id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0808.2668 | Panos Papadimitratos | Marcin Poturalski, Panos Papadimitratos and Jean-Pierre Hubaux | Secure Neighbor Discovery in Wireless Networks: Formal Investigation of
Possibility | null | ACM Symposium on Information, Computer and Communications Security
(ASIACCS), pages 189{200, Tokyo, Japan, March 2008 | null | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless communication enables a broad spectrum of applications, ranging from
commodity to tactical systems. Neighbor discovery (ND), that is, determining
which devices are within direct radio communication, is a building block of
network protocols and applications, and its vulnerability can severely
compromise their functionalities. A number of proposals to secure ND have been
published, but none have analyzed the problem formally. In this paper, we
contribute such an analysis: We build a formal model capturing salient
characteristics of wireless systems, most notably obstacles and interference,
and we provide a specification of a basic variant of the ND problem. Then, we
derive an impossibility result for a general class of protocols we term
"time-based protocols," to which many of the schemes in the literature belong.
We also identify the conditions under which the impossibility result is lifted.
Moreover, we explore a second class of protocols we term "time- and
location-based protocols," and prove they can secure ND.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 22:54:32 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"Poturalski",
"Marcin",
""
],
[
"Papadimitratos",
"Panos",
""
],
[
"Hubaux",
"Jean-Pierre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.2669 | Scott Aaronson | Scott Aaronson and John Watrous | Closed Timelike Curves Make Quantum and Classical Computing Equivalent | 15 pages | null | 10.1098/rspa.2008.0350 | null | quant-ph cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While closed timelike curves (CTCs) are not known to exist, studying their
consequences has led to nontrivial insights in general relativity, quantum
information, and other areas. In this paper we show that if CTCs existed, then
quantum computers would be no more powerful than classical computers: both
would have the (extremely large) power of the complexity class PSPACE,
consisting of all problems solvable by a conventional computer using a
polynomial amount of memory. This solves an open problem proposed by one of us
in 2005, and gives an essentially complete understanding of computational
complexity in the presence of CTCs. Following the work of Deutsch, we treat a
CTC as simply a region of spacetime where a "causal consistency" condition is
imposed, meaning that Nature has to produce a (probabilistic or quantum)
fixed-point of some evolution operator. Our conclusion is then a consequence of
the following theorem: given any quantum circuit (not necessarily unitary), a
fixed-point of the circuit can be (implicitly) computed in polynomial space.
This theorem might have independent applications in quantum information.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 23:04:28 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Aaronson",
"Scott",
""
],
[
"Watrous",
"John",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0808.2670 | Mat\'u\v{s} Medo | Tao Zhou, Zoltan Kuscsik, Jian-Guo Liu, Matus Medo, Joseph R.
Wakeling, Yi-Cheng Zhang | Solving the apparent diversity-accuracy dilemma of recommender systems | 10 pages, 9 figures, 4 tables (final version with supporting
information included) | PNAS 107, 4511-4515, 2010 | 10.1073/pnas.1000488107 | null | cs.IR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recommender systems use data on past user preferences to predict possible
future likes and interests. A key challenge is that while the most useful
individual recommendations are to be found among diverse niche objects, the
most reliably accurate results are obtained by methods that recommend objects
based on user or object similarity. In this paper we introduce a new algorithm
specifically to address the challenge of diversity and show how it can be used
to resolve this apparent dilemma when combined in an elegant hybrid with an
accuracy-focused algorithm. By tuning the hybrid appropriately we are able to
obtain, without relying on any semantic or context-specific information,
simultaneous gains in both accuracy and diversity of recommendations.
| [
{
"version": "v1",
"created": "Tue, 19 Aug 2008 23:17:40 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Mar 2009 16:14:59 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Mar 2010 16:27:39 GMT"
}
]
| 2010-03-15T00:00:00 | [
[
"Zhou",
"Tao",
""
],
[
"Kuscsik",
"Zoltan",
""
],
[
"Liu",
"Jian-Guo",
""
],
[
"Medo",
"Matus",
""
],
[
"Wakeling",
"Joseph R.",
""
],
[
"Zhang",
"Yi-Cheng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0808.2676 | Panos Papadimitratos | P. Haghani, P. Papadimitratos, M. Poturalski, K. Aberer, J.-P. Hubaux | Efficient and Robust Secure Aggregation for Sensor Networks | null | IEEE ICNP Workshop on Secure Network Protocols (NPSec), pages 1{6,
Beijing, China, October 2007 | 10.1109/NPSEC.2007.4371623 | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless Sensor Networks (WSNs) rely on in-network aggregation for
efficiency, however, this comes at a price: A single adversary can severely
influence the outcome by contributing an arbitrary partial aggregate value.
Secure in-network aggregation can detect such manipulation. But as long as such
faults persist, no aggregation result can be obtained. In contrast, the
collection of individual sensor node values is robust and solves the problem of
availability, yet in an inefficient way. Our work seeks to bridge this gap in
secure data collection: We propose a system that enhances availability with an
efficiency close to that of in-network aggregation. To achieve this, our scheme
relies on costly operations to localize and exclude nodes that manipulate the
aggregation, but \emph{only} when a failure is detected. The detection of
aggregation disruptions and the removal of faulty nodes provides robustness. At
the same time, after removing faulty nodes, the WSN can enjoy low cost (secure)
aggregation. Thus, the high exclusion cost is amortized, and efficiency
increases.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2008 00:25:37 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Haghani",
"P.",
""
],
[
"Papadimitratos",
"P.",
""
],
[
"Poturalski",
"M.",
""
],
[
"Aberer",
"K.",
""
],
[
"Hubaux",
"J. -P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.2703 | Alfonso Martinez | Alfonso Martinez | Low-Signal-Energy Asymptotics of Capacity and Mutual Information for the
Discrete-Time Poisson Channel | Submitted to IEEE Trans. Inf. Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The first terms of the low-signal-energy asymptotics for the mutual
information in the discrete-time Poisson channel are derived and compared to an
asymptotic expression of the capacity. In the presence of non-zero additive
noise (either Poisson or geometric), the mutual information is concave at zero
signal-energy and the minimum energy per bit is not attained at zero capacity.
Fixed signal constellations which scale with the signal energy do not attain
the minimum energy per bit. The minimum energy per bit is zero when additive
Poisson noise is present and $\ew\log 2$ when additive geometric noise of mean
$\ew$ is present.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2008 07:43:18 GMT"
}
]
| 2008-08-21T00:00:00 | [
[
"Martinez",
"Alfonso",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2794 | Julien Langou | Marc Baboulin, Alfredo Buttari, Jack Dongarra, Jakub Kurzak, Julie
Langou, Julien Langou, Piotr Luszczek, and Stanimire Tomov | Accelerating Scientific Computations with Mixed Precision Algorithms | null | null | 10.1016/j.cpc.2008.11.005 | null | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | On modern architectures, the performance of 32-bit operations is often at
least twice as fast as the performance of 64-bit operations. By using a
combination of 32-bit and 64-bit floating point arithmetic, the performance of
many dense and sparse linear algebra algorithms can be significantly enhanced
while maintaining the 64-bit accuracy of the resulting solution. The approach
presented here can apply not only to conventional processors but also to other
technologies such as Field Programmable Gate Arrays (FPGA), Graphical
Processing Units (GPU), and the STI Cell BE processor. Results on modern
processor architectures and the STI Cell BE are presented.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2008 17:50:36 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Baboulin",
"Marc",
""
],
[
"Buttari",
"Alfredo",
""
],
[
"Dongarra",
"Jack",
""
],
[
"Kurzak",
"Jakub",
""
],
[
"Langou",
"Julie",
""
],
[
"Langou",
"Julien",
""
],
[
"Luszczek",
"Piotr",
""
],
[
"Tomov",
"Stanimire",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0808.2801 | Constantinos Daskalakis | Constantinos Daskalakis, Christos H. Papadimitriou | Discretized Multinomial Distributions and Nash Equilibria in Anonymous
Games | In the 49th Annual IEEE Symposium on Foundations of Computer Science,
FOCS 2008 | null | 10.1109/FOCS.2008.84 | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that there is a polynomial-time approximation scheme for computing
Nash equilibria in anonymous games with any fixed number of strategies (a very
broad and important class of games), extending the two-strategy result of
Daskalakis and Papadimitriou 2007. The approximation guarantee follows from a
probabilistic result of more general interest: The distribution of the sum of n
independent unit vectors with values ranging over {e1, e2, ...,ek}, where ei is
the unit vector along dimension i of the k-dimensional Euclidean space, can be
approximated by the distribution of the sum of another set of independent unit
vectors whose probabilities of obtaining each value are multiples of 1/z for
some integer z, and so that the variational distance of the two distributions
is at most eps, where eps is bounded by an inverse polynomial in z and a
function of k, but with no dependence on n. Our probabilistic result specifies
the construction of a surprisingly sparse eps-cover -- under the total
variation distance -- of the set of distributions of sums of independent unit
vectors, which is of interest on its own right.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2008 19:12:40 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Daskalakis",
"Constantinos",
""
],
[
"Papadimitriou",
"Christos H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0808.2827 | Louis Yu Lu | Louis Yu Lu | Fast Intrinsic Mode Decomposition and Filtering of Time Series Data | Add filtering method and compare the results with different
initialization | null | null | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The intrinsic mode function (IMF) provides adaptive function bases for
nonlinear and non-stationary time series data. A fast convergent iterative
method is introduced in this paper to find the IMF components of the data, the
method is faster and more predictable than the Empirical Mode Decomposition
method devised by the author of Hilbert Huang Transform. The approach is to
iteratively adjust the control points on the data function corresponding to the
extrema of the refining IMF, the control points of the residue function are
calculated as the median of the straight line segments passing through the data
control points, the residue function is then constructed as the cubic spline
function of the median points. The initial residue function is simply
constructed as the straight line segments passing through the extrema of the
first derivative of the data function. The refining IMF is the difference
between the data function and the improved residue function. The IMF found
reveals all the riding waves in the whole data set. A new data filtering method
on frequency and amplitude of IMF is also presented with the similar approach
of finding the residue on the part to be filtered out. The program to
demonstrate the method is distributed under BSD open source license.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2008 21:42:41 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Aug 2008 02:35:42 GMT"
},
{
"version": "v3",
"created": "Thu, 11 Sep 2008 18:00:05 GMT"
}
]
| 2008-09-11T00:00:00 | [
[
"Lu",
"Louis Yu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0808.2833 | Alexander Sch\"onhuth | Ulrich Faigle, Alexander Sch\"onhuth | Efficient tests for equivalence of hidden Markov processes and quantum
random walks | 16 pages, requires llncs.cls | IEEE Transactions on Information Theory, 57(3), 1746-1753, 2011 | 10.1109/TIT.2011.2104511 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While two hidden Markov process (HMP) resp. quantum random walk (QRW)
parametrizations can differ from one another, the stochastic processes arising
from them can be equivalent. Here a polynomial-time algorithm is presented
which can determine equivalence of two HMP parametrizations $\cM_1,\cM_2$ resp.
two QRW parametrizations $\cQ_1,\cQ_2$ in time $O(|\S|\max(N_1,N_2)^{4})$,
where $N_1,N_2$ are the number of hidden states in $\cM_1,\cM_2$ resp. the
dimension of the state spaces associated with $\cQ_1,\cQ_2$, and $\S$ is the
set of output symbols. Previously available algorithms for testing equivalence
of HMPs were exponential in the number of hidden states. In case of QRWs,
algorithms for testing equivalence had not yet been presented. The core
subroutines of this algorithm can also be used to efficiently test hidden
Markov processes and quantum random walks for ergodicity.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2008 22:53:12 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Oct 2008 20:10:32 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Feb 2009 16:50:06 GMT"
},
{
"version": "v4",
"created": "Tue, 10 Aug 2010 07:51:11 GMT"
},
{
"version": "v5",
"created": "Thu, 4 Nov 2010 23:55:44 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Faigle",
"Ulrich",
""
],
[
"Schönhuth",
"Alexander",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2837 | Pascal Vontobel | Ron M. Roth, Pascal O. Vontobel | List Decoding of Burst Errors | Submitted to IEEE Transactions on Information Theory, August 19, 2008 | null | null | null | cs.IT cs.DM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A generalization of the Reiger bound is presented for the list decoding of
burst errors. It is then shown that Reed-Solomon codes attain this bound.
| [
{
"version": "v1",
"created": "Thu, 21 Aug 2008 04:15:27 GMT"
}
]
| 2008-08-22T00:00:00 | [
[
"Roth",
"Ron M.",
""
],
[
"Vontobel",
"Pascal O.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2904 | Reginald Smith | Reginald D. Smith | Investigation of the Zipf-plot of the extinct Meroitic language | 10 pages, 2 figures | Glottometrics 15, 2007, 53-61 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ancient and extinct language Meroitic is investigated using Zipf's Law.
In particular, since Meroitic is still undeciphered, the Zipf law analysis
allows us to assess the quality of current texts and possible avenues for
future investigation using statistical techniques.
| [
{
"version": "v1",
"created": "Thu, 21 Aug 2008 10:54:54 GMT"
}
]
| 2008-08-22T00:00:00 | [
[
"Smith",
"Reginald D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0808.2931 | Gennady Pustylnik | Gennady Pustylnik | Spatial planning with constraints on translational distances between
geometric objects | 33 pages, 16 figures | null | null | null | cs.CG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main constraint on relative position of geometric objects, used in
spatial planning for computing the C-space maps (for example, in robotics, CAD,
and packaging), is the relative non-overlapping of objects. This is the
simplest constraint in which the minimum translational distance between objects
is greater than zero, or more generally, than some positive value. We present a
technique, based on the Minkowski operations, for generating the translational
C-space maps for spatial planning with more general and more complex
constraints on the relative position of geometric objects, such as constraints
on various types (not only on the minimum) of the translational distances
between objects. The developed technique can also be used, respectively, for
spatial planning with constraints on translational distances in a given
direction, and rotational distances between geometric objects, as well as for
spatial planning with given dynamic geometric situation of moving objects.
| [
{
"version": "v1",
"created": "Thu, 21 Aug 2008 14:00:36 GMT"
}
]
| 2008-08-22T00:00:00 | [
[
"Pustylnik",
"Gennady",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0808.2953 | Paul Tarau | Paul Tarau | Declarative Combinatorics: Isomorphisms, Hylomorphisms and Hereditarily
Finite Data Types in Haskell | unpublished draft, revision 3, added various new encodings, with
focus on primes and multisets, now 104 pages | null | null | null | cs.PL cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is an exploration in a functional programming framework of {\em
isomorphisms} between elementary data types (natural numbers, sets, multisets,
finite functions, permutations binary decision diagrams, graphs, hypergraphs,
parenthesis languages, dyadic rationals, primes, DNA sequences etc.) and their
extension to hereditarily finite universes through {\em hylomorphisms} derived
from {\em ranking/unranking} and {\em pairing/unpairing} operations.
An embedded higher order {\em combinator language} provides any-to-any
encodings automatically.
Besides applications to experimental mathematics, a few examples of ``free
algorithms'' obtained by transferring operations between data types are shown.
Other applications range from stream iterators on combinatorial objects to
self-delimiting codes, succinct data representations and generation of random
instances.
The paper covers 59 data types and, through the use of the embedded
combinator language, provides 3540 distinct bijective transformations between
them.
The self-contained source code of the paper, as generated from a literate
Haskell program, is available at
\url{http://logic.csci.unt.edu/tarau/research/2008/fISO.zip}.
{\bf Keywords}: Haskell data representations, data type isomorphisms,
declarative combinatorics, computational mathematics, Ackermann encoding,
G\"{o}del numberings, arithmetization, ranking/unranking, hereditarily finite
sets, functions and permutations, encodings of binary decision diagrams, dyadic
rationals, DNA encodings
| [
{
"version": "v1",
"created": "Thu, 21 Aug 2008 16:47:38 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Oct 2008 18:47:59 GMT"
},
{
"version": "v3",
"created": "Tue, 9 Dec 2008 01:28:15 GMT"
},
{
"version": "v4",
"created": "Mon, 19 Jan 2009 19:39:51 GMT"
}
]
| 2009-01-19T00:00:00 | [
[
"Tarau",
"Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.2964 | Gusztav Morvai | Gusztav Morvai and Benjamin Weiss | Estimating the Lengths of Memory Words | null | IEEE Transactions on Information Theory, Vol. 54, No. 8. (2008),
pp. 3804-3807 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a stationary stochastic process $\{X_n\}$ with values in some set $A$, a
finite word $w \in A^K$ is called a memory word if the conditional probability
of $X_0$ given the past is constant on the cylinder set defined by
$X_{-K}^{-1}=w$. It is a called a minimal memory word if no proper suffix of
$w$ is also a memory word. For example in a $K$-step Markov processes all words
of length $K$ are memory words but not necessarily minimal. We consider the
problem of determining the lengths of the longest minimal memory words and the
shortest memory words of an unknown process $\{X_n\}$ based on sequentially
observing the outputs of a single sample $\{\xi_1,\xi_2,...\xi_n\}$. We will
give a universal estimator which converges almost surely to the length of the
longest minimal memory word and show that no such universal estimator exists
for the length of the shortest memory word. The alphabet $A$ may be finite or
countable.
| [
{
"version": "v1",
"created": "Thu, 21 Aug 2008 19:09:10 GMT"
}
]
| 2008-08-22T00:00:00 | [
[
"Morvai",
"Gusztav",
""
],
[
"Weiss",
"Benjamin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.2984 | Sebastien Destercke | S\'ebastien Destercke (IRSN, IRIT), Serge Guillaume (ITAP), Brigitte
Charnomordic (ASB) | Building an interpretable fuzzy rule base from data using Orthogonal
Least Squares Application to a depollution problem | pre-print of final version published in Fuzzy Sets and Systems | Fuzzy Sets and Systems 158, 18 (2007) 2078-2094 | 10.1016/j.fss.2007.04.026 | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In many fields where human understanding plays a crucial role, such as
bioprocesses, the capacity of extracting knowledge from data is of critical
importance. Within this framework, fuzzy learning methods, if properly used,
can greatly help human experts. Amongst these methods, the aim of orthogonal
transformations, which have been proven to be mathematically robust, is to
build rules from a set of training data and to select the most important ones
by linear regression or rank revealing techniques. The OLS algorithm is a good
representative of those methods. However, it was originally designed so that it
only cared about numerical performance. Thus, we propose some modifications of
the original method to take interpretability into account. After recalling the
original algorithm, this paper presents the changes made to the original
method, then discusses some results obtained from benchmark problems. Finally,
the algorithm is applied to a real-world fault detection depollution problem.
| [
{
"version": "v1",
"created": "Thu, 21 Aug 2008 19:54:04 GMT"
}
]
| 2008-08-22T00:00:00 | [
[
"Destercke",
"Sébastien",
"",
"IRSN, IRIT"
],
[
"Guillaume",
"Serge",
"",
"ITAP"
],
[
"Charnomordic",
"Brigitte",
"",
"ASB"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0808.3003 | Dae San Kim | Dae San Kim (Sogang University) | Codes Associated with Orthogonal Groups and Power Moments of Kloosterman
Sums | null | null | null | null | math.NT cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we construct three binary linear codes $C(SO^{-}(2,q))$,
$C(O^{-}(2,q))$, $C(SO^{-}(4,q))$, respectively associated with the orthogonal
groups $SO^{-}(2,q)$, $O^{-}(2,q)$, $SO^{-}(4,q)$, with $q$ powers of two. Then
we obtain recursive formulas for the power moments of Kloosterman and
2-dimensional Kloosterman sums in terms of the frequencies of weights in the
codes. This is done via Pless power moment identity and by utilizing the
explicit expressions of Gauss sums for the orthogonal groups. We emphasize
that, when the recursive formulas for the power moments of Kloosterman sums are
compared, the present one is computationally more effective than the previous
one constructed from the special linear group $SL(2,q)$. We illustrate our
results with some examples.
| [
{
"version": "v1",
"created": "Thu, 21 Aug 2008 22:26:44 GMT"
}
]
| 2008-08-25T00:00:00 | [
[
"Kim",
"Dae San",
"",
"Sogang University"
]
]
| [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3019 | Robert Grossman | Robert L Grossman and Yunhong Gu | Data Mining Using High Performance Data Clouds: Experimental Studies
Using Sector and Sphere | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe the design and implementation of a high performance cloud that we
have used to archive, analyze and mine large distributed data sets. By a cloud,
we mean an infrastructure that provides resources and/or services over the
Internet. A storage cloud provides storage services, while a compute cloud
provides compute services. We describe the design of the Sector storage cloud
and how it provides the storage services required by the Sphere compute cloud.
We also describe the programming paradigm supported by the Sphere compute
cloud. Sector and Sphere are designed for analyzing large data sets using
computer clusters connected with wide area high performance networks (for
example, 10+ Gb/s). We describe a distributed data mining application that we
have developed using Sector and Sphere. Finally, we describe some experimental
studies comparing Sector/Sphere to Hadoop.
| [
{
"version": "v1",
"created": "Fri, 22 Aug 2008 01:24:06 GMT"
}
]
| 2008-08-25T00:00:00 | [
[
"Grossman",
"Robert L",
""
],
[
"Gu",
"Yunhong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.3038 | David Sevilla | Josef Schicho and David Sevilla | Tschirnhaus-Weierstrass curves | v2: 10 pages, major revision due to errors in the main result. v1: 14
pages, submitted to Mathematics of Computation | null | null | null | math.AG cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define the concept of Tschirnhaus-Weierstrass curve, named after the
Weierstrass form of an elliptic curve and Tschirnhaus transformations. Every
pointed curve has a Tschirnhaus-Weierstrass form, and this representation is
unique up to a scaling of variables. This is useful for computing isomorphisms
between curves.
| [
{
"version": "v1",
"created": "Fri, 22 Aug 2008 08:00:36 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Jun 2011 14:40:45 GMT"
}
]
| 2011-06-10T00:00:00 | [
[
"Schicho",
"Josef",
""
],
[
"Sevilla",
"David",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0808.3100 | Petr Ivankov | Petr R. Ivankov | Optimizing Compiler for Engineering Problems | 6 pages, 1 figure | null | null | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | New information technologies provide a lot of prospects for performance
improvement. One of them is "Dynamic Source Code Generation and Compilation".
This article shows how this way provides high performance for engineering
problems.
| [
{
"version": "v1",
"created": "Fri, 22 Aug 2008 15:27:34 GMT"
}
]
| 2008-08-25T00:00:00 | [
[
"Ivankov",
"Petr R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0808.3109 | Florentin Smarandache | Florentin Smarandache, V. Christianto | n-ary Fuzzy Logic and Neutrosophic Logic Operators | 15 pages, 2 fuzzy and neutrosophic value tables, many diagrams | Studies in Logic, Grammar and Rethoric [Belarus], 17 (30), pp.
1-16, 2009. | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We extend Knuth's 16 Boolean binary logic operators to fuzzy logic and
neutrosophic logic binary operators. Then we generalize them to n-ary fuzzy
logic and neutrosophic logic operators using the smarandache codification of
the Venn diagram and a defined vector neutrosophic law. In such way, new
operators in neutrosophic logic/set/probability are built.
| [
{
"version": "v1",
"created": "Fri, 22 Aug 2008 16:10:36 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Sep 2008 02:05:57 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Nov 2008 21:43:56 GMT"
}
]
| 2010-02-16T00:00:00 | [
[
"Smarandache",
"Florentin",
""
],
[
"Christianto",
"V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0808.3112 | Fran\c{c}ois Nicolas | Julien Cassaigne and Francois Nicolas | On the decidability of semigroup freeness | 46 pages. 1 table. To appear in RAIRO | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with the decidability of semigroup freeness. More precisely,
the freeness problem over a semigroup S is defined as: given a finite subset X
of S, decide whether each element of S has at most one factorization over X. To
date, the decidabilities of two freeness problems have been closely examined.
In 1953, Sardinas and Patterson proposed a now famous algorithm for the
freeness problem over the free monoid. In 1991, Klarner, Birget and Satterfield
proved the undecidability of the freeness problem over three-by-three integer
matrices. Both results led to the publication of many subsequent papers. The
aim of the present paper is three-fold: (i) to present general results
concerning freeness problems, (ii) to study the decidability of freeness
problems over various particular semigroups (special attention is devoted to
multiplicative matrix semigroups), and (iii) to propose precise, challenging
open questions in order to promote the study of the topic.
| [
{
"version": "v1",
"created": "Fri, 22 Aug 2008 16:37:29 GMT"
},
{
"version": "v2",
"created": "Sat, 27 Sep 2008 14:47:36 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Mar 2012 04:28:18 GMT"
},
{
"version": "v4",
"created": "Fri, 4 May 2012 01:30:09 GMT"
}
]
| 2012-05-07T00:00:00 | [
[
"Cassaigne",
"Julien",
""
],
[
"Nicolas",
"Francois",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0808.3145 | Aydin Sezgin | Amir Salman Avestimehr, Aydin Sezgin, David N.C. Tse | Approximate capacity of the two-way relay channel: A deterministic
approach | 7 pages, 8 figures, will be presented at 46. Allerton Conf. On Comm.,
Control, and Computing 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the capacity of the full-duplex bidirectional (or two-way) relay
channel with two nodes and one relay. The channels in the forward direction are
assumed to be different (in general) than the channels in the backward
direction, i.e. channel reciprocity is not assumed. We use the recently
proposed deterministic approach to capture the essence of the problem and to
determine a good transmission and relay strategy for the Gaussian channel.
Depending on the ratio of the individual channel gains, we propose to use
either a simple amplify-and-forward or a particular superposition coding
strategy at the relay. We analyze the achievable rate region and show that the
scheme achieves to within 3 bits the cut-set bound for all values of channel
gains.
| [
{
"version": "v1",
"created": "Fri, 22 Aug 2008 20:37:14 GMT"
}
]
| 2008-08-26T00:00:00 | [
[
"Avestimehr",
"Amir Salman",
""
],
[
"Sezgin",
"Aydin",
""
],
[
"Tse",
"David N. C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3166 | Abedelaziz Mohaisen | Abedelaziz Mohaisen and Dowon Hong | Privacy Preserving Association Rule Mining Revisited | 15 pages, to appear in proceeding of WISA 2008 | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The privacy preserving data mining (PPDM) has been one of the most
interesting, yet challenging, research issues. In the PPDM, we seek to
outsource our data for data mining tasks to a third party while maintaining its
privacy. In this paper, we revise one of the recent PPDM schemes (i.e., FS)
which is designed for privacy preserving association rule mining (PP-ARM). Our
analysis shows some limitations of the FS scheme in term of its storage
requirements guaranteeing a reasonable privacy standard and the high
computation as well. On the other hand, we introduce a robust definition of
privacy that considers the average case privacy and motivates the study of a
weakness in the structure of FS (i.e., fake transactions filtering). In order
to overcome this limit, we introduce a hybrid scheme that considers both
privacy and resources guidelines. Experimental results show the efficiency of
our proposed scheme over the previously introduced one and opens directions for
further development.
| [
{
"version": "v1",
"created": "Sat, 23 Aug 2008 05:42:14 GMT"
}
]
| 2008-08-26T00:00:00 | [
[
"Mohaisen",
"Abedelaziz",
""
],
[
"Hong",
"Dowon",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0808.3196 | Anindya Sundar Chakrabarti | Anindya S. Chakrabarti, Bikas K. Chakrabarti | Queue-length Variations In A Two-Restaurant Problem | 7 pages, 6 figures | null | null | null | cs.GT q-fin.TR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper attempts to find out numerically the distribution of the
queue-length ratio in the context of a model of preferential attachment. Here
we consider two restaurants only and a large number of customers (agents) who
come to these restaurants. Each day the same number of agents sequentially
arrives and decides which restaurant to enter. If all the agents literally
follow the crowd then there is no difference between this model and the famous
`P\'olya's Urn' model. But as agents alter their strategies different kind of
dynamics of the model is seen. It is seen from numerical results that the
existence of a distribution of the fixed points is quite robust and it is also
seen that in some cases the variations in the ratio of the queue-lengths follow
a power-law.
| [
{
"version": "v1",
"created": "Sat, 23 Aug 2008 14:58:50 GMT"
}
]
| 2008-12-02T00:00:00 | [
[
"Chakrabarti",
"Anindya S.",
""
],
[
"Chakrabarti",
"Bikas K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Quantitative Finance",
"code": "q-fin.TR",
"description": "Market microstructure, liquidity, exchange and auction design, automated trading, agent-based modeling and market-making",
"span": "(Trading and Market Microstructure)"
}
]
|
0808.3197 | Ming-Zhe Chen | Ming-Zhe Chen | On the Monotonicity of Work Function in k-Server Conjecture | 3 pages, corrected typos | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a mistake in work function algorithm of k-server
conjecture. That is, the monotonicity of the work function is not always true.
| [
{
"version": "v1",
"created": "Sun, 24 Aug 2008 15:37:35 GMT"
}
]
| 2008-08-26T00:00:00 | [
[
"Chen",
"Ming-Zhe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.3203 | Alex Feigel | Alexander Feigel, Avraham Englander and Assaf Engel | Sex is always well worth its two-fold cost | 8 pages, 3 figures | null | 10.1371/journal.pone.0006012 | null | q-bio.PE cs.GT physics.bio-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sex is considered as an evolutionary paradox, since its evolutionary
advantage does not necessarily overcome the two fold cost of sharing half of
one's offspring's genome with another member of the population. Here we
demonstrate that sexual reproduction can be evolutionary stable even when its
Darwinian fitness is twice as low when compared to the fitness of asexual
mutants. We also show that more than two sexes are always evolutionary
unstable. Our approach generalizes the evolutionary game theory to analyze
species whose members are able to sense the sexual state of their conspecifics
and to switch sexes consequently. The widespread emergence and maintenance of
sex follows therefore from its co-evolution with even more widespread
environmental sensing abilities.
| [
{
"version": "v1",
"created": "Sat, 23 Aug 2008 17:01:49 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Feigel",
"Alexander",
""
],
[
"Englander",
"Avraham",
""
],
[
"Engel",
"Assaf",
""
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "physics.bio-ph",
"description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.",
"span": "(Biological Physics)"
}
]
|
0808.3214 | Shamgar Gurevich | Shamgar Gurevich, Ronny Hadani, Nir Sochen | The discrete Fourier transform: A canonical basis of eigenfunctions | To appear in the proceeding of the 2008 European Signal Processing
Conference (EUSIPCO-2008), Lausanne, Switzerland; MSC classifications:
Fourier transform, Weil representation, symmetries, eigenfunctions,
oscillator transform, fast oscillator transform | null | null | null | cs.IT cs.DM math.IT math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The discrete Fourier transform (DFT) is an important operator which acts on
the Hilbert space of complex valued functions on the ring Z/NZ. In the case
where N=p is an odd prime number, we exhibit a canonical basis of eigenvectors
for the DFT. The transition matrix from the standard basis to the canonical
basis defines a novel transform which we call the "discrete oscillator
transform" (DOT for short). Finally, we describe a fast algorithm for computing
the DOT in certain cases.
| [
{
"version": "v1",
"created": "Sat, 23 Aug 2008 21:43:24 GMT"
}
]
| 2008-08-26T00:00:00 | [
[
"Gurevich",
"Shamgar",
""
],
[
"Hadani",
"Ronny",
""
],
[
"Sochen",
"Nir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
]
|
0808.3222 | Jerrald Meek | Jerrald Meek | Analysis of the postulates produced by Karp's Theorem | 12 Pages;
ftp://ftp%40micrognu%2Ecom:anon%[email protected]/pnenp/conclusion.pdf | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is the final article in a series of four articles. Richard Karp has
proven that a deterministic polynomial time solution to K-SAT will result in a
deterministic polynomial time solution to all NP-Complete problems. However, it
is demonstrated that a deterministic polynomial time solution to any
NP-Complete problem does not necessarily produce a deterministic polynomial
time solution to all NP-Complete problems.
| [
{
"version": "v1",
"created": "Sun, 24 Aug 2008 02:59:29 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Aug 2008 22:29:19 GMT"
},
{
"version": "v3",
"created": "Wed, 27 Aug 2008 19:00:36 GMT"
},
{
"version": "v4",
"created": "Sat, 30 Aug 2008 00:54:00 GMT"
},
{
"version": "v5",
"created": "Wed, 3 Sep 2008 05:07:21 GMT"
}
]
| 2008-09-03T00:00:00 | [
[
"Meek",
"Jerrald",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0808.3230 | Jialing Liu | Jialing Liu, Vikas Yadav, Hullas Sehgal, Joshua M. Olson, Haifeng Liu,
and Nicola Elia | Phase Transitions on Fixed Connected Graphs and Random Graphs in the
Presence of Noise | 15 pages, 3 figures. To appear in the IEEE Transactions on Automatic
Control | IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 53, NO. 8, 1817-1825,
SEPTEMBER 2008 | 10.1109/TAC.2008.929382 | null | math.OC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the phase transition behavior emerging from the
interactions among multiple agents in the presence of noise. We propose a
simple discrete-time model in which a group of non-mobile agents form either a
fixed connected graph or a random graph process, and each agent, taking bipolar
value either +1 or -1, updates its value according to its previous value and
the noisy measurements of the values of the agents connected to it. We present
proofs for the occurrence of the following phase transition behavior: At a
noise level higher than some threshold, the system generates symmetric behavior
(vapor or melt of magnetization) or disagreement; whereas at a noise level
lower than the threshold, the system exhibits spontaneous symmetry breaking
(solid or magnetization) or consensus. The threshold is found analytically. The
phase transition occurs for any dimension. Finally, we demonstrate the phase
transition behavior and all analytic results using simulations. This result may
be found useful in the study of the collective behavior of complex systems
under communication constraints.
| [
{
"version": "v1",
"created": "Sun, 24 Aug 2008 05:58:26 GMT"
}
]
| 2008-10-21T00:00:00 | [
[
"Liu",
"Jialing",
""
],
[
"Yadav",
"Vikas",
""
],
[
"Sehgal",
"Hullas",
""
],
[
"Olson",
"Joshua M.",
""
],
[
"Liu",
"Haifeng",
""
],
[
"Elia",
"Nicola",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3231 | Zhi-Hua Zhou | Zhi-Hua Zhou, Min-Ling Zhang, Sheng-Jun Huang, Yu-Feng Li | Multi-Instance Multi-Label Learning | 64 pages, 10 figures; Artificial Intelligence, 2011 | Artificial Intelligence, 2012, 176(1): 2291-2320 | 10.1016/j.artint.2011.10.002 | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose the MIML (Multi-Instance Multi-Label learning)
framework where an example is described by multiple instances and associated
with multiple class labels. Compared to traditional learning frameworks, the
MIML framework is more convenient and natural for representing complicated
objects which have multiple semantic meanings. To learn from MIML examples, we
propose the MimlBoost and MimlSvm algorithms based on a simple degeneration
strategy, and experiments show that solving problems involving complicated
objects with multiple semantic meanings in the MIML framework can lead to good
performance. Considering that the degeneration process may lose information, we
propose the D-MimlSvm algorithm which tackles MIML problems directly in a
regularization framework. Moreover, we show that even when we do not have
access to the real objects and thus cannot capture more information from real
objects by using the MIML representation, MIML is still useful. We propose the
InsDif and SubCod algorithms. InsDif works by transforming single-instances
into the MIML representation for learning, while SubCod works by transforming
single-label examples into the MIML representation for learning. Experiments
show that in some tasks they are able to achieve better performance than
learning the single-instances or single-label examples directly.
| [
{
"version": "v1",
"created": "Sun, 24 Aug 2008 06:31:43 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Apr 2009 19:47:42 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Oct 2011 10:51:52 GMT"
},
{
"version": "v4",
"created": "Sun, 23 Oct 2011 16:22:49 GMT"
}
]
| 2011-10-28T00:00:00 | [
[
"Zhou",
"Zhi-Hua",
""
],
[
"Zhang",
"Min-Ling",
""
],
[
"Huang",
"Sheng-Jun",
""
],
[
"Li",
"Yu-Feng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0808.3244 | Vadim E. Levit | Yulia Kempner and Vadim E. Levit | Duality between quasi-concave functions and monotone linkage functions | 12 pages, 2 figures | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A function $F$ defined on all subsets of a finite ground set $E$ is
quasi-concave if $F(X\cup Y)\geq\min\{F(X),F(Y)\}$ for all $X,Y\subset E$.
Quasi-concave functions arise in many fields of mathematics and computer
science such as social choice, theory of graph, data mining, clustering and
other fields.
The maximization of quasi-concave function takes, in general, exponential
time. However, if a quasi-concave function is defined by associated monotone
linkage function then it can be optimized by the greedy type algorithm in a
polynomial time.
Quasi-concave functions defined as minimum values of monotone linkage
functions were considered on antimatroids, where the correspondence between
quasi-concave and bottleneck functions was shown (Kempner & Levit, 2003). The
goal of this paper is to analyze quasi-concave functions on different families
of sets and to investigate their relationships with monotone linkage functions.
| [
{
"version": "v1",
"created": "Sun, 24 Aug 2008 12:06:05 GMT"
}
]
| 2011-01-25T00:00:00 | [
[
"Kempner",
"Yulia",
""
],
[
"Levit",
"Vadim E.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0808.3281 | Shamgar Gurevich | Shamgar Gurevich (UC Berkeley) and Ronny Hadani (University of
Chicago) | On the diagonalization of the discrete Fourier transform | Accepted for publication in the journal "Applied and Computational
Harmonic Analysis": Appl. Comput. Harmon. Anal. (2009),
doi:10.1016/j.acha.2008.11.003. Key words: Discrete Fourier Transform, Weil
Representation, Canonical Eigenvectors, Oscillator Transform, Fast Oscillator
Transform | null | null | null | cs.IT cs.DM math.IT math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The discrete Fourier transform (DFT) is an important operator which acts on
the Hilbert space of complex valued functions on the ring Z/NZ. In the case
where N=p is an odd prime number, we exhibit a canonical basis of eigenvectors
for the DFT. The transition matrix from the standard basis to the canonical
basis defines a novel transform which we call the discrete oscillator transform
(DOT for short). Finally, we describe a fast algorithm for computing the
discrete oscillator transform in certain cases.
| [
{
"version": "v1",
"created": "Sun, 24 Aug 2008 23:39:42 GMT"
},
{
"version": "v2",
"created": "Sat, 27 Dec 2008 07:55:19 GMT"
}
]
| 2008-12-27T00:00:00 | [
[
"Gurevich",
"Shamgar",
"",
"UC Berkeley"
],
[
"Hadani",
"Ronny",
"",
"University of\n Chicago"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
]
|
0808.3292 | Yutao Ma | Yutao Ma, Keqing He, and Jing Liu | Network Motifs in Object-Oriented Software Systems | 7 pages, 4 figures, 1 table, the revised version has been published
by DCDIS-B special issue on software engineering and complex networks | Dynamics of Continuous, Discrete and Impulsive Systems (Series B:
Applications & Algorithms), 2007, 14(S6): 166-172 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nowadays, software has become a complex piece of work that may be beyond our
control. Understanding how software evolves over time plays an important role
in controlling software development processes. Recently, a few researchers
found the quantitative evidence of structural duplication in software systems
or web applications, which is similar to the evolutionary trend found in
biological systems. To investigate the principles or rules of software
evolution, we introduce the relevant theories and methods of complex networks
into structural evolution and change of software systems. According to the
results of our experiment on network motifs, we find that the stability of a
motif shows positive correlation with its abundance and a motif with high Z
score tends to have stable structure. These findings imply that the evolution
of software systems is based on functional cloning as well as structural
duplication and tends to be structurally stable. So, the work presented in this
paper will be useful for the analysis of structural changes of software systems
in reverse engineering.
| [
{
"version": "v1",
"created": "Mon, 25 Aug 2008 02:53:47 GMT"
}
]
| 2008-08-26T00:00:00 | [
[
"Ma",
"Yutao",
""
],
[
"He",
"Keqing",
""
],
[
"Liu",
"Jing",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0808.3296 | Stevan Harnad | Stevan Harnad | Confirmation Bias and the Open Access Advantage: Some Methodological
Suggestions for the Davis Citation Study | 17 pages, 17 references, 1 table; comment on 0808.2428v1 | null | null | null | cs.DL cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Davis (2008) analyzes citations from 2004-2007 in 11 biomedical journals. 15%
of authors paid to make them Open Access (OA). The outcome is a significant OA
citation Advantage, but a small one (21%). The author infers that the OA
advantage has been shrinking yearly, but the data suggest the opposite. Further
analyses are necessary:
(1) Not just author-choice (paid) OA but Free OA self-archiving needs to be
taken into account rather than being counted as non-OA.
(2) proportion of OA articles per journal per year needs to be reported and
taken into account.
(3) The Journal Impact Factor and the relation between the size of the OA
Advantage article 'citation-bracket' need to be taken into account.
(4) The sample-size for the highest-impact, largest-sample journal analyzed,
PNAS, is restricted and excluded from some of the analyses. The full PNAS
dataset is needed.
(5) The interaction between OA and time, 2004-2007, is based on retrospective
data from a June 2008 total cumulative citation count. The dates of both the
cited articles and the citing articles need to be taken into account.
The author proposes that author self-selection bias for is the primary cause
of the observed OA Advantage, but this study does not test this or of any of
the other potential causal factors. The author suggests that paid OA is not
worth the cost, per extra citation. But with OA self-archiving both the OA and
the extra citations are free.
| [
{
"version": "v1",
"created": "Mon, 25 Aug 2008 03:36:14 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Aug 2008 17:09:08 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Harnad",
"Stevan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0808.3307 | Naokata Shikuma | Naokata Shikuma, Atsushi Igarashi | Proving Noninterference by a Fully Complete Translation to the Simply
Typed lambda-calculus | 31 pages | Logical Methods in Computer Science, Volume 4, Issue 3 (September
20, 2008) lmcs:683 | 10.2168/LMCS-4(3:10)2008 | null | cs.PL cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tse and Zdancewic have formalized the notion of noninterference for Abadi et
al.'s DCC in terms of logical relations and given a proof of noninterference by
reduction to parametricity of System F. Unfortunately, their proof contains
errors in a key lemma that their translation from DCC to System F preserves the
logical relations defined for both calculi. In fact, we have found a
counterexample for it. In this article, instead of DCC, we prove
noninterference for sealing calculus, a new variant of DCC, by reduction to the
basic lemma of a logical relation for the simply typed lambda-calculus, using a
fully complete translation to the simply typed lambda-calculus. Full
completeness plays an important role in showing preservation of the two logical
relations through the translation. Also, we investigate relationship among
sealing calculus, DCC, and an extension of DCC by Tse and Zdancewic and show
that the first and the last of the three are equivalent.
| [
{
"version": "v1",
"created": "Mon, 25 Aug 2008 06:56:05 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Sep 2008 21:35:24 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Shikuma",
"Naokata",
""
],
[
"Igarashi",
"Atsushi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0808.3331 | Gregory Karagiorgos | Gregory Karagiorgos, Dimitrios Poulakis | Efficient algorithms for the basis of finite Abelian groups | 11 pages | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $G$ be a finite abelian group $G$ with $N$ elements. In this paper we
give a O(N) time algorithm for computing a basis of $G$. Furthermore, we obtain
an algorithm for computing a basis from a generating system of $G$ with $M$
elements having time complexity $O(M\sum_{p|N} e(p)\lceil
p^{1/2}\rceil^{\mu(p)})$, where $p$ runs over all the prime divisors of $N$,
and $p^{e(p)}$, $\mu(p)$ are the exponent and the number of cyclic groups which
are direct factors of the $p$-primary component of $G$, respectively. In case
where $G$ is a cyclic group having a generating system with $M$ elements, a
$O(MN^{\epsilon})$ time algorithm for the computation of a basis of $G$ is
obtained.
| [
{
"version": "v1",
"created": "Mon, 25 Aug 2008 11:01:15 GMT"
}
]
| 2008-08-26T00:00:00 | [
[
"Karagiorgos",
"Gregory",
""
],
[
"Poulakis",
"Dimitrios",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0808.3386 | Moustapha Diaby | Moustapha Diaby | Linear Programming Formulation of the Boolean Satisfiability Problem | This paper has been withdrawn. Theorem 38 and Corollary 39 are in
error. The modeling needs 9-dimensional z-variables instead of the
8-dimensional variables defined in notations 24.1. The correct modeling is
fully detailed in the book available at:
http://www.worldscientific.com/worldscibooks/10.1142/9725 | null | null | null | cs.DM cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a new, graph-based modeling approach and a
polynomial-sized linear programming (LP) formulation of the Boolean
satisfiability problem (SAT). The approach is illustrated with a numerical
example.
| [
{
"version": "v1",
"created": "Mon, 25 Aug 2008 17:20:16 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Sep 2008 14:45:18 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Nov 2008 20:09:03 GMT"
},
{
"version": "v4",
"created": "Sat, 11 Sep 2010 21:08:53 GMT"
},
{
"version": "v5",
"created": "Fri, 6 Sep 2013 03:14:46 GMT"
},
{
"version": "v6",
"created": "Sun, 2 Mar 2014 15:12:58 GMT"
},
{
"version": "v7",
"created": "Tue, 18 Mar 2014 19:37:04 GMT"
},
{
"version": "v8",
"created": "Thu, 20 Oct 2016 16:52:00 GMT"
}
]
| 2016-10-21T00:00:00 | [
[
"Diaby",
"Moustapha",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0808.3418 | George Amariucai | George T. Amariucai, Shuangqing Wei and Rajgopal Kannan | Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part II:
Parallel Slow Fading Channels | null | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is the second part of a two-part paper that studies the problem of
jamming in a fixed-rate transmission system with fading. In the first part, we
studied the scenario with a fast fading channel, and found Nash equilibria of
mixed strategies for short term power constraints, and for average power
constraints with and without channel state information (CSI) feedback. We also
solved the equally important maximin and minimax problems with pure strategies.
Whenever we dealt with average power constraints, we decomposed the problem
into two levels of power control, which we solved individually. In this second
part of the paper, we study the scenario with a parallel, slow fading channel,
which usually models multi-carrier transmissions, such as OFDM. Although the
framework is similar as the one in Part I \cite{myself3}, dealing with the slow
fading requires more intricate techniques. Unlike in the fast fading scenario,
where the frames supporting the transmission of the codewords were equivalent
and completely characterized by the channel statistics, in our present scenario
the frames are unique, and characterized by a specific set of channel
realizations. This leads to more involved inter-frame power allocation
strategies, and in some cases even to the need for a third level of power
control. We also show that for parallel slow fading channels, the CSI feedback
helps in the battle against jamming, as evidenced by the significant
degradation to system performance when CSI is not sent back. We expect this
degradation to decrease as the number of parallel channels $M$ increases, until
it becomes marginal for $M\to \infty$ (which can be considered as the case in
Part I).
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 18:28:28 GMT"
}
]
| 2008-08-27T00:00:00 | [
[
"Amariucai",
"George T.",
""
],
[
"Wei",
"Shuangqing",
""
],
[
"Kannan",
"Rajgopal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3431 | George Amariucai | George T. Amariucai and Shuangqing Wei | Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part I:
Fast Fading Channels | null | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is the first part of a two-part paper that studies the problem of
jamming in a fixed-rate transmission system with fading. Both transmitter and
jammer are subject to power constraints which can be enforced over each
codeword short-term / peak) or over all codewords (long-term / average), hence
generating different scenarios. All our jamming problems are formulated as
zero-sum games, having the probability of outage as pay-off function and power
control functions as strategies. The paper aims at providing a comprehensive
coverage of these problems, under fast and slow fading, peak and average power
constraints, pure and mixed strategies, with and without channel state
information (CSI) feedback. In this first part we study the fast fading
scenario. We first assume full CSI to be available to all parties. For peak
power constraints, a Nash equilibrium of pure strategies is found. For average
power constraints, both pure and mixed strategies are investigated. With pure
strategies, we derive the optimal power control functions for both intra-frame
and inter-frame power allocation. Maximin and minimax solutions are found and
shown to be different, which implies the non-existence of a saddle point. In
addition we provide alternative perspectives in obtaining the optimal
intra-frame power control functions under the long-term power constraints. With
mixed strategies, the Nash equilibrium is found by solving the generalized form
of an older problem dating back to Bell and Cover \cite{bell}. Finally, we
derive a Nash equilibrium of the game in which no CSI is fed back from the
receiver. We show that full channel state information brings only a very slight
improvement in the system's performance.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 18:26:41 GMT"
}
]
| 2008-08-27T00:00:00 | [
[
"Amariucai",
"George T.",
""
],
[
"Wei",
"Shuangqing",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3453 | Gilles Z\'emor | Alexander Barg and Arya Mazumdar and Gilles Z\'emor | Codes on hypergraphs | 16 pages | Advances in Mathematics of Communications (AMC), Vol. 2, No 4,
(2008) pp. 433 - 450. | 10.3934/amc.2008.2.433 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Codes on hypergraphs are an extension of the well-studied family of codes on
bipartite graphs. Bilu and Hoory (2004) constructed an explicit family of codes
on regular t-partite hypergraphs whose minimum distance improves earlier
estimates of the distance of bipartite-graph codes. They also suggested a
decoding algorithm for such codes and estimated its error-correcting
capability.
In this paper we study two aspects of hypergraph codes. First, we compute the
weight enumerators of several ensembles of such codes, establishing conditions
under which they attain the Gilbert-Varshamov bound and deriving estimates of
their distance. In particular, we show that this bound is attained by codes
constructed on a fixed bipartite graph with a large spectral gap.
We also suggest a new decoding algorithm of hypergraph codes that corrects a
constant fraction of errors, improving upon the algorithm of Bilu and Hoory.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 08:30:14 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Aug 2008 08:53:08 GMT"
}
]
| 2008-12-10T00:00:00 | [
[
"Barg",
"Alexander",
""
],
[
"Mazumdar",
"Arya",
""
],
[
"Zémor",
"Gilles",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3502 | Georg B\"ocherer | Georg B\"ocherer and Alexandre de Baynast | Cooperative Protocols for Random Access Networks | 7 pages, presented at Allerton conference 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cooperative communications have emerged as a significant concept to improve
reliability and throughput in wireless systems. On the other hand, WLANs based
on random access mechanism have become popular due to ease of deployment and
low cost. Since cooperation introduces extra transmissions among the
cooperating nodes and therefore increases the number of packet collisions, it
is not clear whether there is any benefit from using physical layer cooperation
under random access. In this paper, we develop new low complexity cooperative
protocols for random access that outperform the conventional non cooperative
scheme for a large range of signal-to-noise ratios.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 12:46:35 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jan 2009 07:31:54 GMT"
}
]
| 2009-01-23T00:00:00 | [
[
"Böcherer",
"Georg",
""
],
[
"de Baynast",
"Alexandre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3504 | Mark Flanagan | Mark F. Flanagan, Enrico Paolini, Marco Chiani and Marc Fossorier | On the Growth Rate of the Weight Distribution of Irregular
Doubly-Generalized LDPC Codes | 10 pages, 1 figure, presented at the 46th Annual Allerton Conference
on Communication, Control and Computing (this version includes additional
appendix) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, an expression for the asymptotic growth rate of the number of
small linear-weight codewords of irregular doubly-generalized LDPC (D-GLDPC)
codes is derived. The expression is compact and generalizes existing results
for LDPC and generalized LDPC (GLDPC) codes. Assuming that there exist check
and variable nodes with minimum distance 2, it is shown that the growth rate
depends only on these nodes. An important connection between this new result
and the stability condition of D-GLDPC codes over the BEC is highlighted. Such
a connection, previously observed for LDPC and GLDPC codes, is now extended to
the case of D-GLDPC codes.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 13:10:48 GMT"
}
]
| 2008-08-27T00:00:00 | [
[
"Flanagan",
"Mark F.",
""
],
[
"Paolini",
"Enrico",
""
],
[
"Chiani",
"Marco",
""
],
[
"Fossorier",
"Marc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3511 | K. P. Unnikrishnan | P.S. Sastry (Indian Institute of Science), and K.P. Unnikrishnan
(General Motors Research) | Conditional probability based significance tests for sequential patterns
in multi-neuronal spike trains | 35 pages, 7 figures | null | null | null | q-bio.NC cond-mat.dis-nn cs.DB q-bio.QM stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider the problem of detecting statistically significant
sequential patterns in multi-neuronal spike trains. These patterns are
characterized by ordered sequences of spikes from different neurons with
specific delays between spikes. We have previously proposed a data mining
scheme to efficiently discover such patterns which are frequent in the sense
that the count of non-overlapping occurrences of the pattern in the data stream
is above a threshold. Here we propose a method to determine the statistical
significance of these repeating patterns and to set the thresholds
automatically. The novelty of our approach is that we use a compound null
hypothesis that includes not only models of independent neurons but also models
where neurons have weak dependencies. The strength of interaction among the
neurons is represented in terms of certain pair-wise conditional probabilities.
We specify our null hypothesis by putting an upper bound on all such
conditional probabilities. We construct a probabilistic model that captures the
counting process and use this to calculate the mean and variance of the count
for any pattern. Using this we derive a test of significance for rejecting such
a null hypothesis. This also allows us to rank-order different significant
patterns. We illustrate the effectiveness of our approach using spike trains
generated from a non-homogeneous Poisson model with embedded dependencies.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 13:28:43 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Aug 2008 02:15:45 GMT"
}
]
| 2008-08-28T00:00:00 | [
[
"Sastry",
"P. S.",
"",
"Indian Institute of Science"
],
[
"Unnikrishnan",
"K. P.",
"",
"General Motors Research"
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
}
]
|
0808.3535 | Ioan Raicu | Ioan Raicu, Yong Zhao, Ian Foster, Alex Szalay | Data Diffusion: Dynamic Resource Provision and Data-Aware Scheduling for
Data Intensive Applications | 16 pages, 15 figures | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data intensive applications often involve the analysis of large datasets that
require large amounts of compute and storage resources. While dedicated compute
and/or storage farms offer good task/data throughput, they suffer low resource
utilization problem under varying workloads conditions. If we instead move such
data to distributed computing resources, then we incur expensive data transfer
cost. In this paper, we propose a data diffusion approach that combines dynamic
resource provisioning, on-demand data replication and caching, and data
locality-aware scheduling to achieve improved resource efficiency under varying
workloads. We define an abstract "data diffusion model" that takes into
consideration the workload characteristics, data accessing cost, application
throughput and resource utilization; we validate the model using a real-world
large-scale astronomy application. Our results show that data diffusion can
increase the performance index by as much as 34X, and improve application
response time by over 506X, while achieving near-optimal throughputs and
execution times.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 15:19:44 GMT"
}
]
| 2008-08-27T00:00:00 | [
[
"Raicu",
"Ioan",
""
],
[
"Zhao",
"Yong",
""
],
[
"Foster",
"Ian",
""
],
[
"Szalay",
"Alex",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.3536 | Ioan Raicu | Ioan Raicu, Zhao Zhang, Mike Wilde, Ian Foster | Enabling Loosely-Coupled Serial Job Execution on the IBM BlueGene/P
Supercomputer and the SiCortex SC5832 | 13 pages, 18 figures | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Our work addresses the enabling of the execution of highly parallel
computations composed of loosely coupled serial jobs with no modifications to
the respective applications, on large-scale systems. This approach allows
new-and potentially far larger-classes of application to leverage systems such
as the IBM Blue Gene/P supercomputer and similar emerging petascale
architectures. We present here the challenges of I/O performance encountered in
making this model practical, and show results using both micro-benchmarks and
real applications on two large-scale systems, the BG/P and the SiCortex SC5832.
Our preliminary benchmarks show that we can scale to 4096 processors on the
Blue Gene/P and 5832 processors on the SiCortex with high efficiency, and can
achieve thousands of tasks/sec sustained execution rates for parallel workloads
of ordinary serial applications. We measured applications from two domains,
economic energy modeling and molecular dynamics.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 16:59:41 GMT"
}
]
| 2008-08-27T00:00:00 | [
[
"Raicu",
"Ioan",
""
],
[
"Zhang",
"Zhao",
""
],
[
"Wilde",
"Mike",
""
],
[
"Foster",
"Ian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.3540 | Ioan Raicu | Ioan Raicu, Zhao Zhang, Mike Wilde, Ian Foster, Pete Beckman, Kamil
Iskra, Ben Clifford | Towards Loosely-Coupled Programming on Petascale Systems | IEEE/ACM International Conference for High Performance Computing,
Networking, Storage and Analysis (SuperComputing/SC) 2008 | null | 10.1109/SC.2008.5219768 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have extended the Falkon lightweight task execution framework to make
loosely coupled programming on petascale systems a practical and useful
programming model. This work studies and measures the performance factors
involved in applying this approach to enable the use of petascale systems by a
broader user community, and with greater ease. Our work enables the execution
of highly parallel computations composed of loosely coupled serial jobs with no
modifications to the respective applications. This approach allows a new-and
potentially far larger-class of applications to leverage petascale systems,
such as the IBM Blue Gene/P supercomputer. We present the challenges of I/O
performance encountered in making this model practical, and show results using
both microbenchmarks and real applications from two domains: economic energy
modeling and molecular dynamics. Our benchmarks show that we can scale up to
160K processor-cores with high efficiency, and can achieve sustained execution
rates of thousands of tasks per second.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 16:48:14 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Aug 2008 18:05:46 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Raicu",
"Ioan",
""
],
[
"Zhang",
"Zhao",
""
],
[
"Wilde",
"Mike",
""
],
[
"Foster",
"Ian",
""
],
[
"Beckman",
"Pete",
""
],
[
"Iskra",
"Kamil",
""
],
[
"Clifford",
"Ben",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.3545 | Ioan Raicu | Yong Zhao, Ioan Raicu, Ian Foster | Scientific Workflow Systems for 21st Century e-Science, New Bottle or
New Wine? | IEEE Workshop on Scientific Workflows 2008 | null | null | null | cs.SE cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the advances in e-Sciences and the growing complexity of scientific
analyses, more and more scientists and researchers are relying on workflow
systems for process coordination, derivation automation, provenance tracking,
and bookkeeping. While workflow systems have been in use for decades, it is
unclear whether scientific workflows can or even should build on existing
workflow technologies, or they require fundamentally new approaches. In this
paper, we analyze the status and challenges of scientific workflows,
investigate both existing technologies and emerging languages, platforms and
systems, and identify the key challenges that must be addressed by workflow
systems for e-science in the 21st century.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 16:46:49 GMT"
}
]
| 2008-08-27T00:00:00 | [
[
"Zhao",
"Yong",
""
],
[
"Raicu",
"Ioan",
""
],
[
"Foster",
"Ian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.3546 | Ioan Raicu | Ioan Raicu, Yong Zhao, Ian Foster, Alex Szalay | Accelerating Large-scale Data Exploration through Data Diffusion | IEEE/ACM International Workshop on Data-Aware Distributed Computing
2008 | null | 10.1145/1383519.1383521 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data-intensive applications often require exploratory analysis of large
datasets. If analysis is performed on distributed resources, data locality can
be crucial to high throughput and performance. We propose a "data diffusion"
approach that acquires compute and storage resources dynamically, replicates
data in response to demand, and schedules computations close to data. As demand
increases, more resources are acquired, thus allowing faster response to
subsequent requests that refer to the same data; when demand drops, resources
are released. This approach can provide the benefits of dedicated hardware
without the associated high costs, depending on workload and resource
characteristics. The approach is reminiscent of cooperative caching,
web-caching, and peer-to-peer storage systems, but addresses different
application demands. Other data-aware scheduling approaches assume dedicated
resources, which can be expensive and/or inefficient if load varies
significantly. To explore the feasibility of the data diffusion approach, we
have extended the Falkon resource provisioning and task scheduling system to
support data caching and data-aware scheduling. Performance results from both
micro-benchmarks and a large scale astronomy application demonstrate that our
approach improves performance relative to alternative approaches, as well as
provides improved scalability as aggregated I/O bandwidth scales linearly with
the number of data cache nodes.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 16:02:50 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Raicu",
"Ioan",
""
],
[
"Zhao",
"Yong",
""
],
[
"Foster",
"Ian",
""
],
[
"Szalay",
"Alex",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.3548 | Ioan Raicu | Yong Zhao, Ioan Raicu, Ian Foster, Mihael Hategan, Veronika Nefedova,
Mike Wilde | Realizing Fast, Scalable and Reliable Scientific Computations in Grid
Environments | Book chapter in Grid Computing Research Progress, ISBN:
978-1-60456-404-4, Nova Publisher 2008 | null | null | null | cs.DC cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The practical realization of managing and executing large scale scientific
computations efficiently and reliably is quite challenging. Scientific
computations often involve thousands or even millions of tasks operating on
large quantities of data, such data are often diversely structured and stored
in heterogeneous physical formats, and scientists must specify and run such
computations over extended periods on collections of compute, storage and
network resources that are heterogeneous, distributed and may change
constantly. We present the integration of several advanced systems: Swift,
Karajan, and Falkon, to address the challenges in running various large scale
scientific applications in Grid environments. Swift is a parallel programming
tool for rapid and reliable specification, execution, and management of
large-scale science and engineering workflows. Swift consists of a simple
scripting language called SwiftScript and a powerful runtime system that is
based on the CoG Karajan workflow engine and integrates the Falkon light-weight
task execution service that uses multi-level scheduling and a streamlined
dispatcher. We showcase the scalability, performance and reliability of the
integrated system using application examples drawn from astronomy, cognitive
neuroscience and molecular dynamics, which all comprise large number of
fine-grained jobs. We show that Swift is able to represent dynamic workflows
whose structures can only be determined during runtime and reduce largely the
code size of various workflow representations using SwiftScript; schedule the
execution of hundreds of thousands of parallel computations via the Karajan
engine; and achieve up to 90% reduction in execution time when compared to
traditional batch schedulers.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 16:15:42 GMT"
}
]
| 2008-08-27T00:00:00 | [
[
"Zhao",
"Yong",
""
],
[
"Raicu",
"Ioan",
""
],
[
"Foster",
"Ian",
""
],
[
"Hategan",
"Mihael",
""
],
[
"Nefedova",
"Veronika",
""
],
[
"Wilde",
"Mike",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0808.3558 | Rajkumar Buyya | Rajkumar Buyya, Chee Shin Yeo, and Srikumar Venugopal | Market-Oriented Cloud Computing: Vision, Hype, and Reality for
Delivering IT Services as Computing Utilities | 9 pages; GRIDS Lab Technical Report, Aug 2008 | Proceedings of the 10th IEEE International Conference on High
Performance Computing and Communications (HPCC-08, IEEE CS Press, Los
Alamitos, CA, USA), Sept. 25-27, 2008, Dalian, China | 10.1109/HPCC.2008.172 | null | cs.DC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This keynote paper: presents a 21st century vision of computing; identifies
various computing paradigms promising to deliver the vision of computing
utilities; defines Cloud computing and provides the architecture for creating
market-oriented Clouds by leveraging technologies such as VMs; provides
thoughts on market-based resource management strategies that encompass both
customer-driven service management and computational risk management to sustain
SLA-oriented resource allocation; presents some representative Cloud platforms
especially those developed in industries along with our current work towards
realising market-oriented resource allocation of Clouds by leveraging the 3rd
generation Aneka enterprise Grid technology; reveals our early thoughts on
interconnecting Clouds for dynamically creating an atmospheric computing
environment along with pointers to future community research; and concludes
with the need for convergence of competing IT paradigms for delivering our 21st
century vision.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 17:16:11 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Buyya",
"Rajkumar",
""
],
[
"Yeo",
"Chee Shin",
""
],
[
"Venugopal",
"Srikumar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.3563 | Stevan Harnad | Stevan Harnad | What It Feels Like To Hear Voices: Fond Memories of Julian Jaynes | 16 pages | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Julian Jaynes's profound humanitarian convictions not only prevented him from
going to war, but would have prevented him from ever kicking a dog. Yet
according to his theory, not only are language-less dogs unconscious, but so
too were the speaking/hearing Greeks in the Bicameral Era, when they heard
gods' voices telling them what to do rather than thinking for themselves. I
argue that to be conscious is to be able to feel, and that all mammals (and
probably lower vertebrates and invertebrates too) feel, hence are conscious.
Julian Jaynes's brilliant analysis of our concepts of consciousness
nevertheless keeps inspiring ever more inquiry and insights into the age-old
mind/body problem and its relation to cognition and language.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 18:17:44 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Harnad",
"Stevan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0808.3569 | Stevan Harnad | Itiel Dror, Stevan Harnad | Offloading Cognition onto Cognitive Technology | To Appear in: Itiel E. Dror & Stevan Harnad (Eds) Cognition
Distributed: How Cognitive Technology Extends Our Minds. Amsterdam: John
Benjamins | null | null | null | cs.MA cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | "Cognizing" (e.g., thinking, understanding, and knowing) is a mental state.
Systems without mental states, such as cognitive technology, can sometimes
contribute to human cognition, but that does not make them cognizers. Cognizers
can offload some of their cognitive functions onto cognitive technology,
thereby extending their performance capacity beyond the limits of their own
brain power. Language itself is a form of cognitive technology that allows
cognizers to offload some of their cognitive functions onto the brains of other
cognizers. Language also extends cognizers' individual and joint performance
powers, distributing the load through interactive and collaborative cognition.
Reading, writing, print, telecommunications and computing further extend
cognizers' capacities. And now the web, with its network of cognizers, digital
databases and software agents, all accessible anytime, anywhere, has become our
'Cognitive Commons,' in which distributed cognizers and cognitive technology
can interoperate globally with a speed, scope and degree of interactivity
inconceivable through local individual cognition alone. And as with language,
the cognitive tool par excellence, such technological changes are not merely
instrumental and quantitative: they can have profound effects on how we think
and encode information, on how we communicate with one another, on our mental
states, and on our very nature.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 19:15:24 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Aug 2008 22:50:46 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Sep 2008 20:34:05 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Dror",
"Itiel",
""
],
[
"Harnad",
"Stevan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0808.3572 | Marco Duarte | Richard G. Baraniuk, Volkan Cevher, Marco F. Duarte, Chinmay Hegde | Model-Based Compressive Sensing | 20 pages, 10 figures. Typo corrected in grant number. To appear in
IEEE Transactions on Information Theory | null | 10.1109/TIT.2010.2040894 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressive sensing (CS) is an alternative to Shannon/Nyquist sampling for
the acquisition of sparse or compressible signals that can be well approximated
by just K << N elements from an N-dimensional basis. Instead of taking periodic
samples, CS measures inner products with M < N random vectors and then recovers
the signal via a sparsity-seeking optimization or greedy algorithm. Standard CS
dictates that robust signal recovery is possible from M = O(K log(N/K))
measurements. It is possible to substantially decrease M without sacrificing
robustness by leveraging more realistic signal models that go beyond simple
sparsity and compressibility by including structural dependencies between the
values and locations of the signal coefficients. This paper introduces a
model-based CS theory that parallels the conventional theory and provides
concrete guidelines on how to create model-based recovery algorithms with
provable performance guarantees. A highlight is the introduction of a new class
of structured compressible signals along with a new sufficient condition for
robust structured compressible signal recovery that we dub the restricted
amplification property, which is the natural counterpart to the restricted
isometry property of conventional CS. Two examples integrate two relevant
signal models - wavelet trees and block sparsity - into two state-of-the-art CS
recovery algorithms and prove that they offer robust recovery from just M=O(K)
measurements. Extensive numerical simulations demonstrate the validity and
applicability of our new theory and algorithms.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 19:53:16 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Sep 2008 21:31:13 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Jul 2009 02:51:17 GMT"
},
{
"version": "v4",
"created": "Sun, 6 Dec 2009 15:36:40 GMT"
},
{
"version": "v5",
"created": "Wed, 9 Dec 2009 19:41:24 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Baraniuk",
"Richard G.",
""
],
[
"Cevher",
"Volkan",
""
],
[
"Duarte",
"Marco F.",
""
],
[
"Hegde",
"Chinmay",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3574 | Mehrnoosh Sadrzadeh | Ellie D'Hondt and Mehrnoosh Sadrzadeh | Classical Knowledge for Quantum Security | extended abstract, 13 pages | null | null | null | cs.CR cs.LO quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a decision procedure for analysing security of quantum
cryptographic protocols, combining a classical algebraic rewrite system for
knowledge with an operational semantics for quantum distributed computing. As a
test case, we use our procedure to reason about security properties of a
recently developed quantum secret sharing protocol that uses graph states. We
analyze three different scenarios based on the safety assumptions of the
classical and quantum channels and discover the path of an attack in the
presence of an adversary. The epistemic analysis that leads to this and similar
types of attacks is purely based on our classical notion of knowledge.
| [
{
"version": "v1",
"created": "Tue, 26 Aug 2008 19:34:07 GMT"
}
]
| 2008-08-28T00:00:00 | [
[
"D'Hondt",
"Ellie",
""
],
[
"Sadrzadeh",
"Mehrnoosh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0808.3616 | Reginald Smith | Reginald D. Smith | Constructing word similarities in Meroitic as an aid to decipherment | 10 pages; 2 figures; to appear in British Museum studies in Ancient
Egypt and Sudan | British Museum Studies in Ancient Egypt and Sudan, 12, 1-10 (2009) | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Meroitic is the still undeciphered language of the ancient civilization of
Kush. Over the years, various techniques for decipherment such as finding a
bilingual text or cognates from modern or other ancient languages in the Sudan
and surrounding areas has not been successful. Using techniques borrowed from
information theory and natural language statistics, similar words are paired
and attempts are made to use currently defined words to extract at least
partial meaning from unknown words.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2008 02:02:40 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Sep 2008 01:49:00 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Mar 2009 11:53:07 GMT"
}
]
| 2009-08-24T00:00:00 | [
[
"Smith",
"Reginald D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0808.3651 | Lijun Zhang | Lijun Zhang, Holger Hermanns, Friedrich Eisenbrand and David N. Jansen | Flow Faster: Efficient Decision Algorithms for Probabilistic Simulations | LMCS | Logical Methods in Computer Science, Volume 4, Issue 4 (November
11, 2008) lmcs:989 | 10.2168/LMCS-4(4:6)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Strong and weak simulation relations have been proposed for Markov chains,
while strong simulation and strong probabilistic simulation relations have been
proposed for probabilistic automata. However, decision algorithms for strong
and weak simulation over Markov chains, and for strong simulation over
probabilistic automata are not efficient, which makes it as yet unclear whether
they can be used as effectively as their non-probabilistic counterparts. This
paper presents drastically improved algorithms to decide whether some
(discrete- or continuous-time) Markov chain strongly or weakly simulates
another, or whether a probabilistic automaton strongly simulates another. The
key innovation is the use of parametric maximum flow techniques to amortize
computations. We also present a novel algorithm for deciding strong
probabilistic simulation preorders on probabilistic automata, which has
polynomial complexity via a reduction to an LP problem. When extending the
algorithms for probabilistic automata to their continuous-time counterpart, we
retain the same complexity for both strong and strong probabilistic
simulations.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2008 08:35:44 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Nov 2008 23:56:01 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Nov 2008 17:00:30 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Zhang",
"Lijun",
""
],
[
"Hermanns",
"Holger",
""
],
[
"Eisenbrand",
"Friedrich",
""
],
[
"Jansen",
"David N.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0808.3689 | Xin Kang | Xin Kang, Ying-Chang Liang, Arumugam Nallanathan, Hari Krishna Garg,
and Rui Zhang | Optimal Power Allocation for Fading Channels in Cognitive Radio
Networks: Ergodic Capacity and Outage Capacity | 26 pages, 9 figures, to appear in IEEE Transactions on Wireless
Communications | null | 10.1109/TWC.2009.071448 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A cognitive radio network (CRN) is formed by either allowing the secondary
users (SUs) in a secondary communication network (SCN) to opportunistically
operate in the frequency bands originally allocated to a primary communication
network (PCN) or by allowing SCN to coexist with the primary users (PUs) in PCN
as long as the interference caused by SCN to each PU is properly regulated. In
this paper, we consider the latter case, known as spectrum sharing, and study
the optimal power allocation strategies to achieve the ergodic capacity and the
outage capacity of the SU fading channel under different types of power
constraints and fading channel models. In particular, besides the interference
power constraint at PU, the transmit power constraint of SU is also considered.
Since the transmit power and the interference power can be limited either by a
peak or an average constraint, various combinations of power constraints are
studied. It is shown that there is a capacity gain for SU under the average
over the peak transmit/interference power constraint. It is also shown that
fading for the channel between SU transmitter and PU receiver is usually a
beneficial factor for enhancing the SU channel capacities.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2008 12:41:28 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Aug 2008 05:47:17 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Kang",
"Xin",
""
],
[
"Liang",
"Ying-Chang",
""
],
[
"Nallanathan",
"Arumugam",
""
],
[
"Garg",
"Hari Krishna",
""
],
[
"Zhang",
"Rui",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3693 | Xavier Grehant | Xavier Grehant and J.M. Dana | Providing Virtual Execution Environments: A Twofold Illustration | openlab Technical Documents and Publications | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Platform virtualization helps solving major grid computing challenges: share
resource with flexible, user-controlled and custom execution environments and
in the meanwhile, isolate failures and malicious code. Grid resource management
tools will evolve to embrace support for virtual resource.
We present two open source projects that transparently supply virtual
execution environments. Tycoon has been developed at HP Labs to optimise
resource usage in creating an economy where users bid to access virtual
machines and compete for CPU cycles. SmartDomains provides a peer-to-peer layer
that automates virtual machines deployment using a description language and
deployment engine from HP Labs. These projects demonstrate both client-server
and peer-to-peer approaches to virtual resource management. The first case
makes extensive use of virtual machines features for dynamic resource
allocation. The second translates virtual machines capabilities into a
sophisticated language where resource management components can be plugged in
configurations and architectures defined at deployment time.
We propose to share our experience at CERN openlab developing SmartDomains
and deploying Tycoon to give an illustrative introduction to emerging research
in virtual resource management.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2008 12:48:39 GMT"
}
]
| 2008-08-28T00:00:00 | [
[
"Grehant",
"Xavier",
""
],
[
"Dana",
"J. M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0808.3694 | David Eppstein | David Eppstein and Michael T. Goodrich | Studying Geometric Graph Properties of Road Networks Through an
Algorithmic Lens | Expanded version of paper appearing at ACM GIS 2008 | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies real-world road networks from an algorithmic perspective,
focusing on empirical studies that yield useful properties of road networks
that can be exploited in the design of fast algorithms that deal with
geographic data. Unlike previous approaches, our study is not based on the
assumption that road networks are planar graphs. Indeed, based on the a number
of experiments we have performed on the road networks of the 50 United States
and District of Columbia, we provide strong empirical evidence that road
networks are quite non-planar. Our approach therefore instead is directed at
finding algorithmically-motivated properties of road networks as non-planar
geometric graphs, focusing on alternative properties of road networks that can
still lead to efficient algorithms for such problems as shortest paths and
Voronoi diagrams. In particular, we study road networks as multiscale-dispersed
graphs, which is a concept we formalize in terms of disk neighborhood systems.
This approach allows us to develop fast algorithms for road networks without
making any additional assumptions about the distribution of edge weights. In
fact, our algorithms can allow for non-metric weights.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2008 19:00:29 GMT"
},
{
"version": "v2",
"created": "Wed, 13 May 2009 21:28:13 GMT"
}
]
| 2009-05-14T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0808.3712 | Michel Fliess | Michel Fliess (LIX, INRIA Saclay - Ile de France) | Critique du rapport signal \`a bruit en communications num\'eriques --
Questioning the signal to noise ratio in digital communications | null | ARIMA (Revue africaine d'informatique et de Math\'ematiques
appliqu\'ees) 9 (2008) 419-429 | null | null | cs.IT math.IT math.PR math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The signal to noise ratio, which plays such an important r\^ole in
information theory, is shown to become pointless for digital communications
where the demodulation is achieved via new fast estimation techniques.
Operational calculus, differential algebra, noncommutative algebra and
nonstandard analysis are the main mathematical tools.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2008 14:05:38 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Dec 2008 15:04:53 GMT"
},
{
"version": "v3",
"created": "Wed, 10 Dec 2008 10:39:01 GMT"
}
]
| 2008-12-10T00:00:00 | [
[
"Fliess",
"Michel",
"",
"LIX, INRIA Saclay - Ile de France"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
]
|
0808.3717 | Viviana Sica | Victor van Reijswoud, Arjan de Jager | Free and Open Source Software for Development | 113 pages, ISBN 978-88-7699-131-8 (Printed edition), ISBN
978-88-7699-132-5 (Electronic edition), printed edition available at
http://www.amazon.com/ and on http://stores.lulu.com/polimetrica | "Publishing studies" book series, edited by Giandomenico Sica,
ISSN 1973-6061 (Printed edition), ISSN 1973-6053 (Electronic edition) | null | null | cs.GL | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Development organizations and International Non-Governmental Organizations
have been emphasizing the high potential of Free and Open Source Software for
the Less Developed Countries. Cost reduction, less vendor dependency and
increased potential for local capacity development have been their main
arguments. In spite of its advantages, Free and Open Source Software is not
widely adopted at the African continent. In this book the authors will explore
the grounds on with these expectations are based. Where do they come from and
is there evidence to support these expectations? Over the past years several
projects have been initiated and some good results have been achieved, but at
the same time many challenges were encountered. What lessons can be drawn from
these experiences and do these experiences contain enough evidence to support
the high expectations? Several projects and their achievements will be
considered. In the final part of the book the future of Free and Open Source
Software for Development will be explored. Special attention is given to the
African continent since here challenges are highest. What is the role of Free
and open Source Software for Development and how do we need to position and
explore the potential? What are the threats? The book aims at professionals
that are engaged in the design and implementation of ICT for Development
(ICT4D) projects and want to improve their understanding of the role Free and
Open Source Software can play.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2008 15:21:21 GMT"
}
]
| 2008-08-28T00:00:00 | [
[
"van Reijswoud",
"Victor",
""
],
[
"de Jager",
"Arjan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
]
|
0808.3726 | Jianguo Liu | Jian-Guo Liu, Tao Zhou, Bing-Hong Wang, and Yi-Cheng Zhang | Highly accurate recommendation algorithm based on high-order
similarities | null | Physica A 389, 881-886 (2010) | 10.1016/j.physa.2009.10.027 | null | physics.data-an cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this Letter, we introduce a modified collaborative filtering (MCF)
algorithm, which has remarkably higher accuracy than the standard collaborative
filtering. In the MCF, instead of the standard Pearson coefficient, the
user-user similarities are obtained by a diffusion process. Furthermore, by
considering the second order similarities, we design an effective algorithm
that depresses the influence of mainstream preferences. The corresponding
algorithmic accuracy, measured by the ranking score, is further improved by
24.9% in the optimal case. In addition, two significant criteria of algorithmic
performance, diversity and popularity, are also taken into account. Numerical
results show that the algorithm based on second order similarity can outperform
the MCF simultaneously in all three criteria.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2008 15:42:02 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Oct 2009 15:24:36 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Liu",
"Jian-Guo",
""
],
[
"Zhou",
"Tao",
""
],
[
"Wang",
"Bing-Hong",
""
],
[
"Zhang",
"Yi-Cheng",
""
]
]
| [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0808.3746 | Vladimir Vyugin | Vladimir V. V'yugin | A game-theoretic version of Oakes' example for randomized forecasting | 9 pages | null | null | null | cs.LG cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using the game-theoretic framework for probability, Vovk and Shafer. have
shown that it is always possible, using randomization, to make sequential
probability forecasts that pass any countable set of well-behaved statistical
tests. This result generalizes work by other authors, who consider only tests
of calbration.
We complement this result with a lower bound. We show that Vovk and Shafer's
result is valid only when the forecasts are computed with unrestrictedly
increasing degree of accuracy.
When some level of discreteness is fixed, we present a game-theoretic
generalization of Oakes' example for randomized forecasting that is a test
failing any given method of deferministic forecasting; originally, this example
was presented for deterministic calibration.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2008 17:30:22 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Oct 2008 08:03:45 GMT"
}
]
| 2008-10-21T00:00:00 | [
[
"V'yugin",
"Vladimir V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0808.3747 | Francesco De Pellegrini Dr. | Eitan Altman and Francesco De Pellegrini | Forward Correction and Fountain codes in Delay Tolerant Networks | 10 pages - typos fixes | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Delay tolerant Ad-hoc Networks make use of mobility of relay nodes to
compensate for lack of permanent connectivity and thus enable communication
between nodes that are out of range of each other. To decrease delivery delay,
the information that needs to be delivered is replicated in the network. Our
objective in this paper is to study replication mechanisms that include coding
in order to improve the probability of successful delivery within a given time
limit. We propose an analytical approach that allows to quantify tradeoffs
between resources and performance measures (energy and delay). We study the
effect of coding on the performance of the network while optimizing parameters
that govern routing. Our results, based on fluid approximations, are compared
to simulations which validate the model
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2008 17:33:40 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Sep 2008 15:36:37 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Jan 2009 11:25:38 GMT"
}
]
| 2009-01-19T00:00:00 | [
[
"Altman",
"Eitan",
""
],
[
"De Pellegrini",
"Francesco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0808.3756 | Zheng Wang | Zheng Wang, Jie Luo | Approaching Blokh-Zyablov Error Exponent with Linear-Time
Encodable/Decodable Codes | Submitted to IEEE Communications Letters | null | 10.1109/LCOMM.2009.090047 | null | cs.IT cs.CC math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Guruswami and Indyk showed in [1] that Forney's error exponent can be
achieved with linear coding complexity over binary symmetric channels. This
paper extends this conclusion to general discrete-time memoryless channels and
shows that Forney's and Blokh-Zyablov error exponents can be arbitrarily
approached by one-level and multi-level concatenated codes with linear
encoding/decoding complexity. The key result is a revision to Forney's general
minimum distance decoding algorithm, which enables a low complexity integration
of Guruswami-Indyk's outer codes into the concatenated coding schemes.
| [
{
"version": "v1",
"created": "Wed, 27 Aug 2008 19:32:45 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Jan 2009 06:13:40 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Wang",
"Zheng",
""
],
[
"Luo",
"Jie",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3881 | Paul Bonsma | Paul Bonsma, Felix Breuer | Counting Hexagonal Patches and Independent Sets in Circle Graphs | null | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A hexagonal patch is a plane graph in which inner faces have length 6, inner
vertices have degree 3, and boundary vertices have degree 2 or 3. We consider
the following counting problem: given a sequence of twos and threes, how many
hexagonal patches exist with this degree sequence along the outer face? This
problem is motivated by the study of benzenoid hydrocarbons and fullerenes in
computational chemistry. We give the first polynomial time algorithm for this
problem. We show that it can be reduced to counting maximum independent sets in
circle graphs, and give a simple and fast algorithm for this problem.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2008 10:39:10 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Jul 2009 15:27:00 GMT"
}
]
| 2009-07-15T00:00:00 | [
[
"Bonsma",
"Paul",
""
],
[
"Breuer",
"Felix",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0808.3884 | Michael Thomas | Olaf Beyersdorff, Arne Meier, Michael Thomas, Heribert Vollmer | The Complexity of Reasoning for Fragments of Default Logic | Corrected version | null | null | null | cs.CC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Default logic was introduced by Reiter in 1980. In 1992, Gottlob classified
the complexity of the extension existence problem for propositional default
logic as $\SigmaPtwo$-complete, and the complexity of the credulous and
skeptical reasoning problem as SigmaP2-complete, resp. PiP2-complete.
Additionally, he investigated restrictions on the default rules, i.e.,
semi-normal default rules. Selman made in 1992 a similar approach with
disjunction-free and unary default rules. In this paper we systematically
restrict the set of allowed propositional connectives. We give a complete
complexity classification for all sets of Boolean functions in the meaning of
Post's lattice for all three common decision problems for propositional default
logic. We show that the complexity is a hexachotomy (SigmaP2-, DeltaP2-, NP-,
P-, NL-complete, trivial) for the extension existence problem, while for the
credulous and skeptical reasoning problem we obtain similar classifications
without trivial cases.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2008 11:14:41 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Sep 2008 09:20:55 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Nov 2008 21:48:08 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Aug 2010 12:37:06 GMT"
}
]
| 2010-08-24T00:00:00 | [
[
"Beyersdorff",
"Olaf",
""
],
[
"Meier",
"Arne",
""
],
[
"Thomas",
"Michael",
""
],
[
"Vollmer",
"Heribert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0808.3889 | Manuel Tomas Carrasco Benitez Mr. | M.T. Carrasco Benitez | Open architecture for multilingual parallel texts | 22 pages - for comments to the author and follow-ups go to
http://dragoman.org/par | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Multilingual parallel texts (abbreviated to parallel texts) are linguistic
versions of the same content ("translations"); e.g., the Maastricht Treaty in
English and Spanish are parallel texts. This document is about creating an open
architecture for the whole Authoring, Translation and Publishing Chain
(ATP-chain) for the processing of parallel texts.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2008 11:59:34 GMT"
}
]
| 2008-08-29T00:00:00 | [
[
"Benitez",
"M. T. Carrasco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0808.3892 | Slavcho Shtrakov | Slavcho Shtrakov | Essential arity gap of Boolean functions | 12 pages, J. of Computing, Serdika, IMI, BAS, Sofia | null | null | null | cs.DM | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We investigate the Boolean functions with essential arity gap 2. We use Full
Conjunctive Normal Forms instead of Zhegalkin's polynomials, which allow us to
simplify the proofs and to obtain several combinatorial results, concerning the
Boolean functions with a given arity gap.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2008 12:15:21 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Oct 2008 08:57:04 GMT"
}
]
| 2008-10-13T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0808.3928 | Benjamin Werner | Benjamin Werner | On the strength of proof-irrelevant type theories | 20 pages, Logical Methods in Computer Science, Long version of IJCAR
2006 paper | Logical Methods in Computer Science, Volume 4, Issue 3 (September
26, 2008) lmcs:1142 | 10.2168/LMCS-4(3:13)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a type theory with some proof-irrelevance built into the
conversion rule. We argue that this feature is useful when type theory is used
as the logical formalism underlying a theorem prover. We also show a close
relation with the subset types of the theory of PVS. We show that in these
theories, because of the additional extentionality, the axiom of choice implies
the decidability of equality, that is, almost classical logic. Finally we
describe a simple set-theoretic semantics.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2008 15:31:31 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Sep 2008 22:32:15 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Werner",
"Benjamin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0808.3937 | Markus Fidler | Michael Bredel, Markus Fidler | Understanding Fairness and its Impact on Quality of Service in IEEE
802.11 | null | IEEE INFOCOM 2009 | 10.1109/INFCOM.2009.5062022 | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Distributed Coordination Function (DCF) aims at fair and efficient medium
access in IEEE 802.11. In face of its success, it is remarkable that there is
little consensus on the actual degree of fairness achieved, particularly
bearing its impact on quality of service in mind. In this paper we provide an
accurate model for the fairness of the DCF. Given M greedy stations we assume
fairness if a tagged station contributes a share of 1/M to the overall number
of packets transmitted. We derive the probability distribution of fairness
deviations and support our analytical results by an extensive set of
measurements. We find a closed-form expression for the improvement of long-term
over short-term fairness. Regarding the random countdown values we quantify the
significance of their distribution whereas we discover that fairness is largely
insensitive to the distribution parameters. Based on our findings we view the
DCF as emulating an ideal fair queuing system to quantify the deviations from a
fair rate allocation. We deduce a stochastic service curve model for the DCF to
predict packet delays in IEEE 802.11. We show how a station can estimate its
fair bandwidth share from passive measurements of its traffic arrivals and
departures.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2008 15:35:10 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Bredel",
"Michael",
""
],
[
"Fidler",
"Markus",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0808.3959 | Uri Erez | Uri Erez and Ram Zamir | A Simple Extension of the $\modulo$-$\Lambda$ Transformation | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A simple lemma is derived that allows to transform a general scalar
(non-Gaussian, non-additive) continuous-alphabet channel as well as a general
multiple-access channel into a modulo-additive noise channel. While in general
the transformation is information lossy, it allows to leverage linear coding
techniques and capacity results derived for networks comprised of additive
Gaussian nodes to more general networks.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2008 17:57:30 GMT"
}
]
| 2008-08-29T00:00:00 | [
[
"Erez",
"Uri",
""
],
[
"Zamir",
"Ram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3971 | Jun Zhang | Jun Zhang, Runhua Chen, Jeffrey G. Andrews, Arunabha Ghosh, and Robert
W. Heath Jr | Networked MIMO with Clustered Linear Precoding | 27 pages, submitted to IEEE Transaction on Wireless Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A clustered base transceiver station (BTS) coordination strategy is proposed
for a large cellular MIMO network, which includes full intra-cluster
coordination to enhance the sum rate and limited inter-cluster coordination to
reduce interference for the cluster edge users. Multi-cell block
diagonalization is used to coordinate the transmissions across multiple BTSs in
the same cluster. To satisfy per-BTS power constraints, three combined precoder
and power allocation algorithms are proposed with different performance and
complexity tradeoffs. For inter-cluster coordination, the coordination area is
chosen to balance fairness for edge users and the achievable sum rate. It is
shown that a small cluster size (about 7 cells) is sufficient to obtain most of
the sum rate benefits from clustered coordination while greatly relieving
channel feedback requirement. Simulations show that the proposed coordination
strategy efficiently reduces interference and provides a considerable sum rate
gain for cellular MIMO networks.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2008 18:53:09 GMT"
}
]
| 2008-08-29T00:00:00 | [
[
"Zhang",
"Jun",
""
],
[
"Chen",
"Runhua",
""
],
[
"Andrews",
"Jeffrey G.",
""
],
[
"Ghosh",
"Arunabha",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.3990 | Mehmet A. S\"uzen | Mehmet S\"uzen and Ziya S\"uzen | Adaptive Dynamic Congestion Avoidance with Master Equation | 7 pages, 2 figure, technical report | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes an adaptive variant of Random Early Detection (RED)
gateway queue management for packet-switched networks via a discrete state
analog of the non-stationary Master Equation i.e. Markov process. The
computation of average queue size, which appeared in the original RED
algorithm, is altered by introducing a probability $P(l,t)$, which defines the
probability of having $l$ number of packets in the queue at the given time $t$,
and depends upon the previous state of the queue. This brings the advantage of
eliminating a free parameter: queue weight, completely. Computation of
transition rates and probabilities are carried out on the fly, and determined
by the algorithm automatically. Simulations with unstructured packets
illustrate the method, the performance of the adaptive variant of RED
algorithm, and the comparison with the standard RED.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2008 20:36:59 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Sep 2008 01:21:46 GMT"
}
]
| 2008-09-18T00:00:00 | [
[
"Süzen",
"Mehmet",
""
],
[
"Süzen",
"Ziya",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.4050 | Benjamin Burton | Benjamin A. Burton | Optimizing the double description method for normal surface enumeration | 27 pages, 12 figures; v2: Removed the 3^n bound from Section 3.3,
fixed the projective equation in Lemma 4.4, clarified "most triangulations"
in the introduction to section 5; v3: replace -ise with -ize for Mathematics
of Computation (note that this changes the title of the paper) | Mathematics of Computation 79 (2010), no. 269, 453-484 | 10.1090/S0025-5718-09-02282-0 | null | math.GT cs.CG math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many key algorithms in 3-manifold topology involve the enumeration of normal
surfaces, which is based upon the double description method for finding the
vertices of a convex polytope. Typically we are only interested in a small
subset of these vertices, thus opening the way for substantial optimization.
Here we give an account of the vertex enumeration problem as it applies to
normal surfaces, and present new optimizations that yield strong improvements
in both running time and memory consumption. The resulting algorithms are
tested using the freely available software package Regina.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 09:01:31 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Apr 2009 12:17:56 GMT"
},
{
"version": "v3",
"created": "Wed, 20 May 2009 22:20:36 GMT"
}
]
| 2011-11-29T00:00:00 | [
[
"Burton",
"Benjamin A.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0808.4060 | Wojciech Mazurczyk | Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk,
Krzysztof Cabaj, Pawel Radziszewski | TrustMAS: Trusted Communication Platform for Multi-Agent Systems | 18 pages, 7 figures, accepted to The 3rd International Symposium on
Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008
(Proceedings will be published by Springer LNCS) | null | null | null | cs.CR cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents TrustMAS - Trusted Communication Platform for Multi-Agent
Systems, which provides trust and anonymity for mobile agents. The platform
includes anonymous technique based on random-walk algorithm for providing
general purpose anonymous communication for agents. All agents, which take part
in the proposed platform, benefit from trust and anonymity that is provided for
their interactions. Moreover, in TrustMAS there are StegAgents (SA) that are
able to perform various steganographic communication. To achieve that goal, SAs
may use methods in different layers of TCP/IP model or specialized middleware
enabling steganography that allows hidden communication through all layers of
mentioned model. In TrustMAS steganographic channels are used to exchange
routing tables between StegAgents. Thus all StegAgents in TrustMAS with their
ability to exchange information by using hidden channels form distributed
steganographic router (Stegrouter).
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 10:02:20 GMT"
}
]
| 2008-09-01T00:00:00 | [
[
"Szczypiorski",
"Krzysztof",
""
],
[
"Margasinski",
"Igor",
""
],
[
"Mazurczyk",
"Wojciech",
""
],
[
"Cabaj",
"Krzysztof",
""
],
[
"Radziszewski",
"Pawel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0808.4079 | Amar Prakash Azad | Amar Prakash Azad, Eitan Altman and R. El-Azouzi | From Altruism to Non-Cooperation in Routing Games | null | null | null | null | cs.GT cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper studies the routing in the network shared by several users. Each
user seeks to optimize either its own performance or some combination between
its own performance and that of other users, by controlling the routing of its
given flow demand. We parameterize the degree of cooperation which allows to
cover the fully non-cooperative behavior, the fully cooperative behavior, and
even more, the fully altruistic behavior, all these as special cases of the
parameter's choice. A large part of the work consists in exploring the impact
of the degree of cooperation on the equilibrium. Our first finding is to
identify multiple Nash equilibria with cooperative behavior that do not occur
in the non-cooperative case under the same conditions (cost, demand and
topology). We then identify Braess like paradox (in which adding capacity or
adding a link to a network results in worse performance to all users) and study
the impact of the degree of cooperation on it. We identify another type of
paradox in cooperation scenario. We identify that when we increase the degree
of cooperation of a user while other users keep unchanged their degree of
cooperation, leads to an improvement in performance of that user. We then
pursue the exploration and carry it on to the setting of Mixed equilibrium
(i.e. some users are non atomic-they have infinitesimally small demand, and
other have finite fixed demand). We finally obtain some theoretical results
that show that for low degree of cooperation the equilibrium is unique,
confirming the results of our numerical study.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 12:49:12 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Aug 2008 22:39:41 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Oct 2008 16:34:44 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Azad",
"Amar Prakash",
""
],
[
"Altman",
"Eitan",
""
],
[
"El-Azouzi",
"R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.4100 | Vladimir Retakh | Sylvain Lavall\'ee, Christophe Reutenauer, Vladimir Retakh, Dominique
Perrin | Codes and Noncommutative Stochastic Matrices | 24 pages, Latex | null | null | null | math.RA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a matrix over a skew field fixing the column (1,...,1)^t, we give
formulas for a row vector fixed by this matrix. The same techniques are applied
to give noncommutative extensions of probabilistic properties of codes.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 13:58:02 GMT"
}
]
| 2008-09-01T00:00:00 | [
[
"Lavallée",
"Sylvain",
""
],
[
"Reutenauer",
"Christophe",
""
],
[
"Retakh",
"Vladimir",
""
],
[
"Perrin",
"Dominique",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.4104 | Dominik Schatzmann | Dominik Schatzmann, Martin Burkhart, Thrasyvoulos Spyropoulos | Flow-level Characteristics of Spam and Ham | null | null | null | TIK-Report No. 291 | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite a large amount of effort devoted in the past years trying to limit
unsolicited mail, spam is still a major global concern. Content-analysis
techniques and blacklists, the most popular methods used to identify and block
spam, are beginning to lose their edge in the battle. We argue here that one
not only needs to look into the network-related characteristics of spam
traffic, as has been recently suggested, but also to look deeper into the
network core, in order to counter the increasing sophistication of spam-ing
methods. Yet, at the same time, local knowledge available at a given server can
often be irreplaceable in identifying specific spammers. To this end, in this
paper we show how the local intelligence of mail servers can be gathered and
correlated pas- sively at the ISP-level providing valuable network-wide
information. Specifically, we use first a large network flow trace from a
medium size, national ISP, to demonstrate that the pre-filtering decisions of
individual mail servers can be tracked and combined at the flow level. Then, we
argue that such aggregated knowledge not only can allow ISPs to develop and
evaluate powerful new methods for fighting spam, but also to monitor remotely
what their own servers are doing.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 14:34:45 GMT"
}
]
| 2008-09-01T00:00:00 | [
[
"Schatzmann",
"Dominik",
""
],
[
"Burkhart",
"Martin",
""
],
[
"Spyropoulos",
"Thrasyvoulos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0808.4111 | Francois Bavaud | Fran\c{c}ois Bavaud | Relative Entropy and Statistics | 31 pages. 2 figures. | Bavaud F. (2009) Information Theory, Relative Entropy and
Statistics. In: Sommaruga G. (editor): Formal Theories of Information.
Lecture Notes in Computer Science 5363, Springer, pp. 54-78 | null | null | cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Formalising the confrontation of opinions (models) to observations (data) is
the task of Inferential Statistics. Information Theory provides us with a basic
functional, the relative entropy (or Kullback-Leibler divergence), an
asymmetrical measure of dissimilarity between the empirical and the theoretical
distributions. The formal properties of the relative entropy turn out to be
able to capture every aspect of Inferential Statistics, as illustrated here,
for simplicity, on dices (= i.i.d. process with finitely many outcomes):
refutability (strict or probabilistic): the asymmetry data / models; small
deviations: rejecting a single hypothesis; competition between hypotheses and
model selection; maximum likelihood: model inference and its limits; maximum
entropy: reconstructing partially observed data; EM-algorithm; flow data and
gravity modelling; determining the order of a Markov chain.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 15:33:10 GMT"
},
{
"version": "v2",
"created": "Sat, 3 Apr 2010 14:16:00 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Bavaud",
"François",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0808.4122 | Tomoyuki Yamakami | Tomoyuki Yamakami | Swapping Lemmas for Regular and Context-Free Languages | Version 2: minor chages associated with typos; slight changes of
title, abstract, and introduction (letter size, 13 pages, 4 figures) | null | null | null | cs.CC cs.CL cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In formal language theory, one of the most fundamental tools, known as
pumping lemmas, is extremely useful for regular and context-free languages.
However, there are natural properties for which the pumping lemmas are of
little use. One of such examples concerns a notion of advice, which depends
only on the size of an underlying input. A standard pumping lemma encounters
difficulty in proving that a given language is not regular in the presence of
advice. We develop its substitution, called a swapping lemma for regular
languages, to demonstrate the non-regularity of a target language with advice.
For context-free languages, we also present a similar form of swapping lemma,
which serves as a technical tool to show that certain languages are not
context-free with advice.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 16:09:08 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Mar 2009 16:13:24 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"Yamakami",
"Tomoyuki",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0808.4133 | Dmitry Shkatov | Valentin Goranko, Dmitry Shkatov | Tableau-based decision procedure for the multi-agent epistemic logic
with operators of common and distributed knowledge | To appear in the Proceedings of the 6th IEEE Conference on Software
Engineering and Formal Methods (SEFM 2008) | null | 10.1109/SEFM.2008.27 | null | cs.LO cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop an incremental-tableau-based decision procedure for the
multi-agent epistemic logic MAEL(CD) (aka S5_n (CD)), whose language contains
operators of individual knowledge for a finite set Ag of agents, as well as
operators of distributed and common knowledge among all agents in Ag. Our
tableau procedure works in (deterministic) exponential time, thus establishing
an upper bound for MAEL(CD)-satisfiability that matches the (implicit)
lower-bound known from earlier results, which implies ExpTime-completeness of
MAEL(CD)-satisfiability. Therefore, our procedure provides a complexity-optimal
algorithm for checking MAEL(CD)-satisfiability, which, however, in most cases
is much more efficient. We prove soundness and completeness of the procedure,
and illustrate it with an example.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 17:09:06 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Goranko",
"Valentin",
""
],
[
"Shkatov",
"Dmitry",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0808.4134 | Daniel A. Spielman | Daniel A. Spielman and Shang-Hua Teng | Spectral Sparsification of Graphs | This revision addresses comments of the referees. In particular, we
have completely re-written the proof of the main graph partitioning theorem
in section 8 | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new notion of graph sparsificaiton based on spectral
similarity of graph Laplacians: spectral sparsification requires that the
Laplacian quadratic form of the sparsifier approximate that of the original.
This is equivalent to saying that the Laplacian of the sparsifier is a good
preconditioner for the Laplacian of the original. We prove that every graph has
a spectral sparsifier of nearly linear size. Moreover, we present an algorithm
that produces spectral sparsifiers in time $\softO{m}$, where $m$ is the number
of edges in the original graph. This construction is a key component of a
nearly-linear time algorithm for solving linear equations in
diagonally-dominant matrcies. Our sparsification algorithm makes use of a
nearly-linear time algorithm for graph partitioning that satisfies a strong
guarantee: if the partition it outputs is very unbalanced, then the larger part
is contained in a subgraph of high conductance.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 17:17:29 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Sep 2008 14:20:42 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Jul 2010 20:48:36 GMT"
}
]
| 2010-07-22T00:00:00 | [
[
"Spielman",
"Daniel A.",
""
],
[
"Teng",
"Shang-Hua",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0808.4135 | Ofer Shayevitz | Ofer Shayevitz and Meir Feder | Achieving the Empirical Capacity Using Feedback Part I: Memoryless
Additive Models | Submitted to the IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of universal communications over an unknown channel
with an instantaneous noiseless feedback, and show how rates corresponding to
the empirical behavior of the channel can be attained, although no rate can be
guaranteed in advance. First, we consider a discrete modulo-additive channel
with alphabet $\mathcal{X}$, where the noise sequence $Z^n$ is arbitrary and
unknown and may causally depend on the transmitted and received sequences and
on the encoder's message, possibly in an adversarial fashion. Although the
classical capacity of this channel is zero, we show that rates approaching the
empirical capacity $\log|\mathcal{X}|-H_{emp}(Z^n)$ can be universally
attained, where $H_{emp}(Z^n)$ is the empirical entropy of $Z^n$. For the more
general setting where the channel can map its input to an output in an
arbitrary unknown fashion subject only to causality, we model the empirical
channel actions as the modulo-addition of a realized noise sequence, and show
that the same result applies if common randomness is available. The results are
proved constructively, by providing a simple sequential transmission scheme
approaching the empirical capacity. In part II of this work we demonstrate how
even higher rates can be attained by using more elaborate models for channel
actions, and by utilizing possible empirical dependencies in its behavior.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 17:22:41 GMT"
},
{
"version": "v2",
"created": "Sun, 31 Aug 2008 22:51:57 GMT"
}
]
| 2008-09-01T00:00:00 | [
[
"Shayevitz",
"Ofer",
""
],
[
"Feder",
"Meir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.4146 | RadhaKrishna Ganti | RadhaKrishna Ganti and Martin Haenggi | Dynamic Connectivity in ALOHA Ad Hoc Networks | Submitted to IEEE Transactions on Information Theory. | null | null | null | cs.IT cs.NI math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a wireless network the set of transmitting nodes changes frequently
because of the MAC scheduler and the traffic load. Previously, connectivity in
wireless networks was analyzed using static geometric graphs, and as we show
leads to an overly constrained design criterion. The dynamic nature of the
transmitting set introduces additional randomness in a wireless system that
improves the connectivity, and this additional randomness is not captured by a
static connectivity graph. In this paper, we consider an ad hoc network with
half-duplex radios that uses multihop routing and slotted ALOHA for the MAC
contention and introduce a random dynamic multi-digraph to model its
connectivity. We first provide analytical results about the degree distribution
of the graph. Next, defining the path formation time as the minimum time
required for a causal path to form between the source and destination on the
dynamic graph, we derive the distributional properties of the connection delay
using techniques from first-passage percolation and epidemic processes. We
consider the giant component of the network formed when communication is
noise-limited (by neglecting interference). Then, in the presence of
interference, we prove that the delay scales linearly with the
source-destination distance on this giant component. We also provide simulation
results to support the theoretical results.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 18:24:11 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Mar 2010 22:12:16 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Ganti",
"RadhaKrishna",
""
],
[
"Haenggi",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0808.4156 | Shirin Jalali | Shirin Jalali, Tsachy Weissman | Rate-Distortion via Markov Chain Monte Carlo | 35 pages, 16 figures, Submitted to IEEE Transactions on Information
Theory | null | 10.1109/ISIT.2008.4595107 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an approach to lossy source coding, utilizing ideas from Gibbs
sampling, simulated annealing, and Markov Chain Monte Carlo (MCMC). The idea is
to sample a reconstruction sequence from a Boltzmann distribution associated
with an energy function that incorporates the distortion between the source and
reconstruction, the compressibility of the reconstruction, and the point sought
on the rate-distortion curve. To sample from this distribution, we use a `heat
bath algorithm': Starting from an initial candidate reconstruction (say the
original source sequence), at every iteration, an index i is chosen and the
i-th sequence component is replaced by drawing from the conditional probability
distribution for that component given all the rest. At the end of this process,
the encoder conveys the reconstruction to the decoder using universal lossless
compression. The complexity of each iteration is independent of the sequence
length and only linearly dependent on a certain context parameter (which grows
sub-logarithmically with the sequence length). We show that the proposed
algorithms achieve optimum rate-distortion performance in the limits of large
number of iterations, and sequence length, when employed on any stationary
ergodic source. Experimentation shows promising initial results. Employing our
lossy compressors on noisy data, with appropriately chosen distortion measure
and level, followed by a simple de-randomization operation, results in a family
of denoisers that compares favorably (both theoretically and in practice) with
other MCMC-based schemes, and with the Discrete Universal Denoiser (DUDE).
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 19:23:16 GMT"
},
{
"version": "v2",
"created": "Fri, 7 May 2010 18:02:18 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Jalali",
"Shirin",
""
],
[
"Weissman",
"Tsachy",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0808.4160 | Chih-Yuan Tseng | Chih-Yuan Tseng and Ariel Caticha | Using Relative Entropy to Find Optimal Approximations: an Application to
Simple Fluids | 5 figures, accepted for publication in Physica A, 2008 | Physica A387, 6759 (2008) | 10.1016/j.physa.2008.08.035 | null | cond-mat.stat-mech cs.IT math.IT math.PR physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a maximum relative entropy formalism to generate optimal
approximations to probability distributions. The central results consist in (a)
justifying the use of relative entropy as the uniquely natural criterion to
select a preferred approximation from within a family of trial parameterized
distributions, and (b) to obtain the optimal approximation by marginalizing
over parameters using the method of maximum entropy and information geometry.
As an illustration we apply our method to simple fluids. The "exact" canonical
distribution is approximated by that of a fluid of hard spheres. The proposed
method first determines the preferred value of the hard-sphere diameter, and
then obtains an optimal hard-sphere approximation by a suitably weighed average
over different hard-sphere diameters. This leads to a considerable improvement
in accounting for the soft-core nature of the interatomic potential. As a
numerical demonstration, the radial distribution function and the equation of
state for a Lennard-Jones fluid (argon) are compared with results from
molecular dynamics simulations.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 19:46:55 GMT"
}
]
| 2008-10-17T00:00:00 | [
[
"Tseng",
"Chih-Yuan",
""
],
[
"Caticha",
"Ariel",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0809.0009 | Soummya Kar | Soummya Kar, Jose M.F.Moura and Kavita Ramanan | Distributed Parameter Estimation in Sensor Networks: Nonlinear
Observation Models and Imperfect Communication | IEEE Transactions On Information Theory, Vol. 58, No. 6, June 2012 | null | 10.1109/TIT.2012.219450 | null | cs.MA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper studies distributed static parameter (vector) estimation in sensor
networks with nonlinear observation models and noisy inter-sensor
communication. It introduces \emph{separably estimable} observation models that
generalize the observability condition in linear centralized estimation to
nonlinear distributed estimation. It studies two distributed estimation
algorithms in separably estimable models, the $\mathcal{NU}$ (with its linear
counterpart $\mathcal{LU}$) and the $\mathcal{NLU}$. Their update rule combines
a \emph{consensus} step (where each sensor updates the state by weight
averaging it with its neighbors' states) and an \emph{innovation} step (where
each sensor processes its local current observation.) This makes the three
algorithms of the \textit{consensus + innovations} type, very different from
traditional consensus. The paper proves consistency (all sensors reach
consensus almost surely and converge to the true parameter value,) efficiency,
and asymptotic unbiasedness. For $\mathcal{LU}$ and $\mathcal{NU}$, it proves
asymptotic normality and provides convergence rate guarantees. The three
algorithms are characterized by appropriately chosen decaying weight sequences.
Algorithms $\mathcal{LU}$ and $\mathcal{NU}$ are analyzed in the framework of
stochastic approximation theory; algorithm $\mathcal{NLU}$ exhibits mixed
time-scale behavior and biased perturbations, and its analysis requires a
different approach that is developed in the paper.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 20:32:48 GMT"
},
{
"version": "v2",
"created": "Fri, 18 May 2012 14:36:33 GMT"
}
]
| 2012-05-21T00:00:00 | [
[
"Kar",
"Soummya",
""
],
[
"Moura",
"Jose M. F.",
""
],
[
"Ramanan",
"Kavita",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.0016 | Steven Weber | Steven Weber, Jeffrey G. Andrews, Nihar Jindal | An overview of the transmission capacity of wireless networks | Submitted August 13, 2009 to IEEE Transactions on Communications.
Revisions submitted December 14, 2009 and February 26, 2010. | null | 10.1109/TCOMM.2010.093010.090478 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper surveys and unifies a number of recent contributions that have
collectively developed a metric for decentralized wireless network analysis
known as transmission capacity. Although it is notoriously difficult to derive
general end-to-end capacity results for multi-terminal or \adhoc networks, the
transmission capacity (TC) framework allows for quantification of achievable
single-hop rates by focusing on a simplified physical/MAC-layer model. By using
stochastic geometry to quantify the multi-user interference in the network, the
relationship between the optimal spatial density and success probability of
transmissions in the network can be determined, and expressed -- often fairly
simply -- in terms of the key network parameters. The basic model and
analytical tools are first discussed and applied to a simple network with path
loss only and we present tight upper and lower bounds on transmission capacity
(via lower and upper bounds on outage probability). We then introduce random
channels (fading/shadowing) and give TC and outage approximations for an
arbitrary channel distribution, as well as exact results for the special cases
of Rayleigh and Nakagami fading. We then apply these results to show how TC can
be used to better understand scheduling, power control, and the deployment of
multiple antennas in a decentralized network. The paper closes by discussing
shortcomings in the model as well as future research directions.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 21:13:34 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Aug 2009 19:30:37 GMT"
},
{
"version": "v3",
"created": "Fri, 14 Aug 2009 14:44:43 GMT"
},
{
"version": "v4",
"created": "Tue, 30 Mar 2010 11:53:48 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Weber",
"Steven",
""
],
[
"Andrews",
"Jeffrey G.",
""
],
[
"Jindal",
"Nihar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.0024 | Joseph Y. Halpern | Joseph Y. Halpern and Rafael Pass | Game Theory with Costly Computation | null | null | null | null | cs.GT cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a general game-theoretic framework for reasoning about strategic
agents performing possibly costly computation. In this framework, many
traditional game-theoretic results (such as the existence of a Nash
equilibrium) no longer hold. Nevertheless, we can use the framework to provide
psychologically appealing explanations to observed behavior in well-studied
games (such as finitely repeated prisoner's dilemma and rock-paper-scissors).
Furthermore, we provide natural conditions on games sufficient to guarantee
that equilibria exist. As an application of this framework, we consider a
notion of game-theoretic implementation of mediators in computational games. We
show that a special case of this notion is equivalent to a variant of the
traditional cryptographic definition of protocol security; this result shows
that, when taking computation into account, the two approaches used for dealing
with "deviating" players in two different communities -- Nash equilibrium in
game theory and zero-knowledge "simulation" in cryptography -- are intimately
related.
| [
{
"version": "v1",
"created": "Fri, 29 Aug 2008 22:39:53 GMT"
}
]
| 2008-09-02T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Pass",
"Rafael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0809.0032 | Darryl Lin | D. D. Lin and T. J. Lim | A Variational Inference Framework for Soft-In-Soft-Out Detection in
Multiple Access Channels | Submitted to Transactions on Information Theory | null | null | null | cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a unified framework for deriving and studying soft-in-soft-out
(SISO) detection in interference channels using the concept of variational
inference. The proposed framework may be used in multiple-access interference
(MAI), inter-symbol interference (ISI), and multiple-input multiple-outpu
(MIMO) channels. Without loss of generality, we will focus our attention on
turbo multiuser detection, to facilitate a more concrete discussion. It is
shown that, with some loss of optimality, variational inference avoids the
exponential complexity of a posteriori probability (APP) detection by
optimizing a closely-related, but much more manageable, objective function
called variational free energy. In addition to its systematic appeal, there are
several other advantages to this viewpoint. First of all, it provides unified
and rigorous justifications for numerous detectors that were proposed on
radically different grounds, and facilitates convenient joint detection and
decoding (utilizing the turbo principle) when error-control codes are
incorporated. Secondly, efficient joint parameter estimation and data detection
is possible via the variational expectation maximization (EM) algorithm, such
that the detrimental effect of inaccurate channel knowledge at the receiver may
be dealt with systematically. We are also able to extend BPSK-based SISO
detection schemes to arbitrary square QAM constellations in a rigorous manner
using a variational argument.
| [
{
"version": "v1",
"created": "Sat, 30 Aug 2008 01:05:29 GMT"
}
]
| 2009-11-23T00:00:00 | [
[
"Lin",
"D. D.",
""
],
[
"Lim",
"T. J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.0060 | Jeremy Sproston | Marcin Jurdzinski, Francois Laroussinie, Jeremy Sproston | Model Checking Probabilistic Timed Automata with One or Two Clocks | null | Logical Methods in Computer Science, Volume 4, Issue 3 (September
26, 2008) lmcs:988 | 10.2168/LMCS-4(3:12)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Probabilistic timed automata are an extension of timed automata with discrete
probability distributions. We consider model-checking algorithms for the
subclasses of probabilistic timed automata which have one or two clocks.
Firstly, we show that PCTL probabilistic model-checking problems (such as
determining whether a set of target states can be reached with probability at
least 0.99 regardless of how nondeterminism is resolved) are PTIME-complete for
one-clock probabilistic timed automata, and are EXPTIME-complete for
probabilistic timed automata with two clocks. Secondly, we show that, for
one-clock probabilistic timed automata, the model-checking problem for the
probabilistic timed temporal logic PCTL is EXPTIME-complete. However, the
model-checking problem for the subclass of PCTL which does not permit both
punctual timing bounds, which require the occurrence of an event at an exact
time point, and comparisons with probability bounds other than 0 or 1, is
PTIME-complete for one-clock probabilistic timed automata.
| [
{
"version": "v1",
"created": "Sat, 30 Aug 2008 13:26:48 GMT"
},
{
"version": "v2",
"created": "Sun, 21 Sep 2008 22:46:00 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Sep 2008 22:14:27 GMT"
}
]
| 2019-03-14T00:00:00 | [
[
"Jurdzinski",
"Marcin",
""
],
[
"Laroussinie",
"Francois",
""
],
[
"Sproston",
"Jeremy",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0809.0062 | Safique Ahmad Sk | Sk. Safique Ahmad and Nagalinga Rajan and Soumyendu Raha | The Stochastic Logarithmic Norm for Stability Analysis of Stochastic
Differential Equations | 19 pages | null | null | null | cs.NA | http://creativecommons.org/licenses/publicdomain/ | To analyze the stability of It\^o stochastic differential equations with
multiplicative noise, we introduce the stochastic logarithmic norm. The
logarithmic norm was originally introduced by G. Dahlquist in 1958 as a tool to
study the growth of solutions to ordinary differential equations and for
estimating the error growth in discretization methods for their approximate
solutions. We extend the concept to the stability analysis of It\^o stochastic
differential equations with multiplicative noise. Stability estimates for
linear It\^o SDEs using the one, two and $\infty$-norms in the $l$-th mean,
where $1 \leq l < \infty $, are derived and the application of the stochastic
logarithmic norm is illustrated with examples.
| [
{
"version": "v1",
"created": "Sat, 30 Aug 2008 14:07:41 GMT"
}
]
| 2008-09-02T00:00:00 | [
[
"Ahmad",
"Sk. Safique",
""
],
[
"Rajan",
"Nagalinga",
""
],
[
"Raha",
"Soumyendu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0809.0063 | Jean-Guillaume Dumas | Jean-Guillaume Dumas (LJK), Laurent Fousse (LJK), Bruno Salvy (INRIA
Rocquencourt) | Simultaneous Modular Reduction and Kronecker Substitution for Small
Finite Fields | null | null | 10.1016/j.jsc.2010.08.015 | null | cs.SC math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present algorithms to perform modular polynomial multiplication or modular
dot product efficiently in a single machine word. We pack polynomials into
integers and perform several modular operations with machine integer or
floating point arithmetic. The modular polynomials are converted into integers
using Kronecker substitution (evaluation at a sufficiently large integer). With
some control on the sizes and degrees, arithmetic operations on the polynomials
can be performed directly with machine integers or floating point numbers and
the number of conversions can be reduced. We also present efficient ways to
recover the modular values of the coefficients. This leads to practical gains
of quite large constant factors for polynomial multiplication, prime field
linear algebra and small extension field arithmetic.
| [
{
"version": "v1",
"created": "Sat, 30 Aug 2008 14:28:23 GMT"
}
]
| 2013-06-19T00:00:00 | [
[
"Dumas",
"Jean-Guillaume",
"",
"LJK"
],
[
"Fousse",
"Laurent",
"",
"LJK"
],
[
"Salvy",
"Bruno",
"",
"INRIA\n Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
]
|
0809.0070 | Daniel Lucani | Daniel E. Lucani, Muriel M\'edard, Milica Stojanovic | Underwater Acoustic Networks: Channel Models and Network Coding based
Lower Bound to Transmission Power for Multicast | 12 pages, 10 figures, 2 Tables, Accepted to Journal on Selected Areas
in Communications (Underwater Communications and Wireless Networks) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of this paper is two-fold. First, to establish a tractable model for
the underwater acoustic channel useful for network optimization in terms of
convexity. Second, to propose a network coding based lower bound for
transmission power in underwater acoustic networks, and compare this bound to
the performance of several network layer schemes. The underwater acoustic
channel is characterized by a path loss that depends strongly on transmission
distance and signal frequency. The exact relationship among power, transmission
band, distance and capacity for the Gaussian noise scenario is a complicated
one. We provide a closed-form approximate model for 1) transmission power and
2) optimal frequency band to use, as functions of distance and capacity. The
model is obtained through numerical evaluation of analytical results that take
into account physical models of acoustic propagation loss and ambient noise.
Network coding is applied to determine a lower bound to transmission power for
a multicast scenario, for a variety of multicast data rates and transmission
distances of interest for practical systems, exploiting physical properties of
the underwater acoustic channel. The results quantify the performance gap in
transmission power between a variety of routing and network coding schemes and
the network coding based lower bound. We illustrate results numerically for
different network scenarios.
| [
{
"version": "v1",
"created": "Sat, 30 Aug 2008 15:40:48 GMT"
}
]
| 2008-09-02T00:00:00 | [
[
"Lucani",
"Daniel E.",
""
],
[
"Médard",
"Muriel",
""
],
[
"Stojanovic",
"Milica",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.0073 | Abuzer Yakaryilmaz | Abuzer Yakaryilmaz, A. C. Cem Say | Languages recognized with unbounded error by quantum finite automata | This paper has been superseded by arXiv:1007.3624 | null | null | null | quant-ph cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been superseded by arXiv:1007.3624
| [
{
"version": "v1",
"created": "Sat, 30 Aug 2008 20:16:57 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Nov 2008 15:31:53 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Jul 2010 13:33:17 GMT"
}
]
| 2010-07-23T00:00:00 | [
[
"Yakaryilmaz",
"Abuzer",
""
],
[
"Say",
"A. C. Cem",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0809.0091 | Alexander Barg | Alexander Barg and Dmitry Nogin | A functional view of upper bounds on codes | 10 pages | " Coding and Cryptography," Proceedings of the First International
Workshop, Wuyi Mountain, Fujian, China, 11 - 15 June 2007, edited by Yongqing
Li et al., World Scientific, 2008, pp. 15--24 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Functional and linear-algebraic approaches to the Delsarte problem of upper
bounds on codes are discussed. We show that Christoffel-Darboux kernels and
Levenshtein polynomials related to them arise as stationary points of the
moment functionals of some distributions. We also show that they can be derived
as eigenfunctions of the Jacobi operator. This motivates the choice of
polynomials used to derive linear programming upper bounds on codes in
homogeneous spaces.
| [
{
"version": "v1",
"created": "Sat, 30 Aug 2008 22:43:22 GMT"
}
]
| 2008-09-02T00:00:00 | [
[
"Barg",
"Alexander",
""
],
[
"Nogin",
"Dmitry",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.0099 | Tiangao Gou | Tiangao Gou, Syed A. Jafar | Degrees of Freedom of the $K$ User $M \times N$ MIMO Interference
Channel | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide innerbound and outerbound for the total number of degrees of
freedom of the $K$ user multiple input multiple output (MIMO) Gaussian
interference channel with $M$ antennas at each transmitter and $N$ antennas at
each receiver if the channel coefficients are time-varying and drawn from a
continuous distribution. The bounds are tight when the ratio
$\frac{\max(M,N)}{\min(M,N)}=R$ is equal to an integer. For this case, we show
that the total number of degrees of freedom is equal to $\min(M,N)K$ if $K \leq
R$ and $\min(M,N)\frac{R}{R+1}K$ if $K > R$. Achievability is based on
interference alignment. We also provide examples where using interference
alignment combined with zero forcing can achieve more degrees of freedom than
merely zero forcing for some MIMO interference channels with constant channel
coefficients.
| [
{
"version": "v1",
"created": "Sun, 31 Aug 2008 04:52:03 GMT"
}
]
| 2008-09-02T00:00:00 | [
[
"Gou",
"Tiangao",
""
],
[
"Jafar",
"Syed A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.0103 | Dmitrii Manin | Dmitrii Y. Manin | On the nature of long-range letter correlations in texts | 14 pages, 5 figures, unpublished | null | null | null | cs.CL cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The origin of long-range letter correlations in natural texts is studied
using random walk analysis and Jensen-Shannon divergence. It is concluded that
they result from slow variations in letter frequency distribution, which are a
consequence of slow variations in lexical composition within the text. These
correlations are preserved by random letter shuffling within a moving window.
As such, they do reflect structural properties of the text, but in a very
indirect manner.
| [
{
"version": "v1",
"created": "Sun, 31 Aug 2008 06:08:15 GMT"
}
]
| 2016-11-27T00:00:00 | [
[
"Manin",
"Dmitrii Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.0116 | David Martin | David J. Martin, Johannes Gehrke, Joseph Y. Halpern | Toward Expressive and Scalable Sponsored Search Auctions | 10 pages, 13 figures, ICDE 2008 | David J. Martin, Johannes Gehrke, and Joseph Y. Halpern. Toward
Expressive and Scalable Sponsored Search Auctions. In Proceedings of the 24th
IEEE International Conference on Data Engineering, pages 237--246. April 2008 | 10.1109/ICDE.2008.4497432 | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Internet search results are a growing and highly profitable advertising
platform. Search providers auction advertising slots to advertisers on their
search result pages. Due to the high volume of searches and the users' low
tolerance for search result latency, it is imperative to resolve these auctions
fast. Current approaches restrict the expressiveness of bids in order to
achieve fast winner determination, which is the problem of allocating slots to
advertisers so as to maximize the expected revenue given the advertisers' bids.
The goal of our work is to permit more expressive bidding, thus allowing
advertisers to achieve complex advertising goals, while still providing fast
and scalable techniques for winner determination.
| [
{
"version": "v1",
"created": "Sun, 31 Aug 2008 12:24:38 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Martin",
"David J.",
""
],
[
"Gehrke",
"Johannes",
""
],
[
"Halpern",
"Joseph Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.