id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0808.0558
Shreeshankar Bodas
Sandeep Bhadra, Shreeshankar Bodas, Sanjay Shakkottai, Sriram Vishwanath
Communication Through Jamming over a Slotted ALOHA Channel
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work derives bounds on the jamming capacity of a slotted ALOHA system. A system with n legitimate users, each with a Bernoulli arrival process is considered. Packets are temporarily stored at the corresponding user queues, and a slotted ALOHA strategy is used for packet transmissions over the shared channel. The scenario considered is that of a pair of illegitimate users that jam legitimate transmissions in order to communicate over the slotted ALOHA channel. Jamming leads to binary signaling between the illegitimate users, with packet collisions due to legitimate users treated as (multiplicative) noise in this channel. Further, the queueing dynamics at the legitimate users stochastically couples the jamming strategy used by the illegitimate users and the channel evolution. By considering various i.i.d. jamming strategies, achievable jamming rates over the slotted ALOHA channel are derived. Further, an upper bound on the jamming capacity over the class of all ergodic jamming policies is derived. These bounds are shown to be tight in the limit where the offered system load approaches unity.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 05:53:40 GMT" } ]
2008-08-06T00:00:00
[ [ "Bhadra", "Sandeep", "" ], [ "Bodas", "Shreeshankar", "" ], [ "Shakkottai", "Sanjay", "" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.0584
Daniele De Martino
Daniele De Martino, Luca Dall'Asta, Ginestra Bianconi and Matteo Marsili
Congestion phenomena on complex networks
4 pages, 4 figures, submitted to PRL
null
10.1103/PhysRevE.79.015101
null
physics.soc-ph cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define a minimal model of traffic flows in complex networks containing the most relevant features of real routing schemes, i.e. a trade--off strategy between topological-based and traffic-based routing. The resulting collective behavior, obtained analytically for the ensemble of uncorrelated networks, is physically very rich and reproduces results recently observed in traffic simulations on scale-free networks. We find that traffic control is useless in homogeneous graphs but may improves global performance in inhomogeneous networks, enlarging the free-flow region in parameter space. Traffic control also introduces non-linear effects and, beyond a critical strength, may trigger the appearance of a congested phase in a discontinuous manner.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 14:48:14 GMT" } ]
2009-11-13T00:00:00
[ [ "De Martino", "Daniele", "" ], [ "Dall'Asta", "Luca", "" ], [ "Bianconi", "Ginestra", "" ], [ "Marsili", "Matteo", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0808.0586
Xavier Leroy
Xavier Leroy (INRIA Rocquencourt), Herv\'e Grall (INRIA Rennes, LINA)
Coinductive big-step operational semantics
null
Information and Computation (2007)
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using a call-by-value functional language as an example, this article illustrates the use of coinductive definitions and proofs in big-step operational semantics, enabling it to describe diverging evaluations in addition to terminating evaluations. We formalize the connections between the coinductive big-step semantics and the standard small-step semantics, proving that both semantics are equivalent. We then study the use of coinductive big-step semantics in proofs of type soundness and proofs of semantic preservation for compilers. A methodological originality of this paper is that all results have been proved using the Coq proof assistant. We explain the proof-theoretic presentation of coinductive definitions and proofs offered by Coq, and show that it facilitates the discovery and the presentation of the results.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 14:47:32 GMT" } ]
2008-08-06T00:00:00
[ [ "Leroy", "Xavier", "", "INRIA Rocquencourt" ], [ "Grall", "Hervé", "", "INRIA Rennes, LINA" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0808.0596
Ido Tal
Ido Tal, Tuvi Etzion, Ron M. Roth
On row-by-row coding for 2-D constraints
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A constant-rate encoder--decoder pair is presented for a fairly large family of two-dimensional (2-D) constraints. Encoding and decoding is done in a row-by-row manner, and is sliding-block decodable. Essentially, the 2-D constraint is turned into a set of independent and relatively simple one-dimensional (1-D) constraints; this is done by dividing the array into fixed-width vertical strips. Each row in the strip is seen as a symbol, and a graph presentation of the respective 1-D constraint is constructed. The maxentropic stationary Markov chain on this graph is next considered: a perturbed version of the corresponding probability distribution on the edges of the graph is used in order to build an encoder which operates in parallel on the strips. This perturbation is found by means of a network flow, with upper and lower bounds on the flow through the edges. A key part of the encoder is an enumerative coder for constant-weight binary words. A fast realization of this coder is shown, using floating-point arithmetic.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 10:14:08 GMT" } ]
2008-08-06T00:00:00
[ [ "Tal", "Ido", "" ], [ "Etzion", "Tuvi", "" ], [ "Roth", "Ron M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.0634
Tomasz Truderung
Ralf Kuesters and Tomasz Truderung
Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils down to solving the derivation problem for Horn theories. This approach and the tools based on this approach, including ProVerif, have been very successful in the automatic analysis of cryptographic protocols w.r.t. an unbounded number of sessions. However, dealing with the algebraic properties of operators such as the exclusive OR (XOR) has been problematic. In particular, ProVerif cannot deal with XOR. In this paper, we show how to reduce the derivation problem for Horn theories with XOR to the XOR-free case. Our reduction works for an expressive class of Horn theories. A large class of intruder capabilities and protocols that employ the XOR operator can be modeled by these theories. Our reduction allows us to carry out protocol analysis by tools, such as ProVerif, that cannot deal with XOR, but are very efficient in the XOR-free case. We implemented our reduction and, in combination with ProVerif, applied it in the automatic analysis of several protocols that use the XOR operator. In one case, we found a new attack.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 13:02:24 GMT" } ]
2008-08-06T00:00:00
[ [ "Kuesters", "Ralf", "" ], [ "Truderung", "Tomasz", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0808.0647
Barnaby Martin
Barnaby Martin
Model Checking Positive Equality-free FO: Boolean Structures and Digraphs of Size Three
null
null
null
null
cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the model checking problem, for fixed structures A, over positive equality-free first-order logic -- a natural generalisation of the non-uniform quantified constraint satisfaction problem QCSP(A). We prove a complete complexity classification for this problem when A ranges over 1.) boolean structures and 2.) digraphs of size (less than or equal to) three. The former class displays dichotomy between Logspace and Pspace-complete, while the latter class displays tetrachotomy between Logspace, NP-complete, co-NP-complete and Pspace-complete.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 13:33:43 GMT" } ]
2008-08-06T00:00:00
[ [ "Martin", "Barnaby", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0808.0665
Celine Fouard
C\'eline Fouard (INRIA Sophia Antipolis), Robin Strand (CBA), Gunilla Borgefors (CBA)
Weighted distance transforms generalized to modules and their computation on point lattices
null
Pattern Recognition 40, 9 (2007) 2453--2474
10.1016/j.patcog.2007.01.001
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the generalization of weighted distances to modules and their computation through the chamfer algorithm on general point lattices. The first part is dedicated to formalization of definitions and properties (distance, metric, norm) of weighted distances on modules. It resumes tools found in literature to express the weighted distance of any point of a module and to compute optimal weights in the general case to get rotation invariant distances. The second part of this paper proves that, for any point lattice, the sequential two-scan chamfer algorithm produces correct distance maps. Finally, the definitions and computation of weighted distances are applied to the face-centered cubic (FCC) and body-centered cubic (BCC) grids.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 14:44:45 GMT" } ]
2008-08-06T00:00:00
[ [ "Fouard", "Céline", "", "INRIA Sophia Antipolis" ], [ "Strand", "Robin", "", "CBA" ], [ "Borgefors", "Gunilla", "", "CBA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0808.0684
Selcuk Kavut
Selcuk Kavut and Melek Diker Yucel
9-variable Boolean Functions with Nonlinearity 242 in the Generalized Rotation Class
This work is based on (i) "Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242", AAECC-17 Symposium, LNCS Vol. 4851, pp. 321-329, Bangalore, India, 2007 and (ii) "Random Permutations on Input Vectors of Boolean Functions", BFCA 2008, Copenhagen, Denmark, 2008
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 2006, 9-variable Boolean functions having nonlinearity 241, which is strictly greater than the bent concatenation bound of 240, have been discovered in the class of Rotation Symmetric Boolean Functions (RSBFs) by Kavut, Maitra and Yucel. To improve this nonlinearity result, we have firstly defined some subsets of the n-variable Boolean functions as the "generalized classes of k-RSBFs and k-DSBFs (k-Dihedral Symmetric Boolean Functions)", where k is a positive integer dividing n and k-RSBFs is a subset of l-RSBFs if k < l. Secondly, utilizing the steepest-descent like iterative heuristic search algorithm used previously to identify the 9-variable RSBFs with nonlinearity 241, we have made a search within the classes of 3-RSBFs and 3-DSBFs. The search has accomplished to find 9-variable Boolean functions with nonlinearity 242 in both of these classes. It should be emphasized that although the class of 3-RSBFs contains functions with nonlinearity 242; 1-RSBFs or simply RSBFs, which is a subset of 3-RSBFs, does not contain any. This result also shows that the covering radius of the first order Reed-Muller code R(1, 9) is at least equal to 242. Thirdly, motivated by the fact that RSBFs are invariant under a special permutation of the input vector, we have classified all possible permutations up to the linear equivalence of Boolean functions that are invariant under those permutations. Specifically, for 9-variable Boolean functions, 9! possible permutations are classified into 30 classes; and the search algorithm identifies some of these classes as "rich". The rich classes yield new Boolean functions with nonlinearity 242 having different autocorrelation spectra from those of the functions found in the generalized 3-RSBF and 3-DSBF classes.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 17:06:16 GMT" } ]
2008-08-06T00:00:00
[ [ "Kavut", "Selcuk", "" ], [ "Yucel", "Melek Diker", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.0732
Dusko Pavlovic
Dusko Pavlovic
Dynamics, robustness and fragility of trust
17 pages; simplified the statement and the proof of the main theorem; FAST 2008
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Trust is often conveyed through delegation, or through recommendation. This makes the trust authorities, who process and publish trust recommendations, into an attractive target for attacks and spoofing. In some recent empiric studies, this was shown to lead to a remarkable phenomenon of *adverse selection*: a greater percentage of unreliable or malicious web merchants were found among those with certain types of trust certificates, then among those without. While such findings can be attributed to a lack of diligence in trust authorities, or even to conflicts of interest, our analysis of trust dynamics suggests that public trust networks would probably remain vulnerable even if trust authorities were perfectly diligent. The reason is that the process of trust building, if trust is not breached too often, naturally leads to power-law distributions: the rich get richer, the trusted attract more trust. The evolutionary processes with such distributions, ubiquitous in nature, are known to be robust with respect to random failures, but vulnerable to adaptive attacks. We recommend some ways to decrease the vulnerability of trust building, and suggest some ideas for exploration.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 23:31:20 GMT" }, { "version": "v2", "created": "Sun, 28 Sep 2008 18:52:42 GMT" }, { "version": "v3", "created": "Fri, 24 Oct 2008 18:42:57 GMT" } ]
2008-10-24T00:00:00
[ [ "Pavlovic", "Dusko", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0808.0745
Caleb Lo
Caleb K. Lo, John J. Hasenbein, Sriram Vishwanath and Robert W. Heath Jr
Relay-Assisted User Scheduling in Wireless Networks with Hybrid-ARQ
14 pages, 5 figures, submitted to the IEEE Transactions on Vehicular Technology in October 2008, revised in March 2009 and May 2009
null
10.1109/TVT.2009.2027711
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the problem of relay-assisted user scheduling for downlink wireless transmission. The base station or access point employs hybrid automatic-repeat-request (HARQ) with the assistance of a set of fixed relays to serve a set of mobile users. By minimizing a cost function of the queue lengths at the base station and the number of retransmissions of the head-of-line packet for each user, the base station can schedule an appropriate user in each time slot and an appropriate transmitter to serve it. It is shown that a priority-index policy is optimal for a linear cost function with packets arriving according to a Poisson process and for an increasing convex cost function where packets must be drained from the queues at the base station.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 23:53:26 GMT" }, { "version": "v2", "created": "Tue, 7 Oct 2008 00:03:40 GMT" }, { "version": "v3", "created": "Thu, 9 Oct 2008 18:07:18 GMT" }, { "version": "v4", "created": "Thu, 19 Mar 2009 00:14:59 GMT" }, { "version": "v5", "created": "Sat, 16 May 2009 23:30:33 GMT" } ]
2016-11-17T00:00:00
[ [ "Lo", "Caleb K.", "" ], [ "Hasenbein", "John J.", "" ], [ "Vishwanath", "Sriram", "" ], [ "Heath", "Robert W.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.0753
Paul Tarau
Paul Tarau
Ranking Catamorphisms and Unranking Anamorphisms on Hereditarily Finite Datatypes
unpublished draft
null
null
null
cs.SC cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using specializations of unfold and fold on a generic tree data type we derive unranking and ranking functions providing natural number encodings for various Hereditarily Finite datatypes. In this context, we interpret unranking operations as instances of a generic anamorphism and ranking operations as instances of the corresponding catamorphism. Starting with Ackerman's Encoding from Hereditarily Finite Sets to Natural Numbers we define pairings and tuple encodings that provide building blocks for a theory of Hereditarily Finite Functions. The more difficult problem of ranking and unranking Hereditarily Finite Permutations is then tackled using Lehmer codes and factoradics. The self-contained source code of the paper, as generated from a literate Haskell program, is available at \url{http://logic.csci.unt.edu/tarau/research/2008/fFUN.zip}. Keywords: ranking/unranking, pairing/tupling functions, Ackermann encoding, hereditarily finite sets, hereditarily finite functions, permutations and factoradics, computational mathematics, Haskell data representations
[ { "version": "v1", "created": "Wed, 6 Aug 2008 00:54:05 GMT" } ]
2008-08-07T00:00:00
[ [ "Tarau", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0808.0754
Paul Tarau
Paul Tarau
A Functional Hitchhiker's Guide to Hereditarily Finite Sets, Ackermann Encodings and Pairing Functions
unpublished draft
null
null
null
cs.MS cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper is organized as a self-contained literate Haskell program that implements elements of an executable finite set theory with focus on combinatorial generation and arithmetic encodings. The code, tested under GHC 6.6.1, is available at http://logic.csci.unt.edu/tarau/research/2008/fSET.zip . We introduce ranking and unranking functions generalizing Ackermann's encoding to the universe of Hereditarily Finite Sets with Urelements. Then we build a lazy enumerator for Hereditarily Finite Sets with Urelements that matches the unranking function provided by the inverse of Ackermann's encoding and we describe functors between them resulting in arithmetic encodings for powersets, hypergraphs, ordinals and choice functions. After implementing a digraph representation of Hereditarily Finite Sets we define {\em decoration functions} that can recover well-founded sets from encodings of their associated acyclic digraphs. We conclude with an encoding of arbitrary digraphs and discuss a concept of duality induced by the set membership relation. Keywords: hereditarily finite sets, ranking and unranking functions, executable set theory, arithmetic encodings, Haskell data representations, functional programming and computational mathematics
[ { "version": "v1", "created": "Wed, 6 Aug 2008 01:05:09 GMT" } ]
2008-08-07T00:00:00
[ [ "Tarau", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0808.0760
Paul Tarau
Paul Tarau
Declarative Combinatorics: Boolean Functions, Circuit Synthesis and BDDs in Haskell
unpublished draft
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe Haskell implementations of interesting combinatorial generation algorithms with focus on boolean functions and logic circuit representations. First, a complete exact combinational logic circuit synthesizer is described as a combination of catamorphisms and anamorphisms. Using pairing and unpairing functions on natural number representations of truth tables, we derive an encoding for Binary Decision Diagrams (BDDs) with the unique property that its boolean evaluation faithfully mimics its structural conversion to a a natural number through recursive application of a matching pairing function. We then use this result to derive ranking and unranking functions for BDDs and reduced BDDs. Finally, a generalization of the encoding techniques to Multi-Terminal BDDs is provided. The paper is organized as a self-contained literate Haskell program, available at http://logic.csci.unt.edu/tarau/research/2008/fBDD.zip . Keywords: exact combinational logic synthesis, binary decision diagrams, encodings of boolean functions, pairing/unpairing functions, ranking/unranking functions for BDDs and MTBDDs, declarative combinatorics in Haskell
[ { "version": "v1", "created": "Wed, 6 Aug 2008 01:41:51 GMT" } ]
2008-08-07T00:00:00
[ [ "Tarau", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0808.0768
Mark Burgin
Mark Burgin
Foundations of Information Theory
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information is the basic concept of information theory. However, there is no definition of this concept that can encompass all uses of the term information in information theories and beyond. Many question a possibility of such a definition. However, foundations of information theory developed in the context of the general theory of information made it possible to build such a relevant and at the same time, encompassing definition. Foundations of information theory are built in a form of ontological principles, which reflect basic features of information and information processes.
[ { "version": "v1", "created": "Wed, 6 Aug 2008 04:04:55 GMT" } ]
2008-08-07T00:00:00
[ [ "Burgin", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.0845
Jian Ma
Jian Ma and Zengqi Sun
Mutual information is copula entropy
null
null
null
null
cs.IT cs.LG math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that mutual information is actually negative copula entropy, based on which a method for mutual information estimation is proposed.
[ { "version": "v1", "created": "Wed, 6 Aug 2008 14:20:56 GMT" } ]
2008-08-07T00:00:00
[ [ "Ma", "Jian", "" ], [ "Sun", "Zengqi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0808.0876
Nan Liu
Nan Liu and Andrea Goldsmith
Capacity Regions and Bounds for a Class of Z-interference Channels
submitted to IEEE Trans. on Information Theory. This material was presented in part at the IEEE International Symposium on Information Theory, Toronto, Canada, July 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define a class of Z-interference channels for which we obtain a new upper bound on the capacity region. The bound exploits a technique first introduced by Korner and Marton. A channel in this class has the property that, for the transmitter-receiver pair that suffers from interference, the conditional output entropy at the receiver is invariant with respect to the transmitted codewords. We compare the new capacity region upper bound with the Han/Kobayashi achievable rate region for interference channels. This comparison shows that our bound is tight in some cases, thereby yielding specific points on the capacity region as well as sum capacity for certain Z-interference channels. In particular, this result can be used as an alternate method to obtain sum capacity of Gaussian Z-interference channels. We then apply an additional restriction on our channel class: the transmitter-receiver pair that suffers from interference achieves its maximum output entropy with a single input distribution irrespective of the interference distribution. For these channels we show that our new capacity region upper bound coincides with the Han/Kobayashi achievable rate region, which is therefore capacity-achieving. In particular, for these channels superposition encoding with partial decoding is shown to be optimal and a single-letter characterization for the capacity region is obtained.
[ { "version": "v1", "created": "Wed, 6 Aug 2008 16:30:09 GMT" } ]
2008-08-07T00:00:00
[ [ "Liu", "Nan", "" ], [ "Goldsmith", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.0920
Mahesh Arumugam
Mahesh Arumugam
A Distributed and Deterministic TDMA Algorithm for Write-All-With-Collision Model
14 pages
null
null
null
cs.OS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several self-stabilizing time division multiple access (TDMA) algorithms are proposed for sensor networks. In addition to providing a collision-free communication service, such algorithms enable the transformation of programs written in abstract models considered in distributed computing literature into a model consistent with sensor networks, i.e., write all with collision (WAC) model. Existing TDMA slot assignment algorithms have one or more of the following properties: (i) compute slots using a randomized algorithm, (ii) assume that the topology is known upfront, and/or (iii) assign slots sequentially. If these algorithms are used to transform abstract programs into programs in WAC model then the transformed programs are probabilistically correct, do not allow the addition of new nodes, and/or converge in a sequential fashion. In this paper, we propose a self-stabilizing deterministic TDMA algorithm where a sensor is aware of only its neighbors. We show that the slots are assigned to the sensors in a concurrent fashion and starting from arbitrary initial states, the algorithm converges to states where collision-free communication among the sensors is restored. Moreover, this algorithm facilitates the transformation of abstract programs into programs in WAC model that are deterministically correct.
[ { "version": "v1", "created": "Wed, 6 Aug 2008 20:33:56 GMT" } ]
2008-08-08T00:00:00
[ [ "Arumugam", "Mahesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0808.0948
Wei Kang
Wei Kang, Sennur Ulukus
Capacity of a Class of Diamond Channels
15 pages, 3 figures, submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a special class of diamond channels which was introduced by Schein in 2001. In this special class, each diamond channel consists of a transmitter, a noisy relay, a noiseless relay and a receiver. We prove the capacity of this class of diamond channels by providing an achievable scheme and a converse. The capacity we show is strictly smaller than the cut-set bound. Our result also shows the optimality of a combination of decode-and-forward (DAF) and compress-and-forward (CAF) at the noisy relay node. This is the first example where a combination of DAF and CAF is shown to be capacity achieving. Finally, we note that there exists a duality between this diamond channel coding problem and the Kaspi-Berger source coding problem.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 02:45:36 GMT" } ]
2008-08-08T00:00:00
[ [ "Kang", "Wei", "" ], [ "Ulukus", "Sennur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.0954
Sang Joon Kim
Sang Joon Kim, Natasha Devroye, Patrick Mitran, Vahid Tarokh
Achievable rate regions for bi-directional relaying
42 pages, 17 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a bi-directional relay channel, two nodes wish to exchange independent messages over a shared wireless half-duplex channel with the help of a relay. In this paper, we derive achievable rate regions for four new half-duplex protocols and compare these to four existing half-duplex protocols and outer bounds. In time, our protocols consist of either two or three phases. In the two phase protocols, both users simultaneously transmit during the first phase and the relay alone transmits during the second phase, while in the three phase protocol the two users sequentially transmit followed by a transmission from the relay. The relay may forward information in one of four manners; we outline existing Amplify and Forward (AF), Decode and Forward (DF) and Compress and Forward (CF) relaying schemes and introduce the novel Mixed Forward scheme. The latter is a combination of CF in one direction and DF in the other. We derive achievable rate regions for the CF and Mixed relaying schemes for the two and three phase protocols. In the last part of this work we provide a comprehensive treatment of 8 possible half-duplex bi-directional relaying protocols in Gaussian noise, obtaining their respective achievable rate regions, outer bounds, and their relative performance under different SNR and relay geometries.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 04:15:59 GMT" }, { "version": "v2", "created": "Fri, 15 May 2009 21:11:15 GMT" } ]
2009-05-16T00:00:00
[ [ "Kim", "Sang Joon", "" ], [ "Devroye", "Natasha", "" ], [ "Mitran", "Patrick", "" ], [ "Tarokh", "Vahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.0962
Amin Ansari
Amin Ansari
Verification of Peterson's Algorithm for Leader Election in a Unidirectional Asynchronous Ring Using NuSMV
11 pages, 6 figures
null
null
null
cs.LO cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The finite intrinsic nature of the most distributed algorithms gives us this ability to use model checking tools for verification of this type of algorithms. In this paper, I attempt to use NuSMV as a model checking tool for verifying necessary properties of Peterson's algorithm for leader election problem in a unidirectional asynchronous ring topology. Peterson's algorithm for an asynchronous ring supposes that each node in the ring has a unique ID and also a queue for dealing with storage problem. By considering that the queue can have any combination of values, a constructed model for a ring with only four nodes will have more than a billion states. Although it seems that model checking is not a feasible approach for this problem, I attempt to use several effective limiting assumptions for hiring formal model checking approach without losing the correct functionality of the Peterson's algorithm. These enforced limiting assumptions target the degree of freedom in the model checking process and significantly decrease the CPU time, memory usage and the total number of page faults. By deploying these limitations, the number of nodes can be increased from four to eight in the model checking process with NuSMV.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 06:02:59 GMT" } ]
2008-08-08T00:00:00
[ [ "Ansari", "Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0808.0973
Chaitanya Chemudugunta
Chaitanya Chemudugunta, Padhraic Smyth and Mark Steyvers
Text Modeling using Unsupervised Topic Models and Concept Hierarchies
null
null
null
null
cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Statistical topic models provide a general data-driven framework for automated discovery of high-level knowledge from large collections of text documents. While topic models can potentially discover a broad range of themes in a data set, the interpretability of the learned topics is not always ideal. Human-defined concepts, on the other hand, tend to be semantically richer due to careful selection of words to define concepts but they tend not to cover the themes in a data set exhaustively. In this paper, we propose a probabilistic framework to combine a hierarchy of human-defined semantic concepts with statistical topic models to seek the best of both worlds. Experimental results using two different sources of concept hierarchies and two collections of text documents indicate that this combination leads to systematic improvements in the quality of the associated language models as well as enabling new techniques for inferring and visualizing the semantics of a document.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 07:59:29 GMT" } ]
2008-08-08T00:00:00
[ [ "Chemudugunta", "Chaitanya", "" ], [ "Smyth", "Padhraic", "" ], [ "Steyvers", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0808.0978
Gesualdo Scutari
Gesualdo Scutari, Daniel P. Palomar, Sergio Barbarossa
Cognitive MIMO Radio: A Competitive Optimality Design Based on Subspace Projections
null
IEEE Signal Processing Magazine Special Issue on Signal Processing for Cognitive Radio Networks, November 2008
10.1109/MSP.2008.929297
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive MIMO Radio: A Competitive Optimality Design Based on Subspace Projections
[ { "version": "v1", "created": "Thu, 7 Aug 2008 13:54:45 GMT" } ]
2016-11-15T00:00:00
[ [ "Scutari", "Gesualdo", "" ], [ "Palomar", "Daniel P.", "" ], [ "Barbarossa", "Sergio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.0980
Gregory Gutin
Peter Dankelmann, Gregory Gutin, Eun Jung Kim
On Complexity of Minimum Leaf Out-branching Problem
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a digraph $D$, the Minimum Leaf Out-Branching problem (MinLOB) is the problem of finding in $D$ an out-branching with the minimum possible number of leaves, i.e., vertices of out-degree 0. Gutin, Razgon and Kim (2008) proved that MinLOB is polynomial time solvable for acyclic digraphs which are exactly the digraphs of directed path-width (DAG-width, directed tree-width, respectively) 0. We investigate how much one can extend this polynomiality result. We prove that already for digraphs of directed path-width (directed tree-width, DAG-width, respectively) 1, MinLOB is NP-hard. On the other hand, we show that for digraphs of restricted directed tree-width (directed path-width, DAG-width, respectively) and a fixed integer $k$, the problem of checking whether there is an out-branching with at most $k$ leaves is polynomial time solvable.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 08:41:48 GMT" } ]
2008-08-08T00:00:00
[ [ "Dankelmann", "Peter", "" ], [ "Gutin", "Gregory", "" ], [ "Kim", "Eun Jung", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0808.0987
Marcin Wiczanowski
Marcin Wiczanowski, Holger Boche
A new graph perspective on max-min fairness in Gaussian parallel channels
41 pages, 8 figures. submitted to IEEE Transactions on Information Theory on August the 6th, 2008
null
10.1109/ISITA.2008.4895521
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we are concerned with the problem of achieving max-min fairness in Gaussian parallel channels with respect to a general performance function, including channel capacity or decoding reliability as special cases. As our central results, we characterize the laws which determine the value of the achievable max-min fair performance as a function of channel sharing policy and power allocation (to channels and users). In particular, we show that the max-min fair performance behaves as a specialized version of the Lovasz function, or Delsarte bound, of a certain graph induced by channel sharing combinatorics. We also prove that, in addition to such graph, merely a certain 2-norm distance dependent on the allowable power allocations and used performance functions, is sufficient for the characterization of max-min fair performance up to some candidate interval. Our results show also a specific role played by odd cycles in the graph induced by the channel sharing policy and we present an interesting relation between max-min fairness in parallel channels and optimal throughput in an associated interference channel.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 09:26:12 GMT" } ]
2016-11-15T00:00:00
[ [ "Wiczanowski", "Marcin", "" ], [ "Boche", "Holger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.1000
Dong Huang
Dong Huang, Chunyan Miao, Cyril Leung
Fitness Landscape Analysis for Dynamic Resource Allocation in Multiuser OFDM Based Cognitive Radio Systems
This paper has been withdrawn
null
null
null
cs.IT cs.NE math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 11:07:22 GMT" }, { "version": "v2", "created": "Fri, 29 Aug 2008 02:55:17 GMT" }, { "version": "v3", "created": "Sun, 7 Mar 2010 12:56:29 GMT" } ]
2010-03-09T00:00:00
[ [ "Huang", "Dong", "" ], [ "Miao", "Chunyan", "" ], [ "Leung", "Cyril", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.1007
Igor Bjelakovic
I. Bjelakovic, H. Boche, J. Noetzel
On Quantum Capacity of Compound Channels
16 pages, no figures
null
10.1103/PhysRevA.78.042331
null
quant-ph cs.IT math-ph math.IT math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we address the issue of universal or robust communication over quantum channels. Specifically, we consider memoryless communication scenario with channel uncertainty which is an analog of compound channel in classical information theory. We determine the quantum capacity of finite compound channels and arbitrary compound channels with informed decoder. Our approach in the finite case is based on the observation that perfect channel knowledge at the decoder does not increase the capacity of finite quantum compound channels. As a consequence we obtain coding theorem for finite quantum averaged channels, the simplest class of channels with long-term memory. The extension of these results to quantum compound channels with uninformed encoder and decoder, and infinitely many constituents remains an open problem.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 13:03:46 GMT" } ]
2009-11-13T00:00:00
[ [ "Bjelakovic", "I.", "" ], [ "Boche", "H.", "" ], [ "Noetzel", "J.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0808.1062
Qinglin Zhao
Qinglin Zhao, Soung C. Liew
Optimization of Location Management for PCS Networks with CTRW Mobility Model
null
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the design of the optimal locationupdate area (LA) of the distance-based scheme for personal communication service (PCS) networks. We focus on the optimization of two design parameters associated with the LA: 1) initial position upon LA update; 2) distance threshold for triggering of LA update. Based on the popular continuous-time random walk (CTRW) mobility model, we propose a novel analytical framework that uses a diffusion equation to minimize the location management cost. In this framework, a number of measurable physical parameters, such as length of road section, angle between road sections, and road section crossing time, can be integrated into the system design. This framework allows us to easily evaluate the total cost under general call arrival distributions and LA of different shapes. For the particular case of circular LA and small Poisson call-arrival rate, we prove the following: (1) When the drift is weak, the optimal initial position approaches the center of the LA; when the drift is strong, it approaches the boundary of the LA. (2) Comparing the optimal initial-position and center-initial-position solutions (which is assumed in most prior work), when the drift is weak, the optimal distance threshold and the minimum total cost are roughly equal; when the drift is strong, the optimal distance threshold in the later is about 1.260 times that in the former, and the minimum total cost in the later is about 1.587 times that in the former. That is, optimizing on initial position, which previous work did not consider, has the potential of reducing the cost measure by 37%.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 16:32:51 GMT" } ]
2008-08-08T00:00:00
[ [ "Zhao", "Qinglin", "" ], [ "Liew", "Soung C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0808.1108
Nicolas Bock
Nicolas Bock and Emanuel H. Rubensson and Pawe{\l} Sa{\l}ek and Anders M. N. Niklasson and Matt Challacombe
Cache oblivious storage and access heuristics for blocked matrix-matrix multiplication
Fixed typos
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate effects of ordering in blocked matrix--matrix multiplication. We find that submatrices do not have to be stored contiguously in memory to achieve near optimal performance. Instead it is the choice of execution order of the submatrix multiplications that leads to a speedup of up to four times for small block sizes. This is in contrast to results for single matrix elements showing that contiguous memory allocation quickly becomes irrelevant as the blocksize increases.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 22:49:29 GMT" }, { "version": "v2", "created": "Fri, 15 Aug 2008 14:34:31 GMT" } ]
2008-08-15T00:00:00
[ [ "Bock", "Nicolas", "" ], [ "Rubensson", "Emanuel H.", "" ], [ "Sałek", "Paweł", "" ], [ "Niklasson", "Anders M. N.", "" ], [ "Challacombe", "Matt", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0808.1119
Seenu Reddi
Seenu S. Reddi
Graham's Schedules and the Number Partition Problem
6 pages, 1 table
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show the equivalence of the Number Partition Problem and the two processor scheduling problem. We establish a priori bounds on the completion times for the scheduling problem which are tighter than Graham's but almost on par with a posteriori bounds of Coffman and Sethi. We conclude the paper with a characterization of the asymptotic behavior of the scheduling problem which relates to the spread of the processing times and the number of jobs.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 22:17:56 GMT" } ]
2008-08-11T00:00:00
[ [ "Reddi", "Seenu S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0808.1125
Omid David-Tabibi
Omid David-Tabibi and Nathan S. Netanyahu
Verified Null-Move Pruning
9 pages
ICGA Journal, International Computer Games Association, Vol. 25, No. 3, pp. 153--161, September 2002
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we review standard null-move pruning and introduce our extended version of it, which we call verified null-move pruning. In verified null-move pruning, whenever the shallow null-move search indicates a fail-high, instead of cutting off the search from the current node, the search is continued with reduced depth. Our experiments with verified null-move pruning show that on average, it constructs a smaller search tree with greater tactical strength in comparison to standard null-move pruning. Moreover, unlike standard null-move pruning, which fails badly in zugzwang positions, verified null-move pruning manages to detect most zugzwangs and in such cases conducts a re-search to obtain the correct result. In addition, verified null-move pruning is very easy to implement, and any standard null-move pruning program can use verified null-move pruning by modifying only a few lines of code.
[ { "version": "v1", "created": "Fri, 8 Aug 2008 12:44:10 GMT" } ]
2008-08-11T00:00:00
[ [ "David-Tabibi", "Omid", "" ], [ "Netanyahu", "Nathan S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0808.1128
Mihai Patrascu
Timothy M. Chan and Mihai Patrascu and Liam Roditty
Dynamic Connectivity: Connecting to Networks and Geometry
Full version of a paper to appear in FOCS 2008
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic connectivity is a well-studied problem, but so far the most compelling progress has been confined to the edge-update model: maintain an understanding of connectivity in an undirected graph, subject to edge insertions and deletions. In this paper, we study two more challenging, yet equally fundamental problems. Subgraph connectivity asks to maintain an understanding of connectivity under vertex updates: updates can turn vertices on and off, and queries refer to the subgraph induced by "on" vertices. (For instance, this is closer to applications in networks of routers, where node faults may occur.) We describe a data structure supporting vertex updates in O (m^{2/3}) amortized time, where m denotes the number of edges in the graph. This greatly improves over the previous result [Chan, STOC'02], which required fast matrix multiplication and had an update time of O(m^0.94). The new data structure is also simpler. Geometric connectivity asks to maintain a dynamic set of n geometric objects, and query connectivity in their intersection graph. (For instance, the intersection graph of balls describes connectivity in a network of sensors with bounded transmission radius.) Previously, nontrivial fully dynamic results were known only for special cases like axis-parallel line segments and rectangles. We provide similarly improved update times, O (n^{2/3}), for these special cases. Moreover, we show how to obtain sublinear update bounds for virtually all families of geometric objects which allow sublinear-time range queries, such as arbitrary 2D line segments, d-dimensional simplices, and d-dimensional balls.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 22:16:15 GMT" } ]
2008-08-11T00:00:00
[ [ "Chan", "Timothy M.", "" ], [ "Patrascu", "Mihai", "" ], [ "Roditty", "Liam", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0808.1207
Dirk Bradler
Dirk Bradler and Jussi Kangasharju and Max Muehlhaeuser
Optimally Efficient Prefix Search and Multicast in Structured P2P Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Searching in P2P networks is fundamental to all overlay networks. P2P networks based on Distributed Hash Tables (DHT) are optimized for single key lookups, whereas unstructured networks offer more complex queries at the cost of increased traffic and uncertain success rates. Our Distributed Tree Construction (DTC) approach enables structured P2P networks to perform prefix search, range queries, and multicast in an optimal way. It achieves this by creating a spanning tree over the peers in the search area, using only information available locally on each peer. Because DTC creates a spanning tree, it can query all the peers in the search area with a minimal number of messages. Furthermore, we show that the tree depth has the same upper bound as a regular DHT lookup which in turn guarantees fast and responsive runtime behavior. By placing objects with a region quadtree, we can perform a prefix search or a range query in a freely selectable area of the DHT. Our DTC algorithm is DHT-agnostic and works with most existing DHTs. We evaluate the performance of DTC over several DHTs by comparing the performance to existing application-level multicast solutions, we show that DTC sends 30-250% fewer messages than common solutions.
[ { "version": "v1", "created": "Fri, 8 Aug 2008 13:03:44 GMT" } ]
2008-08-11T00:00:00
[ [ "Bradler", "Dirk", "" ], [ "Kangasharju", "Jussi", "" ], [ "Muehlhaeuser", "Max", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0808.1211
W Saba
Walid S. Saba
Commonsense Knowledge, Ontology and Ordinary Language
To appear in Int. J. Reasoning-based Intelligent Systems
null
null
null
cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over two decades ago a "quite revolution" overwhelmingly replaced knowledgebased approaches in natural language processing (NLP) by quantitative (e.g., statistical, corpus-based, machine learning) methods. Although it is our firm belief that purely quantitative approaches cannot be the only paradigm for NLP, dissatisfaction with purely engineering approaches to the construction of large knowledge bases for NLP are somewhat justified. In this paper we hope to demonstrate that both trends are partly misguided and that the time has come to enrich logical semantics with an ontological structure that reflects our commonsense view of the world and the way we talk about in ordinary language. In this paper it will be demonstrated that assuming such an ontological structure a number of challenges in the semantics of natural language (e.g., metonymy, intensionality, copredication, nominal compounds, etc.) can be properly and uniformly addressed.
[ { "version": "v1", "created": "Fri, 8 Aug 2008 14:37:45 GMT" } ]
2008-08-11T00:00:00
[ [ "Saba", "Walid S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0808.1215
Joseph Y. Halpern
Joseph Y. Halpern and Vicky Weissman
A Formal Foundation for XrML
null
null
null
null
cs.CR cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
XrML is becoming a popular language in industry for writing software licenses. The semantics for XrML is implicitly given by an algorithm that determines if a permission follows from a set of licenses. We focus on a fragment of the language and use it to highlight some problematic aspects of the algorithm. We then correct the problems, introduce formal semantics, and show that our semantics captures the (corrected) algorithm. Next, we consider the complexity of determining if a permission is implied by a set of XrML licenses. We prove that the general problem is undecidable, but it is polynomial-time computable for an expressive fragment of the language. We extend XrML to capture a wider range of licenses by adding negation to the language. Finally, we discuss the key differences between XrML and MPEG-21, an international standard based on XrML.
[ { "version": "v1", "created": "Fri, 8 Aug 2008 16:25:58 GMT" } ]
2008-08-11T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Weissman", "Vicky", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0808.1246
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Romulus Andreica, Angela Andreica
Minimum Dissatisfaction Personnel Scheduling
Some of the algorithmic techniques presented in this paper were later used by the first author for developing solutions to several algorithmic contest tasks (see the attached zip archive for some examples)
ARA Congress, Boston : United States (2008)
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider two problems regarding the scheduling of available personnel in order to perform a given quantity of work, which can be arbitrarily decomposed into a sequence of activities. We are interested in schedules which minimize the overall dissatisfaction, where each employee's dissatisfaction is modeled as a time-dependent linear function. For the two situations considered we provide a detailed mathematical analysis, as well as efficient algorithms for determining optimal schedules.
[ { "version": "v1", "created": "Fri, 8 Aug 2008 17:15:34 GMT" }, { "version": "v2", "created": "Mon, 21 Jan 2013 17:26:48 GMT" } ]
2013-01-22T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Andreica", "Romulus", "" ], [ "Andreica", "Angela", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0808.1247
Damien Chablat
S\'ebastien Briot (DGMA), Ilian Bonev (GPA), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Vigen Arakelian (DGMA)
Self-Motions of General 3-RPR Planar Parallel Robots
null
International Journal of Robotics Research 27, 7 (2008) pp. 855-866
10.1177/0278364908092466
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the kinematic geometry of general 3-RPR planar parallel robots with actuated base joints. These robots, while largely overlooked, have simple direct kinematics and large singularity-free workspace. Furthermore, their kinematic geometry is the same as that of a newly developed parallel robot with SCARA-type motions. Starting from the direct and inverse kinematic model, the expressions for the singularity loci of 3-RPR planar parallel robots are determined. Then, the global behaviour at all singularities is geometrically described by studying the degeneracy of the direct kinematic model. Special cases of self-motions are then examined and the degree of freedom gained in such special configurations is kinematically interpreted. Finally, a practical example is discussed and experimental validations performed on an actual robot prototype are presented.
[ { "version": "v1", "created": "Fri, 8 Aug 2008 17:17:23 GMT" } ]
2008-08-11T00:00:00
[ [ "Briot", "Sébastien", "", "DGMA" ], [ "Bonev", "Ilian", "", "GPA" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Arakelian", "Vigen", "", "DGMA" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0808.1343
Holger Kienle
Holger M. Kienle, Andreas Lober, Hausi A. M\"uller
Policy and Legal Challenges of Virtual Worlds and Social Network Sites
5 pages, 1 table, First International Workshop on Requirements Engineering and Law (RELAW 2008), Barcelona, Spain. http://www4.ncsu.edu/~tdbreaux/relaw/
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses policy challenges of complex virtual environments such as virtual worlds, social network sites, and massive multiplayer online games. The complexity of these environments--apparent by the rich user interactions and sophisticated user-generated content that they offer--poses unique challenges for policy management and compliance. These challenges are also impacting the life cycle of the software system that implements the virtual environment. The goal of this paper is to identify and sketch important legal and policy challenges of virtual environments and how they affect stakeholders (i.e., operators, users, and lawmakers). Given the increasing significance of virtual environments, we expect that tackling these challenges will become increasingly important in the future.
[ { "version": "v1", "created": "Sat, 9 Aug 2008 10:15:38 GMT" } ]
2008-08-12T00:00:00
[ [ "Kienle", "Holger M.", "" ], [ "Lober", "Andreas", "" ], [ "Müller", "Hausi A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0808.1354
Mehrnoosh Sadrzadeh
Mehrnoosh Sadrzadeh
Ockham's razor and reasoning about information flow
15 pages
null
null
null
math.LO cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
What is the minimal algebraic structure to reason about information flow? Do we really need the full power of Boolean algebras with co-closure and de Morgan dual operators? How much can we weaken and still be able to reason about multi-agent scenarios in a tidy compositional way? This paper provides some answers.
[ { "version": "v1", "created": "Sat, 9 Aug 2008 13:51:44 GMT" } ]
2008-08-12T00:00:00
[ [ "Sadrzadeh", "Mehrnoosh", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0808.1364
Than Quang Khoat
Th\^an Quang Kho\'at
On Bounded Integer Programming
The preliminary version of this paper appeared in Proceedings of the 2008 IEEE International Conference on Research, Innovation & Vision for the Future - RIVF, July 2008, pages 23-28, Ho Chi Minh city, Vietnam, entitled "On the Bounded Integer Programming"
null
null
null
cs.CC cs.DM
http://creativecommons.org/licenses/by-nc-sa/3.0/
We present an efficient reduction from the Bounded integer programming (BIP) to the Subspace avoiding problem (SAP) in lattice theory. The reduction has some special properties with some interesting consequences. The first is the new upper time bound for BIP, $poly(\varphi)\cdot n^{n+o(n)}$ (where $n$ and $\varphi$ are the dimension and the input size of the problem, respectively). This is the best bound up to now for BIP. The second consequence is the proof that #SAP, for some norms, is #P-hard under semi-reductions. It follows that the counting version of the Generalized closest vector problem is also #P-hard under semi-reductions. Furthermore, we also show that under some reasonable assumptions, BIP is solvable in probabilistic time $2^{O(n)}$.
[ { "version": "v1", "created": "Sat, 9 Aug 2008 17:04:44 GMT" } ]
2008-08-12T00:00:00
[ [ "Khoát", "Thân Quang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0808.1368
Shamgar Gurevich
Shamgar Gurevich (UC Berkeley), Ronny Hadani (University of Chicago), Nir Sochen (Tel Aviv University)
On some deterministic dictionaries supporting sparsity
Accepted for publication in the special issue on sparsity (Editors: Albert Cohen, Ronald DeVore, Michael Elad, Anna Gilbert) of the Journal of Fourier Analysis and Applications (2008). Key words: Sparsity, deterministic dictionaries, low coherence, Weil representation, commutative subgroups, eigenfunctions, explicit algorithm
Special issue on sparsity, the Journal of Fourier Analysis and Applications, Vol. 14, 859-876, Dec. 2008
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new construction of an incoherent dictionary, referred to as the oscillator dictionary, which is based on considerations in the representation theory of finite groups. The oscillator dictionary consists of order of p^5 unit vectors in a Hilbert space of dimension p, where p is an odd prime, whose pairwise inner products have magnitude of at most 4/sqrt(p). An explicit algorithm to construct a large portion of the oscillator dictionary is presented.
[ { "version": "v1", "created": "Sat, 9 Aug 2008 17:28:44 GMT" }, { "version": "v2", "created": "Sat, 27 Dec 2008 08:11:55 GMT" } ]
2008-12-30T00:00:00
[ [ "Gurevich", "Shamgar", "", "UC Berkeley" ], [ "Hadani", "Ronny", "", "University of Chicago" ], [ "Sochen", "Nir", "", "Tel Aviv University" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.1378
George Eskander MSc
George S. Eskander, and Amir F. Atiya
A Novel Symbolic Type Neural Network Model- Application to River Flow Forecasting
Published in ICENCO2007, Cairo, December 2007
null
null
null
cs.NE cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a new symbolic type neural tree network called symbolic function network (SFN) that is based on using elementary functions to model systems in a symbolic form. The proposed formulation permits feature selection, functional selection, and flexible structure. We applied this model on the River Flow forecasting problem. The results found to be superior in both fitness and sparsity.
[ { "version": "v1", "created": "Sat, 9 Aug 2008 22:05:48 GMT" } ]
2008-08-12T00:00:00
[ [ "Eskander", "George S.", "" ], [ "Atiya", "Amir F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0808.1400
Smarajit Das
Smarajit Das, B. Sundar Rajan
A Class of Maximal-Rate, Low-PAPR, Non-square Complex Orthogonal Designs
Submitted to IEEE Transactions on Wireless Communication, 25 pages, 5 figures, 1 table
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Space-time block codes (STBCs) from non-square complex orthogonal designs are bandwidth efficient when compared with those from square real/complex orthogonal designs. Though there exists rate-1 ROD for any number of transmit antennas, rate-1 complex orthogonal designs (COD) does not exist for more than 2 transmit antennas. Liang (IEEE Trans. Inform. Theory, 2003) and Lu et al (IEEE Trans. Inform. Theory, 2005) have constructed a class of maximal rate non-square CODs where the rate is ${1/2}+\frac{1}{n}$ if number of transmit antennas $n$ is even and ${1/2}+\frac{1}{n+1}$ if $n$ is odd. In this paper, we present a simple construction for maximal rate non-square CODs obtained from square CODs which resembles the construction of rate-1 non-square RODs from square RODs. These designs are shown to be amenable for construction of a class of generalized CODs (called Coordinate-Interleaved Scaled CODs) with low peak-to-average power ratio (PAPR) having the same parameters as the maximal rate codes. Simulation results indicate that these codes perform better than the existing maximal rate codes under peak power constraint while performing the same under average power constraint.
[ { "version": "v1", "created": "Sun, 10 Aug 2008 18:50:31 GMT" } ]
2008-08-12T00:00:00
[ [ "Das", "Smarajit", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.1410
Ali Aboutalebi
H. B. Bahar, Ali Aboutalebi
Image Steganography, a New Approach for Transferring Security Information
7 pages, 3 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
[ { "version": "v1", "created": "Sun, 10 Aug 2008 15:07:15 GMT" } ]
2008-08-12T00:00:00
[ [ "Bahar", "H. B.", "" ], [ "Aboutalebi", "Ali", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0808.1417
Shamgar Gurevich
Shamgar Gurevich, Ronny Hadani, Nir Sochen
The finite harmonic oscillator and its associated sequences
Published in the Proceedings of the National Academy of Sciences of the United States of America (Communicated by Joseph Bernstein, Tel Aviv University, Tel Aviv, Israel)
PNAS, July 22, 2008 vol. 105 no. 29 9869-9873 http://www.pnas.org/content/105/29/9869.abstract
10.1073/pnas.0801656105
null
cs.IT cs.CR cs.DM math-ph math.GR math.IT math.MP math.NT math.PR math.QA math.RT math.SG quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A system of functions (signals) on the finite line, called the oscillator system, is described and studied. Applications of this system for discrete radar and digital communication theory are explained. Keywords: Weil representation, commutative subgroups, eigenfunctions, random behavior, deterministic construction
[ { "version": "v1", "created": "Sun, 10 Aug 2008 17:49:20 GMT" }, { "version": "v2", "created": "Tue, 30 Dec 2008 08:10:33 GMT" } ]
2022-06-08T00:00:00
[ [ "Gurevich", "Shamgar", "" ], [ "Hadani", "Ronny", "" ], [ "Sochen", "Nir", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Mathematics", "code": "math.QA", "description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory", "span": "(Quantum Algebra)" }, { "class": "Mathematics", "code": "math.RT", "description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra", "span": "(Representation Theory)" }, { "class": "Mathematics", "code": "math.SG", "description": "Hamiltonian systems, symplectic flows, classical integrable systems", "span": "(Symplectic Geometry)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0808.1431
Neil J. Gunther
Neil J. Gunther
A General Theory of Computational Scalability Based on Rational Functions
14 pages, 5 figures; several typos corrected, 1 reference updated, page number reduced with 10 pt font
null
null
null
cs.PF cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The universal scalability law of computational capacity is a rational function C_p = P(p)/Q(p) with P(p) a linear polynomial and Q(p) a second-degree polynomial in the number of physical processors p, that has been long used for statistical modeling and prediction of computer system performance. We prove that C_p is equivalent to the synchronous throughput bound for a machine-repairman with state-dependent service rate. Simpler rational functions, such as Amdahl's law and Gustafson speedup, are corollaries of this queue-theoretic bound. C_p is further shown to be both necessary and sufficient for modeling all practical characteristics of computational scalability.
[ { "version": "v1", "created": "Mon, 11 Aug 2008 00:06:16 GMT" }, { "version": "v2", "created": "Mon, 25 Aug 2008 16:20:42 GMT" } ]
2008-08-25T00:00:00
[ [ "Gunther", "Neil J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0808.1455
Ian Oliver
Ian Oliver and Jukka Honkola
Personal Semantic Web Through A Space Based Computing Environment
14 pages, 6 figures. In proceedings: Middleware for the Semantic Web, Seconds IEEE Interntional Conference on Semantic Computing, Santa Clara, CA, USA, August 4-7, 2008
null
null
null
cs.NI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Semantic Web through technologies such to support the canonical representation information and presenting it to users in a method by which its meaning can be understood or at least communi- cated and interpreted by all parties. As the Semantic Web evolves into more of a computing platform rather than an information platform more dynamic structures, interactions and behaviours will evolve leading to systems which localise and personalise this Dynamic Semantic Web.
[ { "version": "v1", "created": "Mon, 11 Aug 2008 07:13:43 GMT" } ]
2008-08-12T00:00:00
[ [ "Oliver", "Ian", "" ], [ "Honkola", "Jukka", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0808.1470
Sudhakar Sahoo
Sudhakar Sahoo, Sanjaya Sahoo, Birendra Kumar Nayak and Pabitra Pal Choudhury
Encompression Using Two-dimensional Cellular Automata Rules
5 pages, 4 figures
null
null
null
cs.DM cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we analyze the algebraic structure of some null boundary as well as some periodic boundary 2-D Cellular Automata (CA) rules by introducing a new matrix multiplication operation using only AND, OR instead of most commonly used AND, EX-OR. This class includes any CA whose rule, when written as an algebra, is a finite Abelean cyclic group in case of periodic boundary and a finite commutative cyclic monoid in case of null boundary CA respectively. The concept of 1-D Multiple Attractor Cellular Automata (MACA) is extended to 2-D. Using the family of 2-D MACA and the finite Abelian cyclic group, an efficient encompression algorithm is proposed for binary images.
[ { "version": "v1", "created": "Mon, 11 Aug 2008 09:11:44 GMT" } ]
2008-08-12T00:00:00
[ [ "Sahoo", "Sudhakar", "" ], [ "Sahoo", "Sanjaya", "" ], [ "Nayak", "Birendra Kumar", "" ], [ "Choudhury", "Pabitra Pal", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0808.1495
Shamgar Gurevich
Shamgar Gurevich, Ronny Hadani, Nir Sochen
The finite harmonic oscillator and its applications to sequences, communication and radar
Accepted for publication in IEEE Transactions on Information Theory (Communicated by Guang Gong, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, CANADA)
IEEE Transactions on Information Theory, vol. 54, no. 9, September 2008
10.1109/TIT.2008.926440
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel system, called the oscillator system, consisting of order of p^3 functions (signals) on the finite field F_p; with p an odd prime, is described and studied. The new functions are proved to satisfy good auto-correlation, cross-correlation and low peak-to-average power ratio properties. Moreover, the oscillator system is closed under the operation of discrete Fourier transform. Applications of the oscillator system for discrete radar and digital communication theory are explained. Finally, an explicit algorithm to construct the oscillator system is presented.
[ { "version": "v1", "created": "Mon, 11 Aug 2008 16:50:00 GMT" }, { "version": "v2", "created": "Tue, 30 Dec 2008 07:41:28 GMT" } ]
2016-11-18T00:00:00
[ [ "Gurevich", "Shamgar", "" ], [ "Hadani", "Ronny", "" ], [ "Sochen", "Nir", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.1505
Joseph Y. Halpern
Ittai Abraham, Danny Dolev, and Joseph Y. Halpern
An Almost-Surely Terminating Polynomial Protocol for Asynchronous Byzantine Agreement with Optimal Resilience
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider an asynchronous system with private channels and $n$ processes, up to $t$ of which may be faulty. We settle a longstanding open question by providing a Byzantine agreement protocol that simultaneously achieves three properties: 1. (optimal) resilience: it works as long as $n>3t$ 2. (almost-sure) termination: with probability one, all nonfaulty processes terminate 3. (polynomial) efficiency: the expected computation time, memory consumption, message size, and number of messages sent are all polynomial in $n$. Earlier protocols have achieved only two of these three properties. In particular, the protocol of Bracha is not polynomially efficient, the protocol of Feldman and Micali is not optimally resilient, and the protocol of Canetti and Rabin does not have almost-sure termination. Our protocol utilizes a new primitive called shunning (asynchronous) verifiable secret sharing (SVSS), which ensures, roughly speaking, that either a secret is successfully shared or a new faulty process is ignored from this point onwards by some nonfaulty process.
[ { "version": "v1", "created": "Mon, 11 Aug 2008 12:22:12 GMT" } ]
2008-08-12T00:00:00
[ [ "Abraham", "Ittai", "" ], [ "Dolev", "Danny", "" ], [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0808.1508
Michel Rueher
H\'el\`ene Collavizza (I3S), Michel Rueher (I3S), Pascal Van Hentenryck (Brown University)
Comparison between CPBPV, ESC/Java, CBMC, Blast, EUREKA and Why for Bounded Program Verification
null
null
null
null
cs.SE cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report describes experimental results for a set of benchmarks on program verification. It compares the capabilities of CPBVP "Constraint Programming framework for Bounded Program Verification" [4] with the following frameworks: ESC/Java, CBMC, Blast, EUREKA and Why.
[ { "version": "v1", "created": "Mon, 11 Aug 2008 12:55:19 GMT" } ]
2008-08-12T00:00:00
[ [ "Collavizza", "Hélène", "", "I3S" ], [ "Rueher", "Michel", "", "I3S" ], [ "Van Hentenryck", "Pascal", "", "Brown University" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0808.1549
Allon G. Percus
Allon G. Percus, Gabriel Istrate, Bruno Goncalves, Robert Z. Sumi and Stefan Boettcher
The Peculiar Phase Structure of Random Graph Bisection
substantially revised section 2, changed figures 3, 4 and 6, made minor stylistic changes and added references
J. Math. Phys. 49, 125219 (2008)
10.1063/1.3043666
LA-UR 08-5099
cond-mat.stat-mech cond-mat.dis-nn cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The mincut graph bisection problem involves partitioning the n vertices of a graph into disjoint subsets, each containing exactly n/2 vertices, while minimizing the number of "cut" edges with an endpoint in each subset. When considered over sparse random graphs, the phase structure of the graph bisection problem displays certain familiar properties, but also some surprises. It is known that when the mean degree is below the critical value of 2 log 2, the cutsize is zero with high probability. We study how the minimum cutsize increases with mean degree above this critical threshold, finding a new analytical upper bound that improves considerably upon previous bounds. Combined with recent results on expander graphs, our bound suggests the unusual scenario that random graph bisection is replica symmetric up to and beyond the critical threshold, with a replica symmetry breaking transition possibly taking place above the threshold. An intriguing algorithmic consequence is that although the problem is NP-hard, we can find near-optimal cutsizes (whose ratio to the optimal value approaches 1 asymptotically) in polynomial time for typical instances near the phase transition.
[ { "version": "v1", "created": "Mon, 11 Aug 2008 17:59:02 GMT" }, { "version": "v2", "created": "Thu, 20 Nov 2008 01:52:50 GMT" } ]
2010-04-27T00:00:00
[ [ "Percus", "Allon G.", "" ], [ "Istrate", "Gabriel", "" ], [ "Goncalves", "Bruno", "" ], [ "Sumi", "Robert Z.", "" ], [ "Boettcher", "Stefan", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0808.1599
Jeong Han Kim
Jeong Han Kim
Finding cores of random 2-SAT formulae via Poisson cloning
null
null
null
null
math.CO cs.CC math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the random 2-SAT formula $F(n,p)$, let $F_C (n,p)$ be the formula left after the pure literal algorithm applied to $F(n,p)$ stops. Using the recently developed Poisson cloning model together with the cut-off line algorithm (COLA), we completely analyze the structure of $F_{C} (n,p)$. In particular, it is shown that, for $\gl:= p(2n-1) = 1+\gs $ with $\gs\gg n^{-1/3}$, the core of $F(n,p)$ has $\thl^2 n +O((\thl n)^{1/2})$ variables and $\thl^2 \gl n+O((\thl n))^{1/2}$ clauses, with high probability, where $\thl$ is the larger solution of the equation $\th- (1-e^{-\thl \gl})=0$. We also estimate the probability of $F(n,p)$ being satisfiable to obtain $$ \pr[ F_2(n, \sfrac{\gl}{2n-1}) is satisfiable ] = \caseth{1-\frac{1+o(1)}{16\gs^3 n}}{if $\gl= 1-\gs$ with $\gs\gg n^{-1/3}$}{}{}{e^{-\Theta(\gs^3n)}}{if $\gl=1+\gs$ with $\gs\gg n^{-1/3}$,} $$ where $o(1)$ goes to 0 as $\gs$ goes to 0. This improves the bounds of Bollob\'as et al. \cite{BBCKW}.
[ { "version": "v1", "created": "Tue, 12 Aug 2008 00:38:59 GMT" } ]
2008-08-13T00:00:00
[ [ "Kim", "Jeong Han", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0808.1641
Sudhakar Sahoo
Sudhakar Sahoo, Pabitra Pal Choudhury, Mithun Chakraborty
Characterization Of any Non-linear Boolean function Using A Set of Linear Operators
12 pages, 4 figures, 2 table. Submitted for possible publication in the International Journal of Computer Mathematics and Applications, July 2008
null
null
null
cs.CC nlin.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Global dynamics of a non-linear Cellular Automata is, in general irregular, asymmetric and unpredictable as opposed to that of a linear CA, which is highly systematic and tractable. In the past efforts have been made to systematize non-linear CA evolutions in the light of Boolean derivatives and Jacobian Matrices. In this paper two different efforts have been made: first we try to systematize non-linear CA evolution in the light of deviant states and non-deviant states. For all the non-deviant states the nearest linear rule matrix is applicable where as for the deviant states we have a set of other matrices. Second using algebraic manipulation, an efficient algorithm is proposed by which every Non-linear Boolean function can be characterized by a sequence of binary matrices.
[ { "version": "v1", "created": "Tue, 12 Aug 2008 11:04:47 GMT" } ]
2008-08-13T00:00:00
[ [ "Sahoo", "Sudhakar", "" ], [ "Choudhury", "Pabitra Pal", "" ], [ "Chakraborty", "Mithun", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" } ]
0808.1657
Jeffrey Shallit
Jean-Paul Allouche, Narad Rampersad, Jeffrey Shallit
Periodicity, repetitions, and orbits of an automatic sequence
preliminary version
null
null
null
cs.DM cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We revisit a technique of S. Lehr on automata and use it to prove old and new results in a simple way. We give a very simple proof of the 1986 theorem of Honkala that it is decidable whether a given k-automatic sequence is ultimately periodic. We prove that it is decidable whether a given k-automatic sequence is overlap-free (or squareefree, or cubefree, etc.) We prove that the lexicographically least sequence in the orbit closure of a k-automatic sequence is k-automatic, and use this last result to show that several related quantities, such as the critical exponent, irrationality measure, and recurrence quotient for Sturmian words with slope alpha, have automatic continued fraction expansions if alpha does.
[ { "version": "v1", "created": "Tue, 12 Aug 2008 13:13:09 GMT" }, { "version": "v2", "created": "Tue, 2 Dec 2008 18:37:58 GMT" }, { "version": "v3", "created": "Fri, 23 Jan 2009 20:16:22 GMT" } ]
2009-04-12T00:00:00
[ [ "Allouche", "Jean-Paul", "" ], [ "Rampersad", "Narad", "" ], [ "Shallit", "Jeffrey", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0808.1661
Jocelyne Troccaz
Jocelyne Troccaz (TIMC)
Medical robotics: where we come from, where we are and where we could go
null
The Industrial Robot 35, 4 (2008) 289
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This short note presents a viewpoint about medical robotics.
[ { "version": "v1", "created": "Tue, 12 Aug 2008 13:21:52 GMT" } ]
2008-08-13T00:00:00
[ [ "Troccaz", "Jocelyne", "", "TIMC" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0808.1671
Shuchi Chawla
Shuchi Chawla and Jason Hartline and Robert Kleinberg
Algorithmic Pricing via Virtual Valuations
A preliminary version of this work appeared at the ACM EC'07 conference. The current version contains improved results and simpler algorithms
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Algorithmic pricing is the computational problem that sellers (e.g., in supermarkets) face when trying to set prices for their items to maximize their profit in the presence of a known demand. Guruswami et al. (2005) propose this problem and give logarithmic approximations (in the number of consumers) when each consumer's values for bundles are known precisely. Subsequently several versions of the problem have been shown to have poly-logarithmic inapproximability. This problem has direct ties to the important open question of better understanding the Bayesian optimal mechanism in multi-parameter settings; however, logarithmic approximations are inadequate for this purpose. It is therefore of vital interest to consider special cases where constant approximations are possible. We consider the unit-demand variant of this problem. Here a consumer has a valuation for each different item and their value for a set of items is simply the maximum value they have for any item in the set. We assume that the preferences of the consumers are drawn from a distribution, the standard assumption in economics; furthermore, the setting of a specific set of customers with known preferences, which is employed in all prior work in algorithmic pricing, is a special case of this general problem, where there is a discrete Bayesian distribution for preferences specified by picking one consumer uniformly from the given set of consumers. Our work complements these existing works by considering the case where the consumer's valuations for the different items are independent random variables. Our main result is a constant approximation that makes use of an interesting connection between this problem and the concept of virtual valuations from the single-parameter Bayesian optimal mechanism design literature.
[ { "version": "v1", "created": "Tue, 12 Aug 2008 18:08:21 GMT" } ]
2008-08-13T00:00:00
[ [ "Chawla", "Shuchi", "" ], [ "Hartline", "Jason", "" ], [ "Kleinberg", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0808.1721
Paul Fodor
Paul Fodor
Initial Results on the F-logic to OWL Bi-directional Translation on a Tabled Prolog Engine
null
null
null
null
cs.AI cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we show our results on the bi-directional data exchange between the F-logic language supported by the Flora2 system and the OWL language. Most of the TBox and ABox axioms are translated preserving the semantics between the two representations, such as: proper inclusion, individual definition, functional properties, while some axioms and restrictions require a change in the semantics, such as: numbered and qualified cardinality restrictions. For the second case, we translate the OWL definite style inference rules into F-logic style constraints. We also describe a set of reasoning examples using the above translation, including the reasoning in Flora2 of a variety of ABox queries.
[ { "version": "v1", "created": "Tue, 12 Aug 2008 19:58:59 GMT" } ]
2008-08-13T00:00:00
[ [ "Fodor", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0808.1744
Alex Brodsky
Alex Brodsky and Scott Lindenberg
Our Brothers' Keepers: Secure Routing with High Performance
11 pages, 4 figures
null
null
null
cs.DC cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Trinity (Brodsky et al., 2007) spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of processing hundreds of messages per second, and must be able to route messages to their destination even in the presence of failures and malicious peers that misroute packets or inject fraudulent routing information into the system. Typically there is tension between the requirements to route messages securely and efficiently in the overlay. We describe a secure and efficient routing extension that we developed within the I3 (Stoica et al. 2004) implementation of the Chord (Stoica et al. 2001) overlay. Secure routing is accomplished through several complementary approaches: First, peers in close proximity form overlapping groups that police themselves to identify and mitigate fraudulent routing information. Second, a form of random routing solves the problem of entire packet flows passing through a malicious peer. Third, a message authentication mechanism links each message to it sender, preventing spoofing. Fourth, each peer's identifier links the peer to its network address, and at the same time uniformly distributes the peers in the key-space. Lastly, we present our initial evaluation of the system, comprising a 255 peer overlay running on a local cluster. We describe our methodology and show that the overhead of our secure implementation is quite reasonable.
[ { "version": "v1", "created": "Tue, 12 Aug 2008 22:03:52 GMT" } ]
2008-08-14T00:00:00
[ [ "Brodsky", "Alex", "" ], [ "Lindenberg", "Scott", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0808.1753
Andrew Krizhanovsky A
A. A. Krizhanovsky
Index wiki database: design and experiments
18 pages, 4 tables, 4 figures; FLINS'08, Corpus Linguistics'08, AIS/CAD'08; v2: table 3 changed
null
null
null
cs.IR cs.CL
http://creativecommons.org/licenses/publicdomain/
With the fantastic growth of Internet usage, information search in documents of a special type called a "wiki page" that is written using a simple markup language, has become an important problem. This paper describes the software architectural model for indexing wiki texts in three languages (Russian, English, and German) and the interaction between the software components (GATE, Lemmatizer, and Synarcher). The inverted file index database was designed using visual tool DBDesigner. The rules for parsing Wikipedia texts are illustrated by examples. Two index databases of Russian Wikipedia (RW) and Simple English Wikipedia (SEW) are built and compared. The size of RW is by order of magnitude higher than SEW (number of words, lexemes), though the growth rate of number of pages in SEW was found to be 14% higher than in Russian, and the rate of acquisition of new words in SEW lexicon was 7% higher during a period of five months (from September 2007 to February 2008). The Zipf's law was tested with both Russian and Simple Wikipedias. The entire source code of the indexing software and the generated index databases are freely available under GPL (GNU General Public License).
[ { "version": "v1", "created": "Tue, 12 Aug 2008 23:47:21 GMT" }, { "version": "v2", "created": "Tue, 23 Sep 2008 15:41:44 GMT" } ]
2008-09-23T00:00:00
[ [ "Krizhanovsky", "A. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0808.1762
Zhiqiang Zhang
Yaoyun Shi, Zhiqiang Zhang
Communication Complexities of XOR functions
9 pages
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We call $F:\{0, 1\}^n\times \{0, 1\}^n\to\{0, 1\}$ a symmetric XOR function if for a function $S:\{0, 1, ..., n\}\to\{0, 1\}$, $F(x, y)=S(|x\oplus y|)$, for any $x, y\in\{0, 1\}^n$, where $|x\oplus y|$ is the Hamming weight of the bit-wise XOR of $x$ and $y$. We show that for any such function, (a) the deterministic communication complexity is always $\Theta(n)$ except for four simple functions that have a constant complexity, and (b) up to a polylog factor, the error-bounded randomized and quantum communication complexities are $\Theta(r_0+r_1)$, where $r_0$ and $r_1$ are the minimum integers such that $r_0, r_1\leq n/2$ and $S(k)=S(k+2)$ for all $k\in[r_0, n-r_1)$.
[ { "version": "v1", "created": "Wed, 13 Aug 2008 00:48:36 GMT" }, { "version": "v2", "created": "Wed, 20 Aug 2008 01:35:17 GMT" } ]
2008-08-20T00:00:00
[ [ "Shi", "Yaoyun", "" ], [ "Zhang", "Zhiqiang", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0808.1766
Ping Li
Ping Li
The Optimal Quantile Estimator for Compressed Counting
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed Counting (CC) was recently proposed for very efficiently computing the (approximate) $\alpha$th frequency moments of data streams, where $0<\alpha <= 2$. Several estimators were reported including the geometric mean estimator, the harmonic mean estimator, the optimal power estimator, etc. The geometric mean estimator is particularly interesting for theoretical purposes. For example, when $\alpha -> 1$, the complexity of CC (using the geometric mean estimator) is $O(1/\epsilon)$, breaking the well-known large-deviation bound $O(1/\epsilon^2)$. The case $\alpha\approx 1$ has important applications, for example, computing entropy of data streams. For practical purposes, this study proposes the optimal quantile estimator. Compared with previous estimators, this estimator is computationally more efficient and is also more accurate when $\alpha> 1$.
[ { "version": "v1", "created": "Wed, 13 Aug 2008 01:38:45 GMT" } ]
2008-08-14T00:00:00
[ [ "Li", "Ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0808.1771
Ping Li
Ping Li
A Very Efficient Scheme for Estimating Entropy of Data Streams Using Compressed Counting
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed Counting (CC)} was recently proposed for approximating the $\alpha$th frequency moments of data streams, for $0<\alpha \leq 2$. Under the relaxed strict-Turnstile model, CC dramatically improves the standard algorithm based on symmetric stable random projections}, especially as $\alpha\to 1$. A direct application of CC is to estimate the entropy, which is an important summary statistic in Web/network measurement and often serves a crucial "feature" for data mining. The R\'enyi entropy and the Tsallis entropy are functions of the $\alpha$th frequency moments; and both approach the Shannon entropy as $\alpha\to 1$. A recent theoretical work suggested using the $\alpha$th frequency moment to approximate the Shannon entropy with $\alpha=1+\delta$ and very small $|\delta|$ (e.g., $<10^{-4}$). In this study, we experiment using CC to estimate frequency moments, R\'enyi entropy, Tsallis entropy, and Shannon entropy, on real Web crawl data. We demonstrate the variance-bias trade-off in estimating Shannon entropy and provide practical recommendations. In particular, our experiments enable us to draw some important conclusions: (1) As $\alpha\to 1$, CC dramatically improves {\em symmetric stable random projections} in estimating frequency moments, R\'enyi entropy, Tsallis entropy, and Shannon entropy. The improvements appear to approach "infinity." (2) Using {\em symmetric stable random projections} and $\alpha = 1+\delta$ with very small $|\delta|$ does not provide a practical algorithm because the required sample size is enormous.
[ { "version": "v1", "created": "Wed, 13 Aug 2008 03:05:33 GMT" }, { "version": "v2", "created": "Thu, 21 Aug 2008 17:36:19 GMT" } ]
2008-08-21T00:00:00
[ [ "Li", "Ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0808.1787
Arnab Bhattacharyya
Arnab Bhattacharyya, Elena Grigorescu, Kyomin Jung, Sofya Raskhodnikova, David P. Woodruff
Transitive-Closure Spanners
Extended abstract with appendices
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a directed graph G = (V,E) and an integer k>=1, a k-transitive-closure-spanner (k-TC-spanner) of G is a directed graph H = (V, E_H) that has (1) the same transitive-closure as G and (2) diameter at most k. These spanners were implicitly studied in access control, data structures, and property testing, and properties of these spanners have been rediscovered over the span of 20 years. The main goal in each of these applications is to obtain the sparsest k-TC-spanners. We bring these diverse areas under the unifying framework of TC-spanners. We initiate the study of approximability of the size of the sparsest k-TC-spanner for a given directed graph. We completely resolve the approximability of 2-TC-spanners, showing that it is Theta(log n) unless P = NP. For k>2, we present a polynomial-time algorithm that finds a k-TC-spanner with size within O((n log n)^{1-1/k}) of the optimum. Our algorithmic techniques also yield algorithms with the best-known approximation ratio for well-studied problems on directed spanners when k>3: DIRECTED k-SPANNER, CLIENT/SERVER DIRECTED k-SPANNER, and k-DIAMETER SPANNING SUBGRAPH. For constant k>=3, we show that the size of the sparsest k-TC-spanner is hard to approximate with 2^{log^{1-eps} n} ratio unless NP \subseteq DTIME(n^{polylog n}}). Finally, we study the size of the sparsest k-TC-spanners for H-minor-free graph families. Combining our constructions with our insight that 2-TC-spanners can be used for designing property testers, we obtain a monotonicity tester with O(log^2 n /eps) queries for any poset whose transitive reduction is an H-minor free digraph, improving the Theta(sqrt(n) log n/eps)-queries required of the tester due to Fischer et al (2002).
[ { "version": "v1", "created": "Wed, 13 Aug 2008 06:44:10 GMT" } ]
2008-08-14T00:00:00
[ [ "Bhattacharyya", "Arnab", "" ], [ "Grigorescu", "Elena", "" ], [ "Jung", "Kyomin", "" ], [ "Raskhodnikova", "Sofya", "" ], [ "Woodruff", "David P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0808.1802
Robert Grossman
Robert L. Grossman, Yunhong Gu, Michael Sabala and Wanzhi Zhang
Compute and Storage Clouds Using Wide Area High Performance Networks
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a cloud based infrastructure that we have developed that is optimized for wide area, high performance networks and designed to support data mining applications. The infrastructure consists of a storage cloud called Sector and a compute cloud called Sphere. We describe two applications that we have built using the cloud and some experimental studies.
[ { "version": "v1", "created": "Wed, 13 Aug 2008 09:48:37 GMT" } ]
2008-08-14T00:00:00
[ [ "Grossman", "Robert L.", "" ], [ "Gu", "Yunhong", "" ], [ "Sabala", "Michael", "" ], [ "Zhang", "Wanzhi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0808.1928
Jeffrey Shallit
Janusz Brzozowski, Jeffrey Shallit, and Zhi Xu
Decision Problems For Convex Languages
preliminary version. This version corrected one typo in Section 2.1.1, line 4
Proc. LATA 2009 Conference, LNICS #5457, pp. 247-258
10.1007/978-3-642-00982-2_21
null
cs.CC cs.DM cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we examine decision problems associated with various classes of convex languages, studied by Ang and Brzozowski (under the name "continuous languages"). We show that we can decide whether a given language L is prefix-, suffix-, factor-, or subword-convex in polynomial time if L is represented by a DFA, but that the problem is PSPACE-hard if L is represented by an NFA. In the case that a regular language is not convex, we prove tight upper bounds on the length of the shortest words demonstrating this fact, in terms of the number of states of an accepting DFA. Similar results are proved for some subclasses of convex languages: the prefix-, suffix-, factor-, and subword-closed languages, and the prefix-, suffix-, factor-, and subword-free languages.
[ { "version": "v1", "created": "Thu, 14 Aug 2008 01:50:07 GMT" }, { "version": "v2", "created": "Fri, 12 Dec 2008 17:15:07 GMT" } ]
2009-04-14T00:00:00
[ [ "Brzozowski", "Janusz", "" ], [ "Shallit", "Jeffrey", "" ], [ "Xu", "Zhi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0808.2017
Ittai Abraham
Ittai Abraham, Yair Bartal, and Ofer Neiman
Nearly Tight Low Stretch Spanning Trees
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that any graph $G$ with $n$ points has a distribution $\mathcal{T}$ over spanning trees such that for any edge $(u,v)$ the expected stretch $E_{T \sim \mathcal{T}}[d_T(u,v)/d_G(u,v)]$ is bounded by $\tilde{O}(\log n)$. Our result is obtained via a new approach of building ``highways'' between portals and a new strong diameter probabilistic decomposition theorem.
[ { "version": "v1", "created": "Thu, 14 Aug 2008 15:58:55 GMT" } ]
2008-08-15T00:00:00
[ [ "Abraham", "Ittai", "" ], [ "Bartal", "Yair", "" ], [ "Neiman", "Ofer", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0808.2045
Grenville Croll
Louise Pryor
Correctness is not enough
6 Pages, 1 Table, 2 Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2003 117-122 ISBN 1 86166 199 1
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The usual aim of spreadsheet audit is to verify correctness. There are two problems with this: first, it is often difficult to tell whether the spreadsheets in question are correct, and second, even if they are, they may still give the wrong results. These problems are explained in this paper, which presents the key criteria for judging a spreadsheet and discusses how those criteria can be achieved
[ { "version": "v1", "created": "Thu, 14 Aug 2008 19:03:10 GMT" } ]
2008-08-15T00:00:00
[ [ "Pryor", "Louise", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0808.2059
Deniz Gunduz
Deniz Gunduz, Andrea Goldsmith, H. Vincent Poor
Diversity-Multiplexing Tradeoffs in MIMO Relay Channels
To appear at IEEE Global Communications Conf. (Globecom), New Orleans, LA, Nov. 2008
null
10.1109/GLOCOM.2008.ECP.194
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A multi-hop relay channel with multiple antenna terminals in a quasi-static slow fading environment is considered. For both full-duplex and half-duplex relays the fundamental diversity-multiplexing tradeoff (DMT) is analyzed. It is shown that, while decode-and-forward (DF) relaying achieves the optimal DMT in the full-duplex relay scenario, the dynamic decode-and-forward (DDF) protocol is needed to achieve the optimal DMT if the relay is constrained to half-duplex operation. For the latter case, static protocols are considered as well, and the corresponding achievable DMT performance is characterized.
[ { "version": "v1", "created": "Thu, 14 Aug 2008 20:09:51 GMT" } ]
2016-11-18T00:00:00
[ [ "Gunduz", "Deniz", "" ], [ "Goldsmith", "Andrea", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.2073
Alexandros Dimakis
A. G. Dimakis, M. J. Wainwright, K. Ramchandran
Lower Bounds on the Rate-Distortion Function of LDGM Codes
22 Pages, Submitted for publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A recent line of work has focused on the use of low-density generator matrix (LDGM) codes for lossy source coding. In this paper, wedevelop a generic technique for deriving lower bounds on the rate-distortion functions of binary linear codes, with particular interest on the effect of bounded degrees. The underlying ideas can be viewing as the source coding analog of the classical result of Gallager, providing bounds for channel coding over the binary symmetric channel using bounded degree LDPC codes. We illustrate this method for different random ensembles of LDGM codes, including the check-regular ensemble and bit-check-regular ensembles, by deriving explicit lower bounds on their rate-distortion performance as a function of the degrees.
[ { "version": "v1", "created": "Fri, 15 Aug 2008 00:19:31 GMT" } ]
2008-08-18T00:00:00
[ [ "Dimakis", "A. G.", "" ], [ "Wainwright", "M. J.", "" ], [ "Ramchandran", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.2081
Martin Hoefer
Heiner Ackermann, Petra Berenbrink, Simon Fischer, Martin Hoefer
Concurrent Imitation Dynamics in Congestion Games
28 pages, 1 figure
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Imitating successful behavior is a natural and frequently applied approach to trust in when facing scenarios for which we have little or no experience upon which we can base our decision. In this paper, we consider such behavior in atomic congestion games. We propose to study concurrent imitation dynamics that emerge when each player samples another player and possibly imitates this agents' strategy if the anticipated latency gain is sufficiently large. Our main focus is on convergence properties. Using a potential function argument, we show that our dynamics converge in a monotonic fashion to stable states. In such a state none of the players can improve its latency by imitating somebody else. As our main result, we show rapid convergence to approximate equilibria. At an approximate equilibrium only a small fraction of agents sustains a latency significantly above or below average. In particular, imitation dynamics behave like fully polynomial time approximation schemes (FPTAS). Fixing all other parameters, the convergence time depends only in a logarithmic fashion on the number of agents. Since imitation processes are not innovative they cannot discover unused strategies. Furthermore, strategies may become extinct with non-zero probability. For the case of singleton games, we show that the probability of this event occurring is negligible. Additionally, we prove that the social cost of a stable state reached by our dynamics is not much worse than an optimal state in singleton congestion games with linear latency function. Finally, we discuss how the protocol can be extended such that, in the long run, dynamics converge to a Nash equilibrium.
[ { "version": "v1", "created": "Fri, 15 Aug 2008 02:45:30 GMT" }, { "version": "v2", "created": "Sat, 4 Oct 2008 01:58:08 GMT" } ]
2008-10-04T00:00:00
[ [ "Ackermann", "Heiner", "" ], [ "Berenbrink", "Petra", "" ], [ "Fischer", "Simon", "" ], [ "Hoefer", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0808.2083
Daniel Lemire
Owen Kaser, Daniel Lemire, Kamel Aouiche
Histogram-Aware Sorting for Enhanced Word-Aligned Compression in Bitmap Indexes
To appear in proceedings of DOLAP 2008
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bitmap indexes must be compressed to reduce input/output costs and minimize CPU usage. To accelerate logical operations (AND, OR, XOR) over bitmaps, we use techniques based on run-length encoding (RLE), such as Word-Aligned Hybrid (WAH) compression. These techniques are sensitive to the order of the rows: a simple lexicographical sort can divide the index size by 9 and make indexes several times faster. We investigate reordering heuristics based on computed attribute-value histograms. Simply permuting the columns of the table based on these histograms can increase the sorting efficiency by 40%.
[ { "version": "v1", "created": "Fri, 15 Aug 2008 03:14:55 GMT" }, { "version": "v2", "created": "Tue, 23 Sep 2008 02:54:59 GMT" }, { "version": "v3", "created": "Mon, 19 Jan 2009 15:22:33 GMT" } ]
2009-01-19T00:00:00
[ [ "Kaser", "Owen", "" ], [ "Lemire", "Daniel", "" ], [ "Aouiche", "Kamel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0808.2089
Jialing Liu
Jialing Liu, Nicola Elia, and Sekhar Tatikonda
Capacity-achieving Feedback Scheme for Gaussian Finite-State Markov Channels with Channel State Information
Submitted to the IEEE Transactions on Information Theory. 31 pages
null
10.1109/TIT.2015.2437380
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose capacity-achieving communication schemes for Gaussian finite-state Markov channels (FSMCs) subject to an average channel input power constraint, under the assumption that the transmitters can have access to delayed noiseless output feedback as well as instantaneous or delayed channel state information (CSI). We show that the proposed schemes reveals connections between feedback communication and feedback control.
[ { "version": "v1", "created": "Fri, 15 Aug 2008 03:53:57 GMT" }, { "version": "v2", "created": "Thu, 7 Oct 2010 04:03:25 GMT" } ]
2016-11-18T00:00:00
[ [ "Liu", "Jialing", "" ], [ "Elia", "Nicola", "" ], [ "Tatikonda", "Sekhar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.2092
Hirosuke Yamamoto
Marat V. Burnashev and Hirosuke Yamamoto
On zero-rate error exponent for BSC with noisy feedback
23 Pages including 4 figures
Problems of Information Transmission, vol. 44, no. 3, pp. 33-49, 2008
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the information transmission a binary symmetric channel is used. There is also another noisy binary symmetric channel (feedback channel), and the transmitter observes without delay all the outputs of the forward channel via that feedback channel. The transmission of a nonexponential number of messages (i.e. the transmission rate equals zero) is considered. The achievable decoding error exponent for such a combination of channels is investigated. It is shown that if the crossover probability of the feedback channel is less than a certain positive value, then the achievable error exponent is better than the similar error exponent of the no-feedback channel. The transmission method described and the corresponding lower bound for the error exponent can be strengthened, and also extended to the positive transmission rates.
[ { "version": "v1", "created": "Fri, 15 Aug 2008 04:57:40 GMT" } ]
2008-08-18T00:00:00
[ [ "Burnashev", "Marat V.", "" ], [ "Yamamoto", "Hirosuke", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.2181
Kaibin Huang
Kaibin Huang, Vincent K. N. Lau, Yan Chen
Spectrum Sharing Between Cellular and Mobile Ad Hoc Networks: Transmission-Capacity Trade-Off
23 pages, 7 figures, submitted for publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectrum sharing between wireless networks improves the efficiency of spectrum usage, and thereby alleviates spectrum scarcity due to growing demands for wireless broadband access. To improve the usual underutilization of the cellular uplink spectrum, this paper studies spectrum sharing between a cellular uplink and a mobile ad hoc networks. These networks access either all frequency sub-channels or their disjoint sub-sets, called spectrum underlay and spectrum overlay, respectively. Given these spectrum sharing methods, the capacity trade-off between the coexisting networks is analyzed based on the transmission capacity of a network with Poisson distributed transmitters. This metric is defined as the maximum density of transmitters subject to an outage constraint for a given signal-to-interference ratio (SIR). Using tools from stochastic geometry, the transmission-capacity trade-off between the coexisting networks is analyzed, where both spectrum overlay and underlay as well as successive interference cancelation (SIC) are considered. In particular, for small target outage probability, the transmission capacities of the coexisting networks are proved to satisfy a linear equation, whose coefficients depend on the spectrum sharing method and whether SIC is applied. This linear equation shows that spectrum overlay is more efficient than spectrum underlay. Furthermore, this result also provides insight into the effects of different network parameters on transmission capacities, including link diversity gains, transmission distances, and the base station density. In particular, SIC is shown to increase transmission capacities of both coexisting networks by a linear factor, which depends on the interference-power threshold for qualifying canceled interferers.
[ { "version": "v1", "created": "Fri, 15 Aug 2008 18:35:56 GMT" }, { "version": "v2", "created": "Sat, 16 Aug 2008 07:38:23 GMT" } ]
2008-08-18T00:00:00
[ [ "Huang", "Kaibin", "" ], [ "Lau", "Vincent K. N.", "" ], [ "Chen", "Yan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.2220
Cristian S. Calude
Cristian S. Calude, Nicholas J. Hay
Every Computably Enumerable Random Real Is Provably Computably Enumerable Random
28 pages, minor update. Logic Journal of the IGPL, to appear in 2009
null
null
CDMTCS Research Report 328, 2008
cs.CC cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that every computably enumerable (c.e.) random real is provable in Peano Arithmetic (PA) to be c.e. random. A major step in the proof is to show that the theorem stating that "a real is c.e. and random iff it is the halting probability of a universal prefix-free Turing machine" can be proven in PA. Our proof, which is simpler than the standard one, can also be used for the original theorem. Our positive result can be contrasted with the case of computable functions, where not every computable function is provably computable in PA, or even more interestingly, with the fact that almost all random finite strings are not provably random in PA. We also prove two negative results: a) there exists a universal machine whose universality cannot be proved in PA, b) there exists a universal machine $U$ such that, based on $U$, PA cannot prove the randomness of its halting probability. The paper also includes a sharper form of the Kraft-Chaitin Theorem, as well as a formal proof of this theorem written with the proof assistant Isabelle.
[ { "version": "v1", "created": "Fri, 15 Aug 2008 23:46:48 GMT" }, { "version": "v2", "created": "Sat, 23 Aug 2008 03:33:39 GMT" }, { "version": "v3", "created": "Wed, 10 Sep 2008 16:25:29 GMT" }, { "version": "v4", "created": "Fri, 12 Sep 2008 05:33:16 GMT" }, { "version": "v5", "created": "Sun, 7 Jun 2009 19:50:04 GMT" } ]
2009-06-08T00:00:00
[ [ "Calude", "Cristian S.", "" ], [ "Hay", "Nicholas J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0808.2222
Andrew McGregor
Alexandr Andoni, Andrew McGregor, Krzysztof Onak, Rina Panigrahy
Better Bounds for Frequency Moments in Random-Order Streams
4 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Estimating frequency moments of data streams is a very well studied problem and tight bounds are known on the amount of space that is necessary and sufficient when the stream is adversarially ordered. Recently, motivated by various practical considerations and applications in learning and statistics, there has been growing interest into studying streams that are randomly ordered. In the paper we improve the previous lower bounds on the space required to estimate the frequency moments of a randomly ordered streams.
[ { "version": "v1", "created": "Sat, 16 Aug 2008 00:43:14 GMT" } ]
2008-08-19T00:00:00
[ [ "Andoni", "Alexandr", "" ], [ "McGregor", "Andrew", "" ], [ "Onak", "Krzysztof", "" ], [ "Panigrahy", "Rina", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0808.2227
Chinmoy Bhattacharya
C Bhattacharya
Higher Order Moments Generation by Mellin Transform for Compound Models of Clutter
4pages, 1 figure
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The compound models of clutter statistics are found suitable to describe the nonstationary nature of radar backscattering from high-resolution observations. In this letter, we show that the properties of Mellin transform can be utilized to generate higher order moments of simple and compound models of clutter statistics in a compact manner.
[ { "version": "v1", "created": "Sat, 16 Aug 2008 01:34:48 GMT" } ]
2008-08-19T00:00:00
[ [ "Bhattacharya", "C", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0808.2246
Philipp Mayr
Boris Lauser, Gudrun Johannsen, Caterina Caracciolo, Johannes Keizer, Willem Robert van Hage, Philipp Mayr
Comparing human and automatic thesaurus mapping approaches in the agricultural domain
10 pages, Int'l Conf. on Dublin Core and Metadata Applications 2008
null
10.18452/1251
null
cs.DL
http://creativecommons.org/licenses/by-nc-sa/3.0/
Knowledge organization systems (KOS), like thesauri and other controlled vocabularies, are used to provide subject access to information systems across the web. Due to the heterogeneity of these systems, mapping between vocabularies becomes crucial for retrieving relevant information. However, mapping thesauri is a laborious task, and thus big efforts are being made to automate the mapping process. This paper examines two mapping approaches involving the agricultural thesaurus AGROVOC, one machine-created and one human created. We are addressing the basic question "What are the pros and cons of human and automatic mapping and how can they complement each other?" By pointing out the difficulties in specific cases or groups of cases and grouping the sample into simple and difficult types of mappings, we show the limitations of current automatic methods and come up with some basic recommendations on what approach to use when.
[ { "version": "v1", "created": "Sat, 16 Aug 2008 10:10:21 GMT" } ]
2019-01-15T00:00:00
[ [ "Lauser", "Boris", "" ], [ "Johannsen", "Gudrun", "" ], [ "Caracciolo", "Caterina", "" ], [ "Keizer", "Johannes", "" ], [ "van Hage", "Willem Robert", "" ], [ "Mayr", "Philipp", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0808.2296
Massimiliano Laddomada Ph.D.
Massimiliano Laddomada
Fixed-Point Design of Generalized Comb Filters: A Statistical Approach
10 pages, 10 figures
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is concerned with the problem of designing computationally efficient Generalized Comb Filters (GCF). Basically, GCF filters are anti-aliasing filters that guarantee superior performance in terms of selectivity and quantization noise rejection compared to classical comb filters, when used as decimation filters in multistage architectures. Upon employing a partial polyphase (PP) architecture proposed in a companion paper, we develop a sensitivity analysis in order to investigate the effects of the coefficients' quantization on the frequency response of the designed filters. We show that the sensitivity of the filter response to errors in the coefficients is dependent on the particular split of the decimation factor between the two sub-filters constituting the PP architecture. The sensitivity analysis is then used for developing a fixed-point implementation of a sample filter from the class of GCF filters, used as reference filter throughout the paper. Finally, we present computer simulations in order to evaluate the performance of the designed fixed-point filters.
[ { "version": "v1", "created": "Sun, 17 Aug 2008 15:41:54 GMT" } ]
2008-08-19T00:00:00
[ [ "Laddomada", "Massimiliano", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0808.2314
Sriram Sridharan
Sriram Sridharan, Amin Jafarian, Sriram Vishwanath and Syed A. Jafar
Capacity of Symmetric K-User Gaussian Very Strong Interference Channels
Accepted for publication at Globecom Communications Conference 2008, 5 pages, 2 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies a symmetric K user Gaussian interference channel with K transmitters and K receivers. A "very strong" interference regime is derived for this channel setup. A "very strong" interference regime is one where the capacity region of the interference channel is the same as the capacity region of the channel with no interference. In this regime, the interference can be perfectly canceled by all the receivers without incurring any rate penalties. A "very strong" interference condition for an example symmetric K user deterministic interference channel is also presented.
[ { "version": "v1", "created": "Sun, 17 Aug 2008 21:54:37 GMT" } ]
2008-08-19T00:00:00
[ [ "Sridharan", "Sriram", "" ], [ "Jafarian", "Amin", "" ], [ "Vishwanath", "Sriram", "" ], [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.2325
Michael Neufeld
Michael Neufeld and Craig Partridge
Networking in the Physical World
13 pages, 4 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we propose a network meta-architecture based on fundamental laws of physics and a physical model of computation. This meta-architecture may be used to frame discussions about novel network architectures as well as cross-layer alterations to the canonical network stack.
[ { "version": "v1", "created": "Mon, 18 Aug 2008 00:51:57 GMT" } ]
2008-08-19T00:00:00
[ [ "Neufeld", "Michael", "" ], [ "Partridge", "Craig", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0808.2417
Jeffrey Shallit
Jui-Yi Kao, Narad Rampersad, and Jeffrey Shallit
On NFAs Where All States are Final, Initial, or Both
submitted
null
null
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We examine questions involving nondeterministic finite automata where all states are final, initial, or both initial and final. First, we prove hardness results for the nonuniversality and inequivalence problems for these NFAs. Next, we characterize the languages accepted. Finally, we discuss some state complexity problems involving such automata.
[ { "version": "v1", "created": "Mon, 18 Aug 2008 16:11:16 GMT" }, { "version": "v2", "created": "Fri, 3 Jul 2009 15:24:45 GMT" } ]
2009-07-03T00:00:00
[ [ "Kao", "Jui-Yi", "" ], [ "Rampersad", "Narad", "" ], [ "Shallit", "Jeffrey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0808.2428
Philip Davis
Philip M. Davis
Author-choice open access publishing in the biological and medical literature: a citation analysis
citation changes; final manuscript
JASIST, 60(1):3-8, 2008
10.1002/asi.20965
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we analyze the citations to articles published in 11 biological and medical journals from 2003 to 2007 that employ author-choice open access models. Controlling for known explanatory predictors of citations, only 2 of the 11 journals show positive and significant open access effects. Analyzing all journals together, we report a small but significant increase in article citations of 17%. In addition, there is strong evidence to suggest that the open access advantage is declining by about 7% per year, from 32% in 2004 to 11% in 2007.
[ { "version": "v1", "created": "Mon, 18 Aug 2008 17:02:59 GMT" }, { "version": "v2", "created": "Thu, 18 Sep 2008 02:24:03 GMT" }, { "version": "v3", "created": "Fri, 12 Dec 2008 19:08:51 GMT" } ]
2009-09-29T00:00:00
[ [ "Davis", "Philip M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0808.2431
Frederic Connes
Frederic Connes
A Simple E-Voting Protocol
8 pages, 2 figures
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an e-voting protocol that seems to allow citizens to verify that their vote has been accurately taken into account while preserving its secrecy, without requiring the use of a complex process. The main idea is to give each voter a receipt on which her choice is mixed with the choices of other voters.
[ { "version": "v1", "created": "Mon, 18 Aug 2008 17:19:40 GMT" } ]
2008-08-19T00:00:00
[ [ "Connes", "Frederic", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0808.2486
Guillermo Morales-Luna
Michail Zubarev, Valery Korzhik and Guillermo Morales-Luna
Wet Paper Coding for Watermarking of Binary Images
null
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new method to embed data in binary images, including scanned text, figures, and signatures. Our method relies on the concept of wet paper codes. The shuffling before embedding is used in order to equalize irregular embedding capacity from diverse areas in the image. The hidden data can be extracted without the original binary image. We illustrate some examples of watermarked binary images after wet paper coding.
[ { "version": "v1", "created": "Mon, 18 Aug 2008 21:10:09 GMT" } ]
2008-08-20T00:00:00
[ [ "Zubarev", "Michail", "" ], [ "Korzhik", "Valery", "" ], [ "Morales-Luna", "Guillermo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.2515
Shashi Kiran Chilappagari
Shashi Kiran Chilappagari, Michael Chertkov and Bane Vasic
Provably efficient instanton search algorithm for LP decoding of LDPC codes over the BSC
Submitted to IEEE Transactions on Information Theory. 9 Pages, 4 Figures; Dr. Bane Vasic added as an author; Changes made to the introduction and abstract; Acknowledgment section added; Some references added; Figures modified to make them more clear;
null
null
LA-UR-08-05304
cs.IT cond-mat.stat-mech math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider Linear Programming (LP) decoding of a fixed Low-Density Parity-Check (LDPC) code over the Binary Symmetric Channel (BSC). The LP decoder fails when it outputs a pseudo-codeword which is not a codeword. We design an efficient algorithm termed the Instanton Search Algorithm (ISA) which, given a random input, generates a set of flips called the BSC-instanton. We prove that: (a) the LP decoder fails for any set of flips with support vector including an instanton; (b) for any input, the algorithm outputs an instanton in the number of steps upper-bounded by twice the number of flips in the input. Repeated sufficient number of times, the ISA outcomes the number of unique instantons of different sizes.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 01:08:07 GMT" }, { "version": "v2", "created": "Tue, 2 Sep 2008 18:52:37 GMT" } ]
2008-09-02T00:00:00
[ [ "Chilappagari", "Shashi Kiran", "" ], [ "Chertkov", "Michael", "" ], [ "Vasic", "Bane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.2530
Srikanth Jagabathula
Srikanth Jagabathula, Devavrat Shah
Fair Scheduling in Networks Through Packet Election
14 pages (double column), submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2010.2103851
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of designing a fair scheduling algorithm for discrete-time constrained queuing networks. Each queue has dedicated exogenous packet arrivals. There are constraints on which queues can be served simultaneously. This model effectively describes important special instances like network switches, interference in wireless networks, bandwidth sharing for congestion control and traffic scheduling in road roundabouts. Fair scheduling is required because it provides isolation to different traffic flows; isolation makes the system more robust and enables providing quality of service. Existing work on fairness for constrained networks concentrates on flow based fairness. As a main result, we describe a notion of packet based fairness by establishing an analogy with the ranked election problem: packets are voters, schedules are candidates and each packet ranks the schedules based on its priorities. We then obtain a scheduling algorithm that achieves the described notion of fairness by drawing upon the seminal work of Goodman and Markowitz (1952). This yields the familiar Maximum Weight (MW) style algorithm. As another important result we prove that algorithm obtained is throughput optimal. There is no reason a priori why this should be true, and the proof requires non-traditional methods.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 05:33:35 GMT" }, { "version": "v2", "created": "Tue, 21 Sep 2010 04:56:47 GMT" } ]
2016-11-17T00:00:00
[ [ "Jagabathula", "Srikanth", "" ], [ "Shah", "Devavrat", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.2543
Carsten Schneider
Carsten Schneider
A Refined Difference Field Theory for Symbolic Summation
Uses elseart.cls and yjsco.sty
J. Symbolic Comput. 43(9), pp. 611-644. 2008
10.1016/j.jsc.2008.01.001
SFB F013, J. Kepler University Linz. Technical report no. 2007-24
cs.SC math-ph math.CO math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we present a refined summation theory based on Karr's difference field approach. The resulting algorithms find sum representations with optimal nested depth. For instance, the algorithms have been applied successively to evaluate Feynman integrals from Perturbative Quantum Field Theory.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 07:46:04 GMT" } ]
2008-09-02T00:00:00
[ [ "Schneider", "Carsten", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0808.2544
Dalia Krieger
Yann Bugeaud, Dalia Krieger, Jeffrey Shallit
Morphic and Automatic Words: Maximal Blocks and Diophantine Approximation
16 pages, 1 figure
null
null
null
math.CO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $\mb w$ be a morphic word over a finite alphabet $\Sigma$, and let $\Delta$ be a nonempty subset of $\Sigma$. We study the behavior of maximal blocks consisting only of letters from $\Delta$ in $\mb w$, and prove the following: let $(i_k,j_k)$ denote the starting and ending positions, respectively, of the $k$'th maximal $\Delta$-block in $\mb w$. Then $\limsup_{k\to\infty} (j_k/i_k)$ is algebraic if $\mb w$ is morphic, and rational if $\mb w$ is automatic. As a result, we show that the same conclusion holds if $(i_k,j_k)$ are the starting and ending positions of the $k$'th maximal zero block, and, more generally, of the $k$'th maximal $x$-block, where $x$ is an arbitrary word. This enables us to draw conclusions about the irrationality exponent of automatic and morphic numbers. In particular, we show that the irrationality exponent of automatic (resp., morphic) numbers belonging to a certain class that we define is rational (resp., algebraic).
[ { "version": "v1", "created": "Tue, 19 Aug 2008 07:46:26 GMT" }, { "version": "v2", "created": "Thu, 16 Apr 2009 09:37:40 GMT" } ]
2009-04-16T00:00:00
[ [ "Bugeaud", "Yann", "" ], [ "Krieger", "Dalia", "" ], [ "Shallit", "Jeffrey", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0808.2548
Tohru Kohda
Tohru Kohda, Satoshi Hironaka, and Kazuyuki Aihara
Negative Beta Encoder
18 pages, 26 figures, submitted to IEEE Tran. Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new class of analog-to-digital (A/D) and digital-to-analog (D/A) converters using a flaky quantiser, called the $\beta$-encoder, has been shown to have exponential bit rate accuracy while possessing a self-correction property for fluctuations of the amplifier factor $\beta$ and the quantiser threshold $\nu$. The probabilistic behavior of such a flaky quantiser is explained as the deterministic dynamics of the multi-valued R\'enyi map. That is, a sample $x$ is always confined to a contracted subinterval while successive approximations of $x$ are performed using $\beta$-expansion even if $\nu$ may vary at each iteration. This viewpoint enables us to get the decoded sample, which is equal to the midpoint of the subinterval, and its associated characteristic equation for recovering $\beta$ which improves the quantisation error by more than $3{dB}$ when $\beta>1.5$. The invariant subinterval under the R\'enyi map shows that $\nu$ should be set to around the midpoint of its associated greedy and lazy values. %in terms of its quantisation MSE (mean square error). Furthermore, a new A/D converter is introduced called the negative $\beta$-encoder, which further improves the quantisation error of the $\beta$-encoder. A two-state Markov chain describing the $\beta$-encoder suggests that a negative eigenvalue of its associated transition probability matrix reduces the quantisation error.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 08:18:21 GMT" }, { "version": "v2", "created": "Tue, 28 Jul 2009 06:47:37 GMT" } ]
2009-07-28T00:00:00
[ [ "Kohda", "Tohru", "" ], [ "Hironaka", "Satoshi", "" ], [ "Aihara", "Kazuyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.2562
Yonghong Zeng
Yonghong Zeng and Ying-Chang Liang
Spectrum Sensing Algorithms for Cognitive Radio Based on Statistical Covariances
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectrum sensing, i.e., detecting the presence of primary users in a licensed spectrum, is a fundamental problem in cognitive radio. Since the statistical covariances of received signal and noise are usually different, they can be used to differentiate the case where the primary user's signal is present from the case where there is only noise. In this paper, spectrum sensing algorithms are proposed based on the sample covariance matrix calculated from a limited number of received signal samples. Two test statistics are then extracted from the sample covariance matrix. A decision on the signal presence is made by comparing the two test statistics. Theoretical analysis for the proposed algorithms is given. Detection probability and associated threshold are found based on statistical theory. The methods do not need any information of the signal, the channel and noise power a priori. Also, no synchronization is needed. Simulations based on narrowband signals, captured digital television (DTV) signals and multiple antenna signals are presented to verify the methods.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 09:46:41 GMT" } ]
2016-09-08T00:00:00
[ [ "Zeng", "Yonghong", "" ], [ "Liang", "Ying-Chang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.2584
Tie Hou
Tie Hou
On Transformations of Load-Store Maurer Instruction Set Architecture
14 pages, 6 figures; Corrected way of citing references
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study how certain conditions can affect the transformations on the states of the memory of a strict load-store Maurer ISA, when half of the data memory serves as the part of the operating unit.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 12:31:07 GMT" }, { "version": "v2", "created": "Tue, 20 Jan 2009 15:23:07 GMT" } ]
2009-01-20T00:00:00
[ [ "Hou", "Tie", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0808.2586
Panos Papadimitratos
Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux
Towards Provable Secure Neighbor Discovery in Wireless Networks
null
ACM Computer and Communications Security Conference (CCS) Sixth Workshop on Formal Methods in Security Engineering (FMSE), pages 31{42, Alexan- dria, VA, USA, October 2008
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocols and a wide range of applications. To thwart abuse of ND and the resultant compromise of the dependent functionality of wireless systems, numerous works proposed solutions to secure ND. Nonetheless, until very recently, there has been no formal analysis of secure ND protocols. We close this gap in \cite{asiaccs08}, but we concentrate primarily on the derivation of an impossibility result for a class of protocols. In this paper, we focus on reasoning about specific protocols. First, we contribute a number of extensions and refinements on the framework of [24]. As we are particularly concerned with the practicality of provably secure ND protocols, we investigate availability and redefine accordingly the ND specification, and also consider composability of ND with other protocols. Then, we propose and analyze two secure ND protocols: We revisit one of the protocols analyzed in [24], and introduce and prove correct a more elaborate challenge-response protocol.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 12:45:58 GMT" } ]
2009-01-05T00:00:00
[ [ "Poturalski", "Marcin", "" ], [ "Papadimitratos", "Panos", "" ], [ "Hubaux", "Jean-Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0808.2591
Panos Papadimitratos
Jun Luo, Panos Papadimitratos and Jean-Pierre Hubaux
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
null
Proceedings of the Fifth IEEE-CS Conference on Sensor, Mesh and Ad Hoc Communi- cations and Networks (IEEE SECON), pages 441{450, San Francisco, CA, USA, June 2008
10.1109/SAHCN.2008.60
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adversary, which seeks to exploit sensor networks by obtaining measurements in an unauthorized way. Our low-complexity solution, GossiCrypt, leverages on the large scale of sensor networks to protect confidentiality efficiently and effectively. GossiCrypt protects data by symmetric key encryption at their source nodes and re-encryption at a randomly chosen subset of nodes en route to the sink. Furthermore, it employs key refreshing to mitigate the physical compromise of cryptographic keys. We validate GossiCrypt analytically and with simulations, showing it protects data confidentiality with probability almost one. Moreover, compared with a system that uses public-key data encryption, the energy consumption of GossiCrypt is one to three orders of magnitude lower.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 13:23:21 GMT" } ]
2016-11-17T00:00:00
[ [ "Luo", "Jun", "" ], [ "Papadimitratos", "Panos", "" ], [ "Hubaux", "Jean-Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0808.2596
Carsten Schneider
Carsten Schneider
Parameterized Telescoping Proves Algebraic Independence of Sums
To appear in Annals of Combinatorics
null
null
SFB F013, J. Kepler University Linz. Technical report no. 2006-40, 2006
cs.SC math.CO math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Usually creative telescoping is used to derive recurrences for sums. In this article we show that the non-existence of a creative telescoping solution, and more generally, of a parameterized telescoping solution, proves algebraic independence of certain types of sums. Combining this fact with summation-theory shows transcendence of whole classes of sums. Moreover, this result throws new light on the question why, e.g., Zeilberger's algorithm fails to find a recurrence with minimal order.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 13:58:01 GMT" } ]
2008-09-02T00:00:00
[ [ "Schneider", "Carsten", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0808.2602
Nick Stukach
Nick Stukach
Easily testable logical networks based on a 'widened long flip-flop'
64 pages, including 35 figures and 10 tables
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article describes an attempt to solve at once three basic problems arising at testing a complex digital equipment for defects: 1) the problem of an exponential increasing of the complexity of testing the equipment with the complexity of the equipment; 2) the problem of testing of the tester; 3) the problem of a mutual masking of defects. The proposed solution is nothing more than using certain limitations for connections between usual logical gates. Arbitrary multiple stuck-at-faults are supposed as defects.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 14:44:05 GMT" }, { "version": "v2", "created": "Wed, 20 Aug 2008 21:16:55 GMT" } ]
2008-08-21T00:00:00
[ [ "Stukach", "Nick", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0808.2654
Panos Papadimitratos
Panos Papadimitratos and Jean-Pierre Hubaux
Report on the "Secure Vehicular Communications: Results and Challenges Ahead" Workshop
null
ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), 12(2):53-64, April 2008
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is a report and a collection of abstracts from the Feb. 2008 Lausanne Workshop on Secure Vehicular Communication Systems.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 21:02:41 GMT" } ]
2009-01-05T00:00:00
[ [ "Papadimitratos", "Panos", "" ], [ "Hubaux", "Jean-Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0808.2659
Dinesh Krithivasan
Dinesh Krithivasan and S. Sandeep Pradhan
Distributed Source Coding using Abelian Group Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we consider a distributed source coding problem with a joint distortion criterion depending on the sources and the reconstruction. This includes as a special case the problem of computing a function of the sources to within some distortion and also the classic Slepian-Wolf problem, Berger-Tung problem, Wyner-Ziv problem, Yeung-Berger problem and the Ahlswede-Korner-Wyner problem. While the prevalent trend in information theory has been to prove achievability results using Shannon's random coding arguments, using structured random codes offer rate gains over unstructured random codes for many problems. Motivated by this, we present a new achievable rate-distortion region for this problem for discrete memoryless sources based on "good" structured random nested codes built over abelian groups. We demonstrate rate gains for this problem over traditional coding schemes using random unstructured codes. For certain sources and distortion functions, the new rate region is strictly bigger than the Berger-Tung rate region, which has been the best known achievable rate region for this problem till now. Further, there is no known unstructured random coding scheme that achieves these rate gains. Achievable performance limits for single-user source coding using abelian group codes are also obtained as parts of the proof of the main coding theorem. As a corollary, we also prove that nested linear codes achieve the Shannon rate-distortion bound in the single-user setting.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 21:17:57 GMT" } ]
2008-08-21T00:00:00
[ [ "Krithivasan", "Dinesh", "" ], [ "Pradhan", "S. Sandeep", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0808.2662
Andrew Drucker
Andrew Drucker
Multitask Efficiencies in the Decision Tree Model
Improved exposition based on conference version
24th Annual IEEE Conference on Computational Complexity, 2009, p. 286-297
10.1109/CCC.2009.33
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Direct Sum problems [KRW], one tries to show that for a given computational model, the complexity of computing a collection of finite functions on independent inputs is approximately the sum of their individual complexities. In this paper, by contrast, we study the diversity of ways in which the joint computational complexity can behave when all the functions are evaluated on a common input. We focus on the deterministic decision tree model, with depth as the complexity measure; in this model we prove a result to the effect that the 'obvious' constraints on joint computational complexity are essentially the only ones. The proof uses an intriguing new type of cryptographic data structure called a `mystery bin' which we construct using a small polynomial separation between deterministic and unambiguous query complexity shown by Savicky. We also pose a variant of the Direct Sum Conjecture of [KRW] which, if proved for a single family of functions, could yield an analogous result for models such as the communication model.
[ { "version": "v1", "created": "Wed, 20 Aug 2008 11:15:33 GMT" }, { "version": "v2", "created": "Sun, 31 Aug 2008 21:55:04 GMT" }, { "version": "v3", "created": "Wed, 13 Jan 2010 02:43:13 GMT" } ]
2016-11-17T00:00:00
[ [ "Drucker", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0808.2666
Panos Papadimitratos
Panos Papadimitratos, Giorgio Calandriello, Jean-Pierre Hubaux and Antonio Lioy
Impact of Vehicular Communications Security on Transportation Safety
null
IEEE Conference on Computer Communications (INFOCOM) Workshop on Mobile Networking for Vehicular Environments (MOVE), pp. 1-6, Phoenix, AZ, USA, April 2008
10.1109/INFOCOM.2008.4544663
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transportation safety, one of the main driving forces of the development of vehicular communication (VC) systems, relies on high-rate safety messaging (beaconing). At the same time, there is consensus among authorities, industry, and academia on the need to secure VC systems. With specific proposals in the literature, a critical question must be answered: can secure VC systems be practical and satisfy the requirements of safety applications, in spite of the significant communication and processing overhead and other restrictions security and privacy-enhancing mechanisms impose? To answer this question, we investigate in this paper the following three dimensions for secure and privacy-enhancing VC schemes: the reliability of communication, the processing overhead at each node, and the impact on a safety application. The results indicate that with the appropriate system design, including sufficiently high processing power, applications enabled by secure VC can be in practice as effective as those enabled by unsecured VC.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 22:35:37 GMT" } ]
2016-11-17T00:00:00
[ [ "Papadimitratos", "Panos", "" ], [ "Calandriello", "Giorgio", "" ], [ "Hubaux", "Jean-Pierre", "" ], [ "Lioy", "Antonio", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]