarian, Sriram Vishwanath and Syed A. Jafar | Capacity of Symmetric K-User Gaussian Very Strong Interference Channels | Accepted for publication at Globecom Communications Conference 2008,
5 pages, 2 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies a symmetric K user Gaussian interference channel with K
transmitters and K receivers. A "very strong" interference regime is derived
for this channel setup. A "very strong" interference regime is one where the
capacity region of the interference channel is the same as the capacity region
of the channel with no interference. In this regime, the interference can be
perfectly canceled by all the receivers without incurring any rate penalties. A
"very strong" interference condition for an example symmetric K user
deterministic interference channel is also presented.
| [
{
"version": "v1",
"created": "Sun, 17 Aug 2008 21:54:37 GMT"
}
]
| 2008-08-19T00:00:00 | [
[
"Sridharan",
"Sriram",
""
],
[
"Jafarian",
"Amin",
""
],
[
"Vishwanath",
"Sriram",
""
],
[
"Jafar",
"Syed A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2325 | Michael Neufeld | Michael Neufeld and Craig Partridge | Networking in the Physical World | 13 pages, 4 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we propose a network meta-architecture based on fundamental laws
of physics and a physical model of computation. This meta-architecture may be
used to frame discussions about novel network architectures as well as
cross-layer alterations to the canonical network stack.
| [
{
"version": "v1",
"created": "Mon, 18 Aug 2008 00:51:57 GMT"
}
]
| 2008-08-19T00:00:00 | [
[
"Neufeld",
"Michael",
""
],
[
"Partridge",
"Craig",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.2417 | Jeffrey Shallit | Jui-Yi Kao, Narad Rampersad, and Jeffrey Shallit | On NFAs Where All States are Final, Initial, or Both | submitted | null | null | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We examine questions involving nondeterministic finite automata where all
states are final, initial, or both initial and final. First, we prove hardness
results for the nonuniversality and inequivalence problems for these NFAs.
Next, we characterize the languages accepted. Finally, we discuss some state
complexity problems involving such automata.
| [
{
"version": "v1",
"created": "Mon, 18 Aug 2008 16:11:16 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Jul 2009 15:24:45 GMT"
}
]
| 2009-07-03T00:00:00 | [
[
"Kao",
"Jui-Yi",
""
],
[
"Rampersad",
"Narad",
""
],
[
"Shallit",
"Jeffrey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0808.2428 | Philip Davis | Philip M. Davis | Author-choice open access publishing in the biological and medical
literature: a citation analysis | citation changes; final manuscript | JASIST, 60(1):3-8, 2008 | 10.1002/asi.20965 | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, we analyze the citations to articles published in 11
biological and medical journals from 2003 to 2007 that employ author-choice
open access models. Controlling for known explanatory predictors of citations,
only 2 of the 11 journals show positive and significant open access effects.
Analyzing all journals together, we report a small but significant increase in
article citations of 17%. In addition, there is strong evidence to suggest that
the open access advantage is declining by about 7% per year, from 32% in 2004
to 11% in 2007.
| [
{
"version": "v1",
"created": "Mon, 18 Aug 2008 17:02:59 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Sep 2008 02:24:03 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Dec 2008 19:08:51 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Davis",
"Philip M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0808.2431 | Frederic Connes | Frederic Connes | A Simple E-Voting Protocol | 8 pages, 2 figures | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an e-voting protocol that seems to allow citizens to verify that
their vote has been accurately taken into account while preserving its secrecy,
without requiring the use of a complex process. The main idea is to give each
voter a receipt on which her choice is mixed with the choices of other voters.
| [
{
"version": "v1",
"created": "Mon, 18 Aug 2008 17:19:40 GMT"
}
]
| 2008-08-19T00:00:00 | [
[
"Connes",
"Frederic",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0808.2486 | Guillermo Morales-Luna | Michail Zubarev, Valery Korzhik and Guillermo Morales-Luna | Wet Paper Coding for Watermarking of Binary Images | null | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new method to embed data in binary images, including scanned
text, figures, and signatures. Our method relies on the concept of wet paper
codes. The shuffling before embedding is used in order to equalize irregular
embedding capacity from diverse areas in the image. The hidden data can be
extracted without the original binary image. We illustrate some examples of
watermarked binary images after wet paper coding.
| [
{
"version": "v1",
"created": "Mon, 18 Aug 2008 21:10:09 GMT"
}
]
| 2008-08-20T00:00:00 | [
[
"Zubarev",
"Michail",
""
],
[
"Korzhik",
"Valery",
""
],
[
"Morales-Luna",
"Guillermo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2515 | Shashi Kiran Chilappagari | Shashi Kiran Chilappagari, Michael Chertkov and Bane Vasic | Provably efficient instanton search algorithm for LP decoding of LDPC
codes over the BSC | Submitted to IEEE Transactions on Information Theory. 9 Pages, 4
Figures; Dr. Bane Vasic added as an author; Changes made to the introduction
and abstract; Acknowledgment section added; Some references added; Figures
modified to make them more clear; | null | null | LA-UR-08-05304 | cs.IT cond-mat.stat-mech math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider Linear Programming (LP) decoding of a fixed Low-Density
Parity-Check (LDPC) code over the Binary Symmetric Channel (BSC). The LP
decoder fails when it outputs a pseudo-codeword which is not a codeword. We
design an efficient algorithm termed the Instanton Search Algorithm (ISA)
which, given a random input, generates a set of flips called the BSC-instanton.
We prove that: (a) the LP decoder fails for any set of flips with support
vector including an instanton; (b) for any input, the algorithm outputs an
instanton in the number of steps upper-bounded by twice the number of flips in
the input. Repeated sufficient number of times, the ISA outcomes the number of
unique instantons of different sizes.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 01:08:07 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Sep 2008 18:52:37 GMT"
}
]
| 2008-09-02T00:00:00 | [
[
"Chilappagari",
"Shashi Kiran",
""
],
[
"Chertkov",
"Michael",
""
],
[
"Vasic",
"Bane",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2530 | Srikanth Jagabathula | Srikanth Jagabathula, Devavrat Shah | Fair Scheduling in Networks Through Packet Election | 14 pages (double column), submitted to IEEE Transactions on
Information Theory | null | 10.1109/TIT.2010.2103851 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of designing a fair scheduling algorithm for
discrete-time constrained queuing networks. Each queue has dedicated exogenous
packet arrivals. There are constraints on which queues can be served
simultaneously. This model effectively describes important special instances
like network switches, interference in wireless networks, bandwidth sharing for
congestion control and traffic scheduling in road roundabouts. Fair scheduling
is required because it provides isolation to different traffic flows; isolation
makes the system more robust and enables providing quality of service. Existing
work on fairness for constrained networks concentrates on flow based fairness.
As a main result, we describe a notion of packet based fairness by establishing
an analogy with the ranked election problem: packets are voters, schedules are
candidates and each packet ranks the schedules based on its priorities. We then
obtain a scheduling algorithm that achieves the described notion of fairness by
drawing upon the seminal work of Goodman and Markowitz (1952). This yields the
familiar Maximum Weight (MW) style algorithm. As another important result we
prove that algorithm obtained is throughput optimal. There is no reason a
priori why this should be true, and the proof requires non-traditional methods.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 05:33:35 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Sep 2010 04:56:47 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Jagabathula",
"Srikanth",
""
],
[
"Shah",
"Devavrat",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2543 | Carsten Schneider | Carsten Schneider | A Refined Difference Field Theory for Symbolic Summation | Uses elseart.cls and yjsco.sty | J. Symbolic Comput. 43(9), pp. 611-644. 2008 | 10.1016/j.jsc.2008.01.001 | SFB F013, J. Kepler University Linz. Technical report no. 2007-24 | cs.SC math-ph math.CO math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we present a refined summation theory based on Karr's
difference field approach. The resulting algorithms find sum representations
with optimal nested depth. For instance, the algorithms have been applied
successively to evaluate Feynman integrals from Perturbative Quantum Field
Theory.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 07:46:04 GMT"
}
]
| 2008-09-02T00:00:00 | [
[
"Schneider",
"Carsten",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
]
|
0808.2544 | Dalia Krieger | Yann Bugeaud, Dalia Krieger, Jeffrey Shallit | Morphic and Automatic Words: Maximal Blocks and Diophantine
Approximation | 16 pages, 1 figure | null | null | null | math.CO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $\mb w$ be a morphic word over a finite alphabet $\Sigma$, and let
$\Delta$ be a nonempty subset of $\Sigma$. We study the behavior of maximal
blocks consisting only of letters from $\Delta$ in $\mb w$, and prove the
following: let $(i_k,j_k)$ denote the starting and ending positions,
respectively, of the $k$'th maximal $\Delta$-block in $\mb w$. Then
$\limsup_{k\to\infty} (j_k/i_k)$ is algebraic if $\mb w$ is morphic, and
rational if $\mb w$ is automatic. As a result, we show that the same conclusion
holds if $(i_k,j_k)$ are the starting and ending positions of the $k$'th
maximal zero block, and, more generally, of the $k$'th maximal $x$-block, where
$x$ is an arbitrary word. This enables us to draw conclusions about the
irrationality exponent of automatic and morphic numbers. In particular, we show
that the irrationality exponent of automatic (resp., morphic) numbers belonging
to a certain class that we define is rational (resp., algebraic).
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 07:46:26 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Apr 2009 09:37:40 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Bugeaud",
"Yann",
""
],
[
"Krieger",
"Dalia",
""
],
[
"Shallit",
"Jeffrey",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0808.2548 | Tohru Kohda | Tohru Kohda, Satoshi Hironaka, and Kazuyuki Aihara | Negative Beta Encoder | 18 pages, 26 figures, submitted to IEEE Tran. Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new class of analog-to-digital (A/D) and digital-to-analog (D/A) converters
using a flaky quantiser, called the $\beta$-encoder, has been shown to have
exponential bit rate accuracy while possessing a self-correction property for
fluctuations of the amplifier factor $\beta$ and the quantiser threshold $\nu$.
The probabilistic behavior of such a flaky quantiser is explained as the
deterministic dynamics of the multi-valued R\'enyi map. That is, a sample $x$
is always confined to a contracted subinterval while successive approximations
of $x$ are performed using $\beta$-expansion even if $\nu$ may vary at each
iteration. This viewpoint enables us to get the decoded sample, which is equal
to the midpoint of the subinterval, and its associated characteristic equation
for recovering $\beta$ which improves the quantisation error by more than
$3{dB}$ when $\beta>1.5$. The invariant subinterval under the R\'enyi map shows
that $\nu$ should be set to around the midpoint of its associated greedy and
lazy values. %in terms of its quantisation MSE (mean square error).
Furthermore, a new A/D converter is introduced called the negative
$\beta$-encoder, which further improves the quantisation error of the
$\beta$-encoder. A two-state Markov chain describing the $\beta$-encoder
suggests that a negative eigenvalue of its associated transition probability
matrix reduces the quantisation error.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 08:18:21 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Jul 2009 06:47:37 GMT"
}
]
| 2009-07-28T00:00:00 | [
[
"Kohda",
"Tohru",
""
],
[
"Hironaka",
"Satoshi",
""
],
[
"Aihara",
"Kazuyuki",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2562 | Yonghong Zeng | Yonghong Zeng and Ying-Chang Liang | Spectrum Sensing Algorithms for Cognitive Radio Based on Statistical
Covariances | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spectrum sensing, i.e., detecting the presence of primary users in a licensed
spectrum, is a fundamental problem in cognitive radio. Since the statistical
covariances of received signal and noise are usually different, they can be
used to differentiate the case where the primary user's signal is present from
the case where there is only noise. In this paper, spectrum sensing algorithms
are proposed based on the sample covariance matrix calculated from a limited
number of received signal samples. Two test statistics are then extracted from
the sample covariance matrix. A decision on the signal presence is made by
comparing the two test statistics. Theoretical analysis for the proposed
algorithms is given. Detection probability and associated threshold are found
based on statistical theory. The methods do not need any information of the
signal, the channel and noise power a priori. Also, no synchronization is
needed. Simulations based on narrowband signals, captured digital television
(DTV) signals and multiple antenna signals are presented to verify the methods.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 09:46:41 GMT"
}
]
| 2016-09-08T00:00:00 | [
[
"Zeng",
"Yonghong",
""
],
[
"Liang",
"Ying-Chang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2584 | Tie Hou | Tie Hou | On Transformations of Load-Store Maurer Instruction Set Architecture | 14 pages, 6 figures; Corrected way of citing references | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study how certain conditions can affect the transformations
on the states of the memory of a strict load-store Maurer ISA, when half of the
data memory serves as the part of the operating unit.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 12:31:07 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Jan 2009 15:23:07 GMT"
}
]
| 2009-01-20T00:00:00 | [
[
"Hou",
"Tie",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
]
|
0808.2586 | Panos Papadimitratos | Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux | Towards Provable Secure Neighbor Discovery in Wireless Networks | null | ACM Computer and Communications Security Conference (CCS) Sixth
Workshop on Formal Methods in Security Engineering (FMSE), pages 31{42,
Alexan- dria, VA, USA, October 2008 | null | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In wireless systems, neighbor discovery (ND) is a fundamental building block:
determining which devices are within direct radio communication is an enabler
for networking protocols and a wide range of applications. To thwart abuse of
ND and the resultant compromise of the dependent functionality of wireless
systems, numerous works proposed solutions to secure ND. Nonetheless, until
very recently, there has been no formal analysis of secure ND protocols. We
close this gap in \cite{asiaccs08}, but we concentrate primarily on the
derivation of an impossibility result for a class of protocols. In this paper,
we focus on reasoning about specific protocols. First, we contribute a number
of extensions and refinements on the framework of [24]. As we are particularly
concerned with the practicality of provably secure ND protocols, we investigate
availability and redefine accordingly the ND specification, and also consider
composability of ND with other protocols. Then, we propose and analyze two
secure ND protocols: We revisit one of the protocols analyzed in [24], and
introduce and prove correct a more elaborate challenge-response protocol.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 12:45:58 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"Poturalski",
"Marcin",
""
],
[
"Papadimitratos",
"Panos",
""
],
[
"Hubaux",
"Jean-Pierre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.2591 | Panos Papadimitratos | Jun Luo, Panos Papadimitratos and Jean-Pierre Hubaux | GossiCrypt: Wireless Sensor Network Data Confidentiality Against
Parasitic Adversaries | null | Proceedings of the Fifth IEEE-CS Conference on Sensor, Mesh and Ad
Hoc Communi- cations and Networks (IEEE SECON), pages 441{450, San Francisco,
CA, USA, June 2008 | 10.1109/SAHCN.2008.60 | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Resource and cost constraints remain a challenge for wireless sensor network
security. In this paper, we propose a new approach to protect confidentiality
against a parasitic adversary, which seeks to exploit sensor networks by
obtaining measurements in an unauthorized way. Our low-complexity solution,
GossiCrypt, leverages on the large scale of sensor networks to protect
confidentiality efficiently and effectively. GossiCrypt protects data by
symmetric key encryption at their source nodes and re-encryption at a randomly
chosen subset of nodes en route to the sink. Furthermore, it employs key
refreshing to mitigate the physical compromise of cryptographic keys. We
validate GossiCrypt analytically and with simulations, showing it protects data
confidentiality with probability almost one. Moreover, compared with a system
that uses public-key data encryption, the energy consumption of GossiCrypt is
one to three orders of magnitude lower.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 13:23:21 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Luo",
"Jun",
""
],
[
"Papadimitratos",
"Panos",
""
],
[
"Hubaux",
"Jean-Pierre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.2596 | Carsten Schneider | Carsten Schneider | Parameterized Telescoping Proves Algebraic Independence of Sums | To appear in Annals of Combinatorics | null | null | SFB F013, J. Kepler University Linz. Technical report no. 2006-40,
2006 | cs.SC math.CO math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Usually creative telescoping is used to derive recurrences for sums. In this
article we show that the non-existence of a creative telescoping solution, and
more generally, of a parameterized telescoping solution, proves algebraic
independence of certain types of sums. Combining this fact with
summation-theory shows transcendence of whole classes of sums. Moreover, this
result throws new light on the question why, e.g., Zeilberger's algorithm fails
to find a recurrence with minimal order.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 13:58:01 GMT"
}
]
| 2008-09-02T00:00:00 | [
[
"Schneider",
"Carsten",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
]
|
0808.2602 | Nick Stukach | Nick Stukach | Easily testable logical networks based on a 'widened long flip-flop' | 64 pages, including 35 figures and 10 tables | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The article describes an attempt to solve at once three basic problems
arising at testing a complex digital equipment for defects: 1) the problem of
an exponential increasing of the complexity of testing the equipment with the
complexity of the equipment; 2) the problem of testing of the tester; 3) the
problem of a mutual masking of defects. The proposed solution is nothing more
than using certain limitations for connections between usual logical gates.
Arbitrary multiple stuck-at-faults are supposed as defects.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 14:44:05 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Aug 2008 21:16:55 GMT"
}
]
| 2008-08-21T00:00:00 | [
[
"Stukach",
"Nick",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
]
|
0808.2654 | Panos Papadimitratos | Panos Papadimitratos and Jean-Pierre Hubaux | Report on the "Secure Vehicular Communications: Results and Challenges
Ahead" Workshop | null | ACM SIGMOBILE Mobile Computing and Communications Review (MC2R),
12(2):53-64, April 2008 | null | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is a report and a collection of abstracts from the Feb. 2008 Lausanne
Workshop on Secure Vehicular Communication Systems.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 21:02:41 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"Papadimitratos",
"Panos",
""
],
[
"Hubaux",
"Jean-Pierre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.2659 | Dinesh Krithivasan | Dinesh Krithivasan and S. Sandeep Pradhan | Distributed Source Coding using Abelian Group Codes | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we consider a distributed source coding problem with a joint
distortion criterion depending on the sources and the reconstruction. This
includes as a special case the problem of computing a function of the sources
to within some distortion and also the classic Slepian-Wolf problem,
Berger-Tung problem, Wyner-Ziv problem, Yeung-Berger problem and the
Ahlswede-Korner-Wyner problem. While the prevalent trend in information theory
has been to prove achievability results using Shannon's random coding
arguments, using structured random codes offer rate gains over unstructured
random codes for many problems. Motivated by this, we present a new achievable
rate-distortion region for this problem for discrete memoryless sources based
on "good" structured random nested codes built over abelian groups. We
demonstrate rate gains for this problem over traditional coding schemes using
random unstructured codes. For certain sources and distortion functions, the
new rate region is strictly bigger than the Berger-Tung rate region, which has
been the best known achievable rate region for this problem till now. Further,
there is no known unstructured random coding scheme that achieves these rate
gains. Achievable performance limits for single-user source coding using
abelian group codes are also obtained as parts of the proof of the main coding
theorem. As a corollary, we also prove that nested linear codes achieve the
Shannon rate-distortion bound in the single-user setting.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 21:17:57 GMT"
}
]
| 2008-08-21T00:00:00 | [
[
"Krithivasan",
"Dinesh",
""
],
[
"Pradhan",
"S. Sandeep",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2662 | Andrew Drucker | Andrew Drucker | Multitask Efficiencies in the Decision Tree Model | Improved exposition based on conference version | 24th Annual IEEE Conference on Computational Complexity, 2009, p.
286-297 | 10.1109/CCC.2009.33 | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In Direct Sum problems [KRW], one tries to show that for a given
computational model, the complexity of computing a collection of finite
functions on independent inputs is approximately the sum of their individual
complexities. In this paper, by contrast, we study the diversity of ways in
which the joint computational complexity can behave when all the functions are
evaluated on a common input. We focus on the deterministic decision tree model,
with depth as the complexity measure; in this model we prove a result to the
effect that the 'obvious' constraints on joint computational complexity are
essentially the only ones.
The proof uses an intriguing new type of cryptographic data structure called
a `mystery bin' which we construct using a small polynomial separation between
deterministic and unambiguous query complexity shown by Savicky. We also pose a
variant of the Direct Sum Conjecture of [KRW] which, if proved for a single
family of functions, could yield an analogous result for models such as the
communication model.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2008 11:15:33 GMT"
},
{
"version": "v2",
"created": "Sun, 31 Aug 2008 21:55:04 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Jan 2010 02:43:13 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Drucker",
"Andrew",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0808.2666 | Panos Papadimitratos | Panos Papadimitratos, Giorgio Calandriello, Jean-Pierre Hubaux and
Antonio Lioy | Impact of Vehicular Communications Security on Transportation Safety | null | IEEE Conference on Computer Communications (INFOCOM) Workshop on
Mobile Networking for Vehicular Environments (MOVE), pp. 1-6, Phoenix, AZ,
USA, April 2008 | 10.1109/INFOCOM.2008.4544663 | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transportation safety, one of the main driving forces of the development of
vehicular communication (VC) systems, relies on high-rate safety messaging
(beaconing). At the same time, there is consensus among authorities, industry,
and academia on the need to secure VC systems. With specific proposals in the
literature, a critical question must be answered: can secure VC systems be
practical and satisfy the requirements of safety applications, in spite of the
significant communication and processing overhead and other restrictions
security and privacy-enhancing mechanisms impose? To answer this question, we
investigate in this paper the following three dimensions for secure and
privacy-enhancing VC schemes: the reliability of communication, the processing
overhead at each node, and the impact on a safety application. The results
indicate that with the appropriate system design, including sufficiently high
processing power, applications enabled by secure VC can be in practice as
effective as those enabled by unsecured VC.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 22:35:37 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Papadimitratos",
"Panos",
""
],
[
"Calandriello",
"Giorgio",
""
],
[
"Hubaux",
"Jean-Pierre",
""
],
[
"Lioy",
"Antonio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.