id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0809.1551 | Slawomir Staworko | Slawomir Staworko, Jan Chomicki | Consistent Query Answers in the Presence of Universal Constraints | Submitted to Information Systems | null | null | UB CSE TR 2008-15 | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The framework of consistent query answers and repairs has been introduced to
alleviate the impact of inconsistent data on the answers to a query. A repair
is a minimally different consistent instance and an answer is consistent if it
is present in every repair. In this article we study the complexity of
consistent query answers and repair checking in the presence of universal
constraints.
We propose an extended version of the conflict hypergraph which allows to
capture all repairs w.r.t. a set of universal constraints. We show that repair
checking is in PTIME for the class of full tuple-generating dependencies and
denial constraints, and we present a polynomial repair algorithm. This
algorithm is sound, i.e. always produces a repair, but also complete, i.e.
every repair can be constructed. Next, we present a polynomial-time algorithm
computing consistent answers to ground quantifier-free queries in the presence
of denial constraints, join dependencies, and acyclic full-tuple generating
dependencies. Finally, we show that extending the class of constraints leads to
intractability. For arbitrary full tuple-generating dependencies consistent
query answering becomes coNP-complete. For arbitrary universal constraints
consistent query answering is \Pi_2^p-complete and repair checking
coNP-complete.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2008 15:04:52 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Feb 2009 11:56:52 GMT"
}
]
| 2009-02-19T00:00:00 | [
[
"Staworko",
"Slawomir",
""
],
[
"Chomicki",
"Jan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0809.1552 | Bas Spitters | Russell O'Connor and Bas Spitters | A computer verified, monadic, functional implementation of the integral | null | Theoretical Computer Science, Volume 411, Issue 37, 7 August 2010,
Pages 3386-3402 | 10.1016/j.tcs.2010.05.031 | null | cs.LO cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a computer verified exact monadic functional implementation of the
Riemann integral in type theory. Together with previous work by O'Connor, this
may be seen as the beginning of the realization of Bishop's vision to use
constructive mathematics as a programming language for exact analysis.
| [
{
"version": "v1",
"created": "Mon, 8 Sep 2008 20:54:36 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Jun 2010 11:23:20 GMT"
}
]
| 2010-08-11T00:00:00 | [
[
"O'Connor",
"Russell",
""
],
[
"Spitters",
"Bas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0809.1570 | Patrick Erik Bradley | Patrick Erik Bradley | Mumford dendrograms and discrete p-adic symmetries | 14 pages, 6 figures | p-Adic Numbers, Ultrametric Analysis and Applications, Vol. 1, No.
2 (2009), 118-127 | 10.1134/S2070046609020034 | null | cs.DM math-ph math.MP q-bio.GN | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, we present an effective encoding of dendrograms by embedding
them into the Bruhat-Tits trees associated to $p$-adic number fields. As an
application, we show how strings over a finite alphabet can be encoded in
cyclotomic extensions of $\mathbb{Q}_p$ and discuss $p$-adic DNA encoding. The
application leads to fast $p$-adic agglomerative hierarchic algorithms similar
to the ones recently used e.g. by A. Khrennikov and others. From the viewpoint
of $p$-adic geometry, to encode a dendrogram $X$ in a $p$-adic field $K$ means
to fix a set $S$ of $K$-rational punctures on the $p$-adic projective line
$\mathbb{P}^1$. To $\mathbb{P}^1\setminus S$ is associated in a natural way a
subtree inside the Bruhat-Tits tree which recovers $X$, a method first used by
F. Kato in 1999 in the classification of discrete subgroups of
$\textrm{PGL}_2(K)$.
Next, we show how the $p$-adic moduli space $\mathfrak{M}_{0,n}$ of
$\mathbb{P}^1$ with $n$ punctures can be applied to the study of time series of
dendrograms and those symmetries arising from hyperbolic actions on
$\mathbb{P}^1$. In this way, we can associate to certain classes of dynamical
systems a Mumford curve, i.e. a $p$-adic algebraic curve with totally
degenerate reduction modulo $p$.
Finally, we indicate some of our results in the study of general discrete
actions on $\mathbb{P}^1$, and their relation to $p$-adic Hurwitz spaces.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2008 14:41:05 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Bradley",
"Patrick Erik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
}
]
|
0809.1590 | Massimiliano Pontil | Andreas Argyriou, Charles Micchelli and Massimiliano Pontil | When is there a representer theorem? Vector versus matrix regularizers | 22 pages 2 figures | Journal of Machine Learning Research, 10:2507-2529, 2009 | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a general class of regularization methods which learn a vector of
parameters on the basis of linear measurements. It is well known that if the
regularizer is a nondecreasing function of the inner product then the learned
vector is a linear combination of the input data. This result, known as the
{\em representer theorem}, is at the basis of kernel-based methods in machine
learning. In this paper, we prove the necessity of the above condition, thereby
completing the characterization of kernel methods based on regularization. We
further extend our analysis to regularization methods which learn a matrix, a
problem which is motivated by the application to multi-task learning. In this
context, we study a more general representer theorem, which holds for a larger
class of regularizers. We provide a necessary and sufficient condition for
these class of matrix regularizers and highlight them with some concrete
examples of practical importance. Our analysis uses basic principles from
matrix theory, especially the useful notion of matrix nondecreasing function.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2008 16:11:12 GMT"
}
]
| 2012-08-21T00:00:00 | [
[
"Argyriou",
"Andreas",
""
],
[
"Micchelli",
"Charles",
""
],
[
"Pontil",
"Massimiliano",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0809.1593 | Daniil Ryabko | Boris Ryabko, Daniil Ryabko | Constructing Perfect Steganographic Systems | null | Information and Computation, 2011, Vol. 209, No. 9, pp. 1223-1230 | 10.1016/j.ic.2011.06.004 | null | cs.CR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose steganographic systems for the case when covertexts (containers)
are generated by a finite-memory source with possibly unknown statistics. The
probability distributions of covertexts with and without hidden information are
the same; this means that the proposed stegosystems are perfectly secure, i.e.
an observer cannot determine whether hidden information is being transmitted.
The speed of transmission of hidden information can be made arbitrary close to
the theoretical limit - the Shannon entropy of the source of covertexts. An
interesting feature of the suggested stegosystems is that they do not require
any (secret or public) key.
At the same time, we outline some principled computational limitations on
steganography. We show that there are such sources of covertexts, that any
stegosystem that has linear (in the length of the covertext) speed of
transmission of hidden text must have an exponential Kolmogorov complexity.
This shows, in particular, that some assumptions on the sources of covertext
are necessary.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2008 16:09:52 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jul 2011 09:54:42 GMT"
}
]
| 2012-02-28T00:00:00 | [
[
"Ryabko",
"Boris",
""
],
[
"Ryabko",
"Daniil",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.1618 | Antonio Pereira | Antonio Pereira | ECOLANG - Communications Language for Ecological Simulations Network | 16 pages, language specification description | null | null | TR-LIACC-FEUP-AMCP 01.1 | cs.AI cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This document describes the communication language used in one multiagent
system environment for ecological simulations, based on EcoDynamo simulator
application linked with several intelligent agents and visualisation
applications, and extends the initial definition of the language. The agents
actions and perceptions are translated into messages exchanged with the
simulator application and other agents. The concepts and definitions used
follow the BNF notation (Backus et al. 1960) and is inspired in the Coach
Unilang language (Reis and Lau 2002).
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2008 17:46:17 GMT"
}
]
| 2008-09-10T00:00:00 | [
[
"Pereira",
"Antonio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0809.1644 | Russell O'Connor | Cezary Kaliszyk and Russell O'Connor | Computing with Classical Real Numbers | null | Journal of Formalized Reasoning, 2(1):27-39, 2009 | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There are two incompatible Coq libraries that have a theory of the real
numbers; the Coq standard library gives an axiomatic treatment of classical
real numbers, while the CoRN library from Nijmegen defines constructively valid
real numbers. Unfortunately, this means results about one structure cannot
easily be used in the other structure. We present a way interfacing these two
libraries by showing that their real number structures are isomorphic assuming
the classical axioms already present in the standard library reals. This allows
us to use O'Connor's decision procedure for solving ground inequalities present
in CoRN to solve inequalities about the reals from the Coq standard library,
and it allows theorems from the Coq standard library to apply to problem about
the CoRN reals.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2008 19:55:03 GMT"
}
]
| 2010-08-04T00:00:00 | [
[
"Kaliszyk",
"Cezary",
""
],
[
"O'Connor",
"Russell",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0809.1659 | Robert Paul Morris | Scott Bardsley, Theodosios Thomas, and R. Paul Morris | A Tiered Security System for Mobile Devices | 10 pages, 2 figures | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have designed a tiered security system for mobile devices where each
security tier holds user-defined security triggers and actions. It has a
friendly interface that allows users to easily define and configure the
different circumstances and actions they need according to context. The system
can be set up and activated from any browser or directly on the mobile device
itself. When the security system is operated from a Web site or server, its
configuration can be readily shared across multiple devices. When operated
directly from the mobile device, no server is needed for activation. Many
different types of security circumstances and actions can be set up and
employed from its tiers. Security circumstances can range from temporary
misplacement of a mobile device at home to malicious theft in a hostile region.
Security actions can range from ringing a simple alarm to automatically
erasing, overwriting, and re-erasing drives.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2008 20:23:51 GMT"
}
]
| 2008-09-11T00:00:00 | [
[
"Bardsley",
"Scott",
""
],
[
"Thomas",
"Theodosios",
""
],
[
"Morris",
"R. Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0809.1681 | Rafael Laufer | Rafael Laufer and Leonard Kleinrock | Multirate Anypath Routing in Wireless Mesh Networks | 13 pages, 8 figures | IEEE INFOCOM 2009 | 10.1109/INFCOM.2009.5061904 | UCLA-CSD-TR080025 | cs.NI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a new routing paradigm that generalizes
opportunistic routing in wireless mesh networks. In multirate anypath routing,
each node uses both a set of next hops and a selected transmission rate to
reach a destination. Using this rate, a packet is broadcast to the nodes in the
set and one of them forwards the packet on to the destination. To date, there
is no theory capable of jointly optimizing both the set of next hops and the
transmission rate used by each node. We bridge this gap by introducing a
polynomial-time algorithm to this problem and provide the proof of its
optimality. The proposed algorithm runs in the same running time as regular
shortest-path algorithms and is therefore suitable for deployment in link-state
routing protocols. We conducted experiments in a 802.11b testbed network, and
our results show that multirate anypath routing performs on average 80% and up
to 6.4 times better than anypath routing with a fixed rate of 11 Mbps. If the
rate is fixed at 1 Mbps instead, performance improves by up to one order of
magnitude.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2008 21:49:04 GMT"
}
]
| 2010-11-01T00:00:00 | [
[
"Laufer",
"Rafael",
""
],
[
"Kleinrock",
"Leonard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0809.1686 | Antonio Pereira | Antonio Pereira (1 and 2), Pedro Duarte (1), Luis Paulo Reis (2) ((1)
UFP, Porto, Portugal (2) FEUP, Porto, Portugal) | Agent-based Ecological Model Calibration - on the Edge of a New Approach | 7 pages, 6 figures, Proceedings of the International Conference on
Knowledge Engineering and Decision Support, pp. 107-113, ISEP, Porto,
Portugal, July 2004 | null | null | null | cs.AI cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The purpose of this paper is to present a new approach to ecological model
calibration -- an agent-based software. This agent works on three stages: 1- It
builds a matrix that synthesizes the inter-variable relationships; 2- It
analyses the steady-state sensitivity of different variables to different
parameters; 3- It runs the model iteratively and measures model lack of fit,
adequacy and reliability. Stage 3 continues until some convergence criteria are
attained. At each iteration, the agent knows from stages 1 and 2, which
parameters are most likely to produce the desired shift on predicted results.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2008 22:12:37 GMT"
}
]
| 2008-09-11T00:00:00 | [
[
"Pereira",
"Antonio",
"",
"1 and 2"
],
[
"Duarte",
"Pedro",
""
],
[
"Reis",
"Luis Paulo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0809.1687 | Shamgar Gurevich | Shamgar Gurevich (UC Berkeley) and Ronny Hadani (University of
Chicago) | Incoherent dictionaries and the statistical restricted isometry property | Key words: Incoherent dictionaries, statistical version of Candes -
Tao RIP, Semi-Circle law, deterministic constructions, Heisenberg-Weil
representation | null | null | null | cs.IT cs.DM math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we present a statistical version of the Candes-Tao restricted
isometry property (SRIP for short) which holds in general for any incoherent
dictionary which is a disjoint union of orthonormal bases. In addition, under
appropriate normalization, the eigenvalues of the associated Gram matrix
fluctuate around 1 according to the Wigner semicircle distribution. The result
is then applied to various dictionaries that arise naturally in the setting of
finite harmonic analysis, giving, in particular, a better understanding on a
remark of Applebaum-Howard-Searle-Calderbank concerning RIP for the Heisenberg
dictionary of chirp like functions.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2008 22:13:00 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Oct 2008 02:03:23 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Jan 2009 06:23:04 GMT"
},
{
"version": "v4",
"created": "Fri, 13 Mar 2009 10:07:13 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Gurevich",
"Shamgar",
"",
"UC Berkeley"
],
[
"Hadani",
"Ronny",
"",
"University of\n Chicago"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0809.1710 | Sreyash Kenkre | Ajit A. Diwan, Sreyash Kenkre, Sundar Vishwanathan | Circumference, Chromatic Number and Online Coloring | 12 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Erd\"os conjectured that if $G$ is a triangle free graph of chromatic number
at least $k\geq 3$, then it contains an odd cycle of length at least
$k^{2-o(1)}$ \cite{sudakovverstraete, verstraete}. Nothing better than a linear
bound (\cite{gyarfas}, Problem 5.1.55 in \cite{West}) was so far known. We make
progress on this conjecture by showing that $G$ contains an odd cycle of length
at least $O(k\log\log k)$. Erd\"os' conjecture is known to hold for graphs with
girth at least 5. We show that if a girth 4 graph is $C_5$ free, then Erd\"os'
conjecture holds. When the number of vertices is not too large we can prove
better bounds on $\chi$. We also give bounds on the chromatic number of graphs
with at most $r$ cycles of length $1\bmod k$, or at most $s$ cycles of length
$2\bmod k$, or no cycles of length $3\bmod k$. Our techniques essentially
consist of using a depth first search tree to decompose the graph into ordered
paths, which are then fed to an online coloring algorithm. Using this technique
we give simple proofs of some old results, and also obtain several simpler
results. We also obtain a lower bound on the number of colors an online
coloring algorithm needs to use on triangle free graphs.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2008 05:42:17 GMT"
}
]
| 2008-09-11T00:00:00 | [
[
"Diwan",
"Ajit A.",
""
],
[
"Kenkre",
"Sreyash",
""
],
[
"Vishwanathan",
"Sundar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0809.1715 | Bodo Manthey | Bodo Manthey and Heiko R\"oglin | Improved Smoothed Analysis of the k-Means Method | To be presented at the 20th ACM-SIAM Symposium on Discrete Algorithms
(SODA 2009) | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The k-means method is a widely used clustering algorithm. One of its
distinguished features is its speed in practice. Its worst-case running-time,
however, is exponential, leaving a gap between practical and theoretical
performance. Arthur and Vassilvitskii (FOCS 2006) aimed at closing this gap,
and they proved a bound of $\poly(n^k, \sigma^{-1})$ on the smoothed
running-time of the k-means method, where n is the number of data points and
$\sigma$ is the standard deviation of the Gaussian perturbation. This bound,
though better than the worst-case bound, is still much larger than the
running-time observed in practice.
We improve the smoothed analysis of the k-means method by showing two upper
bounds on the expected running-time of k-means. First, we prove that the
expected running-time is bounded by a polynomial in $n^{\sqrt k}$ and
$\sigma^{-1}$. Second, we prove an upper bound of $k^{kd} \cdot \poly(n,
\sigma^{-1})$, where d is the dimension of the data space. The polynomial is
independent of k and d, and we obtain a polynomial bound for the expected
running-time for $k, d \in O(\sqrt{\log n/\log \log n})$.
Finally, we show that k-means runs in smoothed polynomial time for
one-dimensional instances.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2008 07:00:38 GMT"
}
]
| 2008-09-11T00:00:00 | [
[
"Manthey",
"Bodo",
""
],
[
"Röglin",
"Heiko",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0809.1790 | Carlos Perez-Delgado | Donny Cheung, Carlos A. Perez-Delgado | Cellular Automata as a Model of Physical Systems | To appear in the Proceedings of AUTOMATA 2007 | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cellular Automata (CA), as they are presented in the literature, are abstract
mathematical models of computation. In this pa- per we present an alternate
approach: using the CA as a model or theory of physical systems and devices.
While this approach abstracts away all details of the underlying physical
system, it remains faithful to the fact that there is an underlying physical
reality which it describes. This imposes certain restrictions on the types of
computations a CA can physically carry out, and the resources it needs to do
so. In this paper we explore these and other consequences of our
reformalization.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2008 13:46:25 GMT"
}
]
| 2008-09-11T00:00:00 | [
[
"Cheung",
"Donny",
""
],
[
"Perez-Delgado",
"Carlos A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0809.1802 | William Brouwer | William Brouwer, Saurabh Kataria, Sujatha Das, Prasenjit Mitra, C. L.
Giles | Automatic Identification and Data Extraction from 2-Dimensional Plots in
Digital Documents | 4 pages, 3 figures, 5 tables, accepted for publication in Joint
Conference on Digital Libraries 2008 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most search engines index the textual content of documents in digital
libraries. However, scholarly articles frequently report important findings in
figures for visual impact and the contents of these figures are not indexed.
These contents are often invaluable to the researcher in various fields, for
the purposes of direct comparison with their own work. Therefore, searching for
figures and extracting figure data are important problems. To the best of our
knowledge, there exists no tool to automatically extract data from figures in
digital documents. If we can extract data from these images automatically and
store them in a database, an end-user can query and combine data from multiple
digital documents simultaneously and efficiently. We propose a framework based
on image analysis and machine learning to extract information from 2-D plot
images and store them in a database. The proposed algorithm identifies a 2-D
plot and extracts the axis labels, legend and the data points from the 2-D
plot. We also segregate overlapping shapes that correspond to different data
points. We demonstrate performance of individual algorithms, using a
combination of generated and real-life images.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2008 14:43:37 GMT"
}
]
| 2008-09-11T00:00:00 | [
[
"Brouwer",
"William",
""
],
[
"Kataria",
"Saurabh",
""
],
[
"Das",
"Sujatha",
""
],
[
"Mitra",
"Prasenjit",
""
],
[
"Giles",
"C. L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0809.1806 | Vadim E. Levit | Vadim E. Levit and Eugen Mandrescu | Graph Operations that are Good for Greedoids | 8 pages, 4 figures | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | S is a local maximum stable set of a graph G, if the set S is a maximum
stable set of the subgraph induced by its closed neighborhood. In (Levit,
Mandrescu, 2002) we have proved that the family of all local maximum stable
sets is a greedoid for every forest. The cases of bipartite graphs and
triangle-free graphs were analyzed in (Levit, Mandrescu, 2004) and (Levit,
Mandrescu, 2007), respectively. In this paper we give necessary and sufficient
conditions for the family of all local maximum stable sets of a graph G to form
a greedoid, where G is: (a) the disjoint union of a family of graphs; (b) the
Zykov sum of a family of graphs, or (c) the corona X*{H_1,H_2,...,H_n} obtained
by joining each vertex k of a graph X to all the vertices of a graph H_k.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2008 15:03:10 GMT"
}
]
| 2011-01-25T00:00:00 | [
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0809.1810 | Felipe Cruz | Felipe A. Cruz, L. A. Barba | Characterization of the errors of the FMM in particle simulations | 34 pages, 38 images | Int. J. Num. Meth. Engrg., 79(13):1577-1604 (2009) | 10.1002/nme.2611 | null | cs.DS physics.comp-ph | http://creativecommons.org/licenses/by/3.0/ | The Fast Multipole Method (FMM) offers an acceleration for pairwise
interaction calculation, known as $N$-body problems, from $\mathcal{O}(N^2)$ to
$\mathcal{O}(N)$ with $N$ particles. This has brought dramatic increase in the
capability of particle simulations in many application areas, such as
electrostatics, particle formulations of fluid mechanics, and others. Although
the literature on the subject provides theoretical error bounds for the FMM
approximation, there are not many reports of the measured errors in a suite of
computational experiments. We have performed such an experimental
investigation, and summarized the results of about 1000 calculations using the
FMM algorithm, to characterize the accuracy of the method in relation with the
different parameters available to the user. In addition to the more standard
diagnostic of the maximum error, we supply illustrations of the spatial
distribution of the errors, which offers visual evidence of all the
contributing factors to the overall approximation accuracy: multipole
expansion, local expansion, hierarchical spatial decomposition (interaction
lists, local domain, far domain). This presentation is a contribution to any
researcher wishing to incorporate the FMM acceleration to their application
code, as it aids in understanding where accuracy is gained or compromised.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2008 15:06:08 GMT"
}
]
| 2011-09-21T00:00:00 | [
[
"Cruz",
"Felipe A.",
""
],
[
"Barba",
"L. A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
]
|
0809.1812 | Olivier Finkel | Olivier Finkel (LIP), Dominique Lecomte (UMR 7586) | Topological Complexity of omega-Powers : Extended Abstract | null | null | null | LIP Research Report RR 2008-27 | cs.LO cs.CC math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is an extended abstract presenting new results on the topological
complexity of omega-powers (which are included in a paper "Classical and
effective descriptive complexities of omega-powers" available from
arXiv:0708.4176) and reflecting also some open questions which were discussed
during the Dagstuhl seminar on "Topological and Game-Theoretic Aspects of
Infinite Computations" 29.06.08 - 04.07.08.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2008 15:13:34 GMT"
}
]
| 2008-09-11T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"LIP"
],
[
"Lecomte",
"Dominique",
"",
"UMR 7586"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0809.1836 | John Faben | John Faben | The complexity of counting solutions to Generalised Satisfiability
Problems modulo k | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generalised Satisfiability Problems (or Boolean Constraint Satisfaction
Problems), introduced by Schaefer in 1978, are a general class of problem which
allow the systematic study of the complexity of satisfiability problems with
different types of constraints. In 1979, Valiant introduced the complexity
class parity P, the problem of counting the number of solutions to NP problems
modulo two. Others have since considered the question of counting modulo other
integers.
We give a dichotomy theorem for the complexity of counting the number of
solutions to Generalised Satisfiability Problems modulo integers. This follows
from an earlier result of Creignou and Hermann which gave a counting dichotomy
for these types of problem, and the dichotomy itself is almost identical.
Specifically, counting the number of solutions to a Generalised Satisfiability
Problem can be done in polynomial time if all the relations are affine.
Otherwise, except for one special case with k = 2, it is #_kP-complete.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2008 16:23:53 GMT"
}
]
| 2008-09-11T00:00:00 | [
[
"Faben",
"John",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0809.1895 | Benjamin Birnbaum | Yossi Azar, Benjamin Birnbaum, Anna R. Karlin, and C. Thach Nguyen | Thinking Twice about Second-Price Ad Auctions | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent work has addressed the algorithmic problem of allocating advertisement
space for keywords in sponsored search auctions so as to maximize revenue, most
of which assume that pricing is done via a first-price auction. This does not
realistically model the Generalized Second Price (GSP) auction used in
practice, in which bidders pay the next-highest bid for keywords that they are
allocated. Towards the goal of more realistically modeling these auctions, we
introduce the Second-Price Ad Auctions problem, in which bidders' payments are
determined by the GSP mechanism. We show that the complexity of the
Second-Price Ad Auctions problem is quite different than that of the more
studied First-Price Ad Auctions problem. First, unlike the first-price variant,
for which small constant-factor approximations are known, it is NP-hard to
approximate the Second-Price Ad Auctions problem to any non-trivial factor,
even when the bids are small compared to the budgets. Second, this discrepancy
extends even to the 0-1 special case that we call the Second-Price Matching
problem (2PM). Offline 2PM is APX-hard, and for online 2PM there is no
deterministic algorithm achieving a non-trivial competitive ratio and no
randomized algorithm achieving a competitive ratio better than 2. This
contrasts with the results for the analogous special case in the first-price
model, the standard bipartite matching problem, which is solvable in polynomial
time and which has deterministic and randomized online algorithms achieving
better competitive ratios. On the positive side, we provide a 2-approximation
for offline 2PM and a 5.083-competitive randomized algorithm for online 2PM.
The latter result makes use of a new generalization of a result on the
performance of the "Ranking" algorithm for online bipartite matching.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2008 23:33:47 GMT"
}
]
| 2008-09-12T00:00:00 | [
[
"Azar",
"Yossi",
""
],
[
"Birnbaum",
"Benjamin",
""
],
[
"Karlin",
"Anna R.",
""
],
[
"Nguyen",
"C. Thach",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0809.1900 | Venkatesh Saligrama | E. Ermis and V. Saligrama | Distributed Detection in Sensor Networks with Limited Range Multi-Modal
Sensors | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a multi-object detection problem over a sensor network (SNET)
with limited range multi-modal sensors. Limited range sensing environment
arises in a sensing field prone to signal attenuation and path losses. The
general problem complements the widely considered decentralized detection
problem where all sensors observe the same object. In this paper we develop a
distributed detection approach based on recent development of the false
discovery rate (FDR) and the associated BH test procedure. The BH procedure is
based on rank ordering of scalar test statistics. We first develop scalar test
statistics for multidimensional data to handle multi-modal sensor observations
and establish its optimality in terms of the BH procedure. We then propose a
distributed algorithm in the ideal case of infinite attenuation for
identification of sensors that are in the immediate vicinity of an object. We
demonstrate communication message scalability to large SNETs by showing that
the upper bound on the communication message complexity scales linearly with
the number of sensors that are in the vicinity of objects and is independent of
the total number of sensors in the SNET. This brings forth an important
principle for evaluating the performance of an SNET, namely, the need for
scalability of communications and performance with respect to the number of
objects or events in an SNET irrespective of the network size. We then account
for finite attenuation by modeling sensor observations as corrupted by
uncertain interference arising from distant objects and developing robust
extensions to our idealized distributed scheme. The robustness properties
ensure that both the error performance and communication message complexity
degrade gracefully with interference.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 00:41:36 GMT"
}
]
| 2008-09-12T00:00:00 | [
[
"Ermis",
"E.",
""
],
[
"Saligrama",
"V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.1902 | Manor Mendel | Manor Mendel, Chaya Schwob | Fast C-K-R Partitions of Sparse Graphs | 15 pages, title changed, a small error in the running time was fixed.
Many errors in English were eliminated | Chicago J. Theoretical Comp. Sci., 2009(2), 2009 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present fast algorithms for constructing probabilistic embeddings and
approximate distance oracles in sparse graphs. The main ingredient is a fast
algorithm for sampling the probabilistic partitions of Calinescu, Karloff, and
Rabani in sparse graphs.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 02:10:29 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Sep 2009 02:47:44 GMT"
}
]
| 2009-09-09T00:00:00 | [
[
"Mendel",
"Manor",
""
],
[
"Schwob",
"Chaya",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0809.1906 | Shiva Kintali | Shiva Kintali | Betweenness Centrality : Algorithms and Lower Bounds | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the most fundamental problems in large scale network analysis is to
determine the importance of a particular node in a network. Betweenness
centrality is the most widely used metric to measure the importance of a node
in a network. In this paper, we present a randomized parallel algorithm and an
algebraic method for computing betweenness centrality of all nodes in a
network. We prove that any path-comparison based algorithm cannot compute
betweenness in less than O(nm) time.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 02:49:07 GMT"
},
{
"version": "v2",
"created": "Sun, 19 Oct 2008 04:24:21 GMT"
}
]
| 2008-10-19T00:00:00 | [
[
"Kintali",
"Shiva",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0809.1910 | Yucel Altug | Yucel Altug, M. Kivanc Mihcak, Onur Ozyesil, Vishal Monga | Reliable Communications with Asymmetric Codebooks: An Information
Theoretic Analysis of Robust Signal Hashing | 24 pages, 3 figures, submitted to IEEE Trans. Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a generalization of the traditional point-to-point to
communication setup, which is named as "reliable communications with asymmetric
codebooks", is proposed. Under the assumption of independent identically
distributed (i.i.d) encoder codewords, it is proven that the operational
capacity of the system is equal to the information capacity of the system,
which is given by $\max_{p(x)} I(U;Y)$, where $X, U$ and $Y$ denote the
individual random elements of encoder codewords, decoder codewords and decoder
inputs. The capacity result is derived in the "binary symmetric" case (which is
an analogous formulation of the traditional "binary symmetric channel" for our
case), as a function of the system parameters. A conceptually insightful
inference is made by attributing the difference from the classical Shannon-type
capacity of binary symmetric channel to the {\em gap} due to the codebook
asymmetry.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 03:21:43 GMT"
}
]
| 2008-09-12T00:00:00 | [
[
"Altug",
"Yucel",
""
],
[
"Mihcak",
"M. Kivanc",
""
],
[
"Ozyesil",
"Onur",
""
],
[
"Monga",
"Vishal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.1916 | Sung-eok Jeon | Sung-eok Jeon, and Chunayi Ji | Randomized Distributed Configuration Management of Wireless Networks:
Multi-layer Markov Random Fields and Near-Optimality | 15 pages, revised and submitted to IEEE Trans. on Networking | null | null | null | cs.DC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distributed configuration management is imperative for wireless
infrastructureless networks where each node adjusts locally its physical and
logical configuration through information exchange with neighbors. Two issues
remain open. The first is the optimality. The second is the complexity. We
study these issues through modeling, analysis, and randomized distributed
algorithms. Modeling defines the optimality. We first derive a global
probabilistic model for a network configuration which characterizes jointly the
statistical spatial dependence of a physical- and a logical-configuration. We
then show that a local model which approximates the global model is a two-layer
Markov Random Field or a random bond model. The complexity of the local model
is the communication range among nodes. The local model is near-optimal when
the approximation error to the global model is within a given error bound. We
analyze the trade-off between an approximation error and complexity, and derive
sufficient conditions on the near-optimality of the local model. We validate
the model, the analysis and the randomized distributed algorithms also through
simulation.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 05:00:51 GMT"
}
]
| 2008-09-12T00:00:00 | [
[
"Jeon",
"Sung-eok",
""
],
[
"Ji",
"Chunayi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0809.1949 | Steffen Wendzel | Steffen Wendzel | Protocol Channels | 2 pages | null | null | null | cs.CR | http://creativecommons.org/licenses/publicdomain/ | Covert channel techniques are used by attackers to transfer data in a way
prohibited by the security policy. There are two main categories of covert
channels: timing channels and storage channels. This paper introduces a new
storage channel technique called a protocol channel. A protocol channel
switches one of at least two protocols to send a bit combination to a
destination. The main goal of a protocol channel is that packets containing
covert information look equal to all other packets within a network, what makes
a protocol channel hard to detect.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 10:57:19 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Nov 2008 20:29:42 GMT"
},
{
"version": "v3",
"created": "Sun, 26 Jul 2009 13:47:33 GMT"
},
{
"version": "v4",
"created": "Tue, 5 Oct 2010 20:08:32 GMT"
},
{
"version": "v5",
"created": "Sat, 14 May 2011 19:26:29 GMT"
}
]
| 2011-05-17T00:00:00 | [
[
"Wendzel",
"Steffen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0809.1963 | Jerome Darmont | Hadj Mahboubi (ERIC), Kamel Aouiche (ERIC), J\'er\^ome Darmont (ERIC) | Materialized View Selection by Query Clustering in XML Data Warehouses | null | 4th International Multiconference on Computer Science and
Information Technology (CSIT 06), Amman : Jordanie (2006) | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | XML data warehouses form an interesting basis for decision-support
applications that exploit complex data. However, native XML database management
systems currently bear limited performances and it is necessary to design
strategies to optimize them. In this paper, we propose an automatic strategy
for the selection of XML materialized views that exploits a data mining
technique, more precisely the clustering of the query workload. To validate our
strategy, we implemented an XML warehouse modeled along the XCube
specifications. We executed a workload of XQuery decision-support queries on
this warehouse, with and without using our strategy. Our experimental results
demonstrate its efficiency, even when queries are complex.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 11:59:00 GMT"
}
]
| 2008-09-12T00:00:00 | [
[
"Mahboubi",
"Hadj",
"",
"ERIC"
],
[
"Aouiche",
"Kamel",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0809.1965 | Jerome Darmont | St\'ephane Azefack (ERIC), Kamel Aouiche (ERIC), J\'er\^ome Darmont
(ERIC) | Dynamic index selection in data warehouses | null | 4th International Conference on Innovations in Information
Technology (Innovations 07), Dubai : \'Emirats arabes unis (2006) | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Analytical queries defined on data warehouses are complex and use several
join operations that are very costly, especially when run on very large data
volumes. To improve response times, data warehouse administrators casually use
indexing techniques. This task is nevertheless complex and fastidious. In this
paper, we present an automatic, dynamic index selection method for data
warehouses that is based on incremental frequent itemset mining from a given
query workload. The main advantage of this approach is that it helps update the
set of selected indexes when workload evolves instead of recreating it from
scratch. Preliminary experimental results illustrate the efficiency of this
approach, both in terms of performance enhancement and overhead.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 12:01:34 GMT"
}
]
| 2008-09-12T00:00:00 | [
[
"Azefack",
"Stéphane",
"",
"ERIC"
],
[
"Aouiche",
"Kamel",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0809.1971 | Jerome Darmont | Jean-Christian Ralaivao (ERIC), J\'er\^ome Darmont (ERIC) | Knowledge and Metadata Integration for Warehousing Complex Data | 6th International Conference on Information Systems Technology and
its Applications (ISTA 07), Kharkiv : Ukraine (2007) | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the ever-growing availability of so-called complex data, especially on
the Web, decision-support systems such as data warehouses must store and
process data that are not only numerical or symbolic. Warehousing and analyzing
such data requires the joint exploitation of metadata and domain-related
knowledge, which must thereby be integrated. In this paper, we survey the types
of knowledge and metadata that are needed for managing complex data, discuss
the issue of knowledge and metadata integration, and propose a CWM-compliant
integration solution that we incorporate into an XML complex data warehousing
framework we previously designed.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 12:20:00 GMT"
}
]
| 2008-09-12T00:00:00 | [
[
"Ralaivao",
"Jean-Christian",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0809.1981 | Jerome Darmont | Hadj Mahboubi (ERIC), Kamel Aouiche (ERIC), J\'er\^ome Darmont (ERIC) | A Join Index for XML Data Warehouses | 2008 International Conference on Information Resources Management
(Conf-IRM 08), Niagra Falls : Canada (2008) | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | XML data warehouses form an interesting basis for decision-support
applications that exploit complex data. However, native-XML database management
systems (DBMSs) currently bear limited performances and it is necessary to
research for ways to optimize them. In this paper, we propose a new join index
that is specifically adapted to the multidimensional architecture of XML
warehouses. It eliminates join operations while preserving the information
contained in the original warehouse. A theoretical study and experimental
results demonstrate the efficiency of our join index. They also show that
native XML DBMSs can compete with XML-compatible, relational DBMSs when
warehousing and analyzing XML data.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 12:44:10 GMT"
}
]
| 2008-09-12T00:00:00 | [
[
"Mahboubi",
"Hadj",
"",
"ERIC"
],
[
"Aouiche",
"Kamel",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0809.1989 | Nicolas Gast | Nicolas Gast and Bruno Gaujal | Distributing Labels on Infinite Trees | 30 pages, use pgf/tikz | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sturmian words are infinite binary words with many equivalent definitions:
They have a minimal factor complexity among all aperiodic sequences; they are
balanced sequences (the labels 0 and 1 are as evenly distributed as possible)
and they can be constructed using a mechanical definition. All this properties
make them good candidates for being extremal points in scheduling problems over
two processors. In this paper, we consider the problem of generalizing Sturmian
words to trees. The problem is to evenly distribute labels 0 and 1 over
infinite trees. We show that (strongly) balanced trees exist and can also be
constructed using a mechanical process as long as the tree is irrational. Such
trees also have a minimal factor complexity. Therefore they bring the hope that
extremal scheduling properties of Sturmian words can be extended to such trees,
as least partially. Such possible extensions are illustrated by one such
example.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 13:24:49 GMT"
}
]
| 2008-09-12T00:00:00 | [
[
"Gast",
"Nicolas",
""
],
[
"Gaujal",
"Bruno",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0809.2032 | Oleg Mokhov | O.I. Mokhov | On consistency of determinants on cubic lattices | 3 pages | null | null | null | nlin.SI cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a modified condition of consistency on cubic lattices for some
special classes of two-dimensional discrete equations and prove that the
discrete nonlinear equations defined by determinants of matrices of orders N >
2 are consistent on cubic lattices in this sense.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 15:46:46 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Mokhov",
"O. I.",
""
]
]
| [
{
"class": "Physics",
"code": "nlin.SI",
"description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems",
"span": "(Exactly Solvable and Integrable Systems)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0809.2061 | Robin Adams | Robin Adams and Zhaohui Luo | Weyl's Predicative Classical Mathematics as a Logic-Enriched Type Theory | 31 pages, 6 figures. Accepted for publication in ACM TOCL. v2:
Corrected a broken citation in v1. v3: Final version, revised after referees'
comments | ACM TOCL 11(2), 2010 | 10.1145/1656242.1656246 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We construct a logic-enriched type theory LTTW that corresponds closely to
the predicative system of foundations presented by Hermann Weyl in Das
Kontinuum. We formalise many results from that book in LTTW, including Weyl's
definition of the cardinality of a set and several results from real analysis,
using the proof assistant Plastic that implements the logical framework LF.
This case study shows how type theory can be used to represent a
non-constructive foundation for mathematics.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 17:25:28 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Sep 2008 13:21:45 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Jan 2009 16:59:09 GMT"
}
]
| 2009-12-26T00:00:00 | [
[
"Adams",
"Robin",
""
],
[
"Luo",
"Zhaohui",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0809.2075 | Jittat Fakcharoenphol | Jittat Fakcharoenphol, Boonserm Kijsirikul | Low congestion online routing and an improved mistake bound for online
prediction of graph labeling | 5 pages | null | null | null | cs.DS cs.DM cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we show a connection between a certain online low-congestion
routing problem and an online prediction of graph labeling. More specifically,
we prove that if there exists a routing scheme that guarantees a congestion of
$\alpha$ on any edge, there exists an online prediction algorithm with mistake
bound $\alpha$ times the cut size, which is the size of the cut induced by the
label partitioning of graph vertices. With previous known bound of $O(\log n)$
for $\alpha$ for the routing problem on trees with $n$ vertices, we obtain an
improved prediction algorithm for graphs with high effective resistance.
In contrast to previous approaches that move the graph problem into problems
in vector space using graph Laplacian and rely on the analysis of the
perceptron algorithm, our proof are purely combinatorial. Further more, our
approach directly generalizes to the case where labels are not binary.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 19:32:49 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Sep 2008 07:02:37 GMT"
}
]
| 2008-09-12T00:00:00 | [
[
"Fakcharoenphol",
"Jittat",
""
],
[
"Kijsirikul",
"Boonserm",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0809.2083 | Nicole Berline | Velleda Baldoni, Nicole Berline (CMLS-EcolePolytechnique), Jesus De
Loera, Matthias K\"oppe, Mich\`ele Vergne (CMLS-EcolePolytechnique) | How to Integrate a Polynomial over a Simplex | Tables added with new experimental results. References added | Mathematics of Computation 80, 273 (2011) 297-325 | 10.1090/S0025-5718-2010-02378-6 | null | math.MG cs.CC cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper settles the computational complexity of the problem of integrating
a polynomial function f over a rational simplex. We prove that the problem is
NP-hard for arbitrary polynomials via a generalization of a theorem of Motzkin
and Straus. On the other hand, if the polynomial depends only on a fixed number
of variables, while its degree and the dimension of the simplex are allowed to
vary, we prove that integration can be done in polynomial time. As a
consequence, for polynomials of fixed total degree, there is a polynomial time
algorithm as well. We conclude the article with extensions to other polytopes,
discussion of other available methods and experimental results.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 19:00:12 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Oct 2008 16:59:52 GMT"
},
{
"version": "v3",
"created": "Fri, 13 Feb 2009 14:05:09 GMT"
}
]
| 2013-06-27T00:00:00 | [
[
"Baldoni",
"Velleda",
"",
"CMLS-EcolePolytechnique"
],
[
"Berline",
"Nicole",
"",
"CMLS-EcolePolytechnique"
],
[
"De Loera",
"Jesus",
"",
"CMLS-EcolePolytechnique"
],
[
"Köppe",
"Matthias",
"",
"CMLS-EcolePolytechnique"
],
[
"Vergne",
"Michèle",
"",
"CMLS-EcolePolytechnique"
]
]
| [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0809.2085 | Laurent Jacob | Laurent Jacob, Francis Bach (INRIA Rocquencourt), Jean-Philippe Vert | Clustered Multi-Task Learning: A Convex Formulation | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In multi-task learning several related tasks are considered simultaneously,
with the hope that by an appropriate sharing of information across tasks, each
task may benefit from the others. In the context of learning linear functions
for supervised classification or regression, this can be achieved by including
a priori information about the weight vectors associated with the tasks, and
how they are expected to be related to each other. In this paper, we assume
that tasks are clustered into groups, which are unknown beforehand, and that
tasks within a group have similar weight vectors. We design a new spectral norm
that encodes this a priori assumption, without the prior knowledge of the
partition of tasks into groups, resulting in a new convex optimization
formulation for multi-task learning. We show in simulations on synthetic
examples and on the IEDB MHC-I binding dataset, that our approach outperforms
well-known convex methods for multi-task learning, as well as related non
convex methods dedicated to the same problem.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 19:01:39 GMT"
}
]
| 2008-09-12T00:00:00 | [
[
"Jacob",
"Laurent",
"",
"INRIA Rocquencourt"
],
[
"Bach",
"Francis",
"",
"INRIA Rocquencourt"
],
[
"Vert",
"Jean-Philippe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0809.2093 | Troy Lee | Troy Lee, Adi Shraibman | An approximation algorithm for approximation rank | v2 fixes error from v1 in the proof of the dimension reduction
theorem | null | null | null | cs.CC | http://creativecommons.org/licenses/by-nc-sa/4.0/ | One of the strongest techniques available for showing lower bounds on quantum
communication complexity is the logarithm of the approximation rank of the
communication matrix--the minimum rank of a matrix which is entrywise close to
the communication matrix. This technique has two main drawbacks: it is
difficult to compute, and it is not known to lower bound quantum communication
complexity with entanglement.
Linial and Shraibman recently introduced a norm, called gamma_2^{alpha}, to
quantum communication complexity, showing that it can be used to lower bound
communication with entanglement. Here the parameter alpha is a measure of
approximation which is related to the allowable error probability of the
protocol. This bound can be written as a semidefinite program and gives bounds
at least as large as many techniques in the literature, although it is smaller
than the corresponding alpha-approximation rank, rk_alpha. We show that in fact
log gamma_2^{alpha}(A)$ and log rk_{alpha}(A)$ agree up to small factors. As
corollaries we obtain a constant factor polynomial time approximation algorithm
to the logarithm of approximate rank, and that the logarithm of approximation
rank is a lower bound for quantum communication complexity with entanglement.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 20:06:56 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Mar 2021 13:14:48 GMT"
}
]
| 2021-03-09T00:00:00 | [
[
"Lee",
"Troy",
""
],
[
"Shraibman",
"Adi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0809.2097 | Hsiao-Fei Liu | Hsiao-Fei Liu, Peng-An Chen, and Kun-Mao Chao | Algorithms for Locating Constrained Optimal Intervals | An earlier version of the second part of this work appeared in
Proceedings of the 18th International Symposium on Algorithms and
Computation, Japan, 2007 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we obtain the following new results.
1. Given a sequence $D=((h_1,s_1), (h_2,s_2) ..., (h_n,s_n))$ of number
pairs, where $s_i>0$ for all $i$, and a number $L_h$, we propose an O(n)-time
algorithm for finding an index interval $[i,j]$ that maximizes
$\frac{\sum_{k=i}^{j} h_k}{\sum_{k=i}^{j} s_k}$ subject to $\sum_{k=i}^{j} h_k
\geq L_h$.
2. Given a sequence $D=((h_1,s_1), (h_2,s_2) ..., (h_n,s_n))$ of number
pairs, where $s_i=1$ for all $i$, and an integer $L_s$ with $1\leq L_s\leq n$,
we propose an $O(n\frac{T(L_s^{1/2})}{L_s^{1/2}})$-time algorithm for finding
an index interval $[i,j]$ that maximizes $\frac{\sum_{k=i}^{j}
h_k}{\sqrt{\sum_{k=i}^{j} s_k}}$ subject to $\sum_{k=i}^{j} s_k \geq L_s$,
where $T(n')$ is the time required to solve the all-pairs shortest paths
problem on a graph of $n'$ nodes. By the latest result of Chan \cite{Chan},
$T(n')=O(n'^3 \frac{(\log\log n')^3}{(\log n')^2})$, so our algorithm runs in
subquadratic time $O(nL_s\frac{(\log\log L_s)^3}{(\log L_s)^2})$.
| [
{
"version": "v1",
"created": "Thu, 11 Sep 2008 20:12:08 GMT"
}
]
| 2008-09-15T00:00:00 | [
[
"Liu",
"Hsiao-Fei",
""
],
[
"Chen",
"Peng-An",
""
],
[
"Chao",
"Kun-Mao",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0809.2136 | Shrisha Rao | Prabodh K. Enumula, Shrisha Rao | The Potluck Problem | 9 pages. Economics Letters, to appear | Economics Letters 107 (1), pp. 10--12, April 2010 | 10.1016/j.econlet.2009.12.011 | null | cs.GT cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes the Potluck Problem as a model for the behavior of
independent producers and consumers under standard economic assumptions, as a
problem of resource allocation in a multi-agent system in which there is no
explicit communication among the agents.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2008 05:54:50 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Dec 2009 05:12:11 GMT"
}
]
| 2022-01-11T00:00:00 | [
[
"Enumula",
"Prabodh K.",
""
],
[
"Rao",
"Shrisha",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0809.2147 | Rui Zhang | Rui Zhang and Ying-Chang Liang | Investigation on Multiuser Diversity in Spectrum Sharing Based Cognitive
Radio Networks | to appear in IEEE Communication Letters | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new form of multiuser diversity, named \emph{multiuser interference
diversity}, is investigated for opportunistic communications in cognitive radio
(CR) networks by exploiting the mutual interference between the CR and the
existing primary radio (PR) links. The multiuser diversity gain and ergodic
throughput are analyzed for different types of CR networks and compared against
those in the conventional networks without the PR link.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2008 07:42:42 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Feb 2009 02:22:09 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Dec 2009 03:24:48 GMT"
}
]
| 2009-12-09T00:00:00 | [
[
"Zhang",
"Rui",
""
],
[
"Liang",
"Ying-Chang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2148 | Rui Zhang | Rui Zhang, Feifei Gao, and Ying-Chang Liang | Cognitive Beamforming Made Practical: Effective Interference Channel and
Learning-Throughput Tradeoff | Accepted in IEEE Transactions on Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the transmit strategy for a secondary link or the
so-called cognitive radio (CR) link under opportunistic spectrum sharing with
an existing primary radio (PR) link. It is assumed that the CR transmitter is
equipped with multi-antennas, whereby transmit precoding and power control can
be jointly deployed to balance between avoiding interference at the PR
terminals and optimizing performance of the CR link. This operation is named as
cognitive beamforming (CB). Unlike prior study on CB that assumes perfect
knowledge of the channels over which the CR transmitter interferes with the PR
terminals, this paper proposes a practical CB scheme utilizing a new idea of
effective interference channel (EIC), which can be efficiently estimated at the
CR transmitter from its observed PR signals. Somehow surprisingly, this paper
shows that the learning-based CB scheme with the EIC improves the CR channel
capacity against the conventional scheme even with the exact CR-to-PR channel
knowledge, when the PR link is equipped with multi-antennas but only
communicates over a subspace of the total available spatial dimensions.
Moreover, this paper presents algorithms for the CR to estimate the EIC over a
finite learning time. Due to channel estimation errors, the proposed CB scheme
causes leakage interference at the PR terminals, which leads to an interesting
learning-throughput tradeoff phenomenon for the CR, pertinent to its time
allocation between channel learning and data transmission. This paper derives
the optimal channel learning time to maximize the effective throughput of the
CR link, subject to the CR transmit power constraint and the interference power
constraints for the PR terminals.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2008 07:55:27 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Feb 2009 02:49:24 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Aug 2009 06:14:57 GMT"
}
]
| 2009-08-03T00:00:00 | [
[
"Zhang",
"Rui",
""
],
[
"Gao",
"Feifei",
""
],
[
"Liang",
"Ying-Chang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2152 | Rui Costa | Rui A. Costa, Daniele Munaretto, Joerg Widmer, Joao Barros | Informed Network Coding for Minimum Decoding Delay | Proc. of the IEEE International Conference on Mobile Ad-hoc and
Sensor Systems (IEEE MASS 2008), Atlanta, USA, September 2008 | null | 10.1109/MAHSS.2008.4660042 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network coding is a highly efficient data dissemination mechanism for
wireless networks. Since network coded information can only be recovered after
delivering a sufficient number of coded packets, the resulting decoding delay
can become problematic for delay-sensitive applications such as real-time media
streaming. Motivated by this observation, we consider several algorithms that
minimize the decoding delay and analyze their performance by means of
simulation. The algorithms differ both in the required information about the
state of the neighbors' buffers and in the way this knowledge is used to decide
which packets to combine through coding operations. Our results show that a
greedy algorithm, whose encodings maximize the number of nodes at which a coded
packet is immediately decodable significantly outperforms existing network
coding protocols.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2008 08:41:40 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Costa",
"Rui A.",
""
],
[
"Munaretto",
"Daniele",
""
],
[
"Widmer",
"Joerg",
""
],
[
"Barros",
"Joao",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2168 | Shrisha Rao | Megha Saini, Shrisha Rao | Fairness in Combinatorial Auctioning Systems | 18 pages; AAAI Spring Symposium on Game Theoretic and Decision
Theoretic Agents, Stanford University, CA, March 2007 | null | null | null | cs.GT cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the Multi-Agent Systems that is widely used by various government
agencies, buyers and sellers in a market economy, in such a manner so as to
attain optimized resource allocation, is the Combinatorial Auctioning System
(CAS). We study another important aspect of resource allocations in CAS, namely
fairness. We present two important notions of fairness in CAS, extended
fairness and basic fairness. We give an algorithm that works by incorporating a
metric to ensure fairness in a CAS that uses the Vickrey-Clark-Groves (VCG)
mechanism, and uses an algorithm of Sandholm to achieve optimality.
Mathematical formulations are given to represent measures of extended fairness
and basic fairness.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2008 09:31:47 GMT"
}
]
| 2010-05-30T00:00:00 | [
[
"Saini",
"Megha",
""
],
[
"Rao",
"Shrisha",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0809.2214 | Axel Legay | Axel Legay and Pierre Wolper | On (Omega-)Regular Model Checking | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Checking infinite-state systems is frequently done by encoding infinite sets
of states as regular languages. Computing such a regular representation of,
say, the set of reachable states of a system requires acceleration techniques
that can finitely compute the effect of an unbounded number of transitions.
Among the acceleration techniques that have been proposed, one finds both
specific and generic techniques. Specific techniques exploit the particular
type of system being analyzed, e.g. a system manipulating queues or integers,
whereas generic techniques only assume that the transition relation is
represented by a finite-state transducer, which has to be iterated. In this
paper, we investigate the possibility of using generic techniques in cases
where only specific techniques have been exploited so far. Finding that
existing generic techniques are often not applicable in cases easily handled by
specific techniques, we have developed a new approach to iterating transducers.
This new approach builds on earlier work, but exploits a number of new
conceptual and algorithmic ideas, often induced with the help of experiments,
that give it a broad scope, as well as good performances.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2008 13:40:37 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Legay",
"Axel",
""
],
[
"Wolper",
"Pierre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0809.2226 | Lalitha Sankar | Lalitha Sankar, Gerhard Kramer, Narayan B. Mandayam | Relay vs. User Cooperation in Time-Duplexed Multiaccess Networks | Submitted to the IEEE Transactions on Wireless Communications, August
2008 | null | 10.4304/jcm.6.4.330-339 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The performance of user-cooperation in a multi-access network is compared to
that of using a wireless relay. Using the total transmit and processing power
consumed at all nodes as a cost metric, the outage probabilities achieved by
dynamic decode-and-forward (DDF) and amplify-and-forward (AF) are compared for
the two networks. A geometry-inclusive high signal-to-noise ratio (SNR) outage
analysis in conjunction with area-averaged numerical simulations shows that
user and relay cooperation achieve a maximum diversity of K and 2 respectively
for a K-user multiaccess network under both DDF and AF. However, when
accounting for energy costs of processing and communication, relay cooperation
can be more energy efficient than user cooperation, i.e., relay cooperation
achieves coding (SNR) gains, particularly in the low SNR regime, that override
the diversity advantage of user cooperation.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2008 14:40:43 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Sankar",
"Lalitha",
""
],
[
"Kramer",
"Gerhard",
""
],
[
"Mandayam",
"Narayan B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2315 | Irfan Siap | Taher Abualrub, Ali Ghrayeb, Nuh Aydin, and Irfan Siap | On the Construction of Skew Quasi-Cyclic Codes | 12 pages. submitted | null | null | null | cs.IT cs.DM math.IT math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study a special type of quasi-cyclic (QC) codes called skew
QC codes. This set of codes is constructed using a non-commutative ring called
the skew polynomial rings $F[x;\theta ]$. After a brief description of the skew
polynomial ring $F[x;\theta ]$ it is shown that skew QC codes are left
submodules of the ring $R_{s}^{l}=(F[x;\theta ]/(x^{s}-1))^{l}.$ The notions of
generator and parity-check polynomials are given. We also introduce the notion
of similar polynomials in the ring $F[x;\theta ]$ and show that parity-check
polynomials for skew QC codes are unique up to similarity. Our search results
lead to the construction of several new codes with Hamming distances exceeding
the Hamming distances of the previously best known linear codes with comparable
parameters.
| [
{
"version": "v1",
"created": "Sat, 13 Sep 2008 06:04:49 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Abualrub",
"Taher",
""
],
[
"Ghrayeb",
"Ali",
""
],
[
"Aydin",
"Nuh",
""
],
[
"Siap",
"Irfan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
]
|
0809.2319 | Prajakta Nimbhorkar | Samir Datta, Nutan Limaye, Prajakta Nimbhorkar, Thomas Thierauf,
Fabian Wagner | A Log-space Algorithm for Canonization of Planar Graphs | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph Isomorphism is the prime example of a computational problem with a wide
difference between the best known lower and upper bounds on its complexity. We
bridge this gap for a natural and important special case, planar graph
isomorphism, by presenting an upper bound that matches the known logspace
hardness [Lindell'92]. In fact, we show the formally stronger result that
planar graph canonization is in logspace. This improves the previously known
upper bound of AC1 [MillerReif'91].
Our algorithm first constructs the biconnected component tree of a connected
planar graph and then refines each biconnected component into a triconnected
component tree. The next step is to logspace reduce the biconnected planar
graph isomorphism and canonization problems to those for 3-connected planar
graphs, which are known to be in logspace by [DattaLimayeNimbhorkar'08]. This
is achieved by using the above decomposition, and by making significant
modifications to Lindell's algorithm for tree canonization, along with changes
in the space complexity analysis.
The reduction from the connected case to the biconnected case requires
further new ideas, including a non-trivial case analysis and a group theoretic
lemma to bound the number of automorphisms of a colored 3-connected planar
graph. This lemma is crucial for the reduction to work in logspace.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2008 06:22:39 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jan 2009 06:34:14 GMT"
}
]
| 2009-01-30T00:00:00 | [
[
"Datta",
"Samir",
""
],
[
"Limaye",
"Nutan",
""
],
[
"Nimbhorkar",
"Prajakta",
""
],
[
"Thierauf",
"Thomas",
""
],
[
"Wagner",
"Fabian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0809.2322 | Veerayya Mallapur | Mallapur Veerayya | An Energy-Aware On-Demand Routing Protocol for Ad-Hoc Wireless Networks | 65 pages, Master's Thesis, Department of Elecrical Engineering, IIT
Bombay | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An ad-hoc wireless network is a collection of nodes that come together to
dynamically create a network, with no fixed infrastructure or centralized
administration. An ad-hoc network is characterized by energy constrained nodes,
bandwidth constrained links and dynamic topology. With the growing use of
wireless networks (including ad-hoc networks) for real-time applications, such
as voice, video, and real-time data, the need for Quality of Service (QoS)
guarantees in terms of delay, bandwidth, and packet loss is becoming
increasingly important. Providing QoS in ad-hoc networks is a challenging task
because of dynamic nature of network topology and imprecise state information.
Hence, it is important to have a dynamic routing protocol with fast re-routing
capability, which also provides stable route during the life-time of the flows.
In this thesis, we have proposed a novel, energy aware, stable routing
protocol named, Stability-based QoS-capable Ad-hoc On-demand Distance Vector
(SQ-AODV), which is an enhancement of the well-known Ad-hoc On-demand Distance
Vector (AODV) routing protocol for ad-hoc wireless networks. SQ-AODV utilizes a
cross-layer design approach in which information about the residual energy of a
node is used for route selection and maintenance. An important feature of
SQ-AODV protocol is that it uses only local information and requires no
additional communication or co-operation between the network nodes. SQ-AODV
possesses a make-before-break re-routing capability that enables near-zero
packet drops and is compatible with the basic AODV data formats and operation,
making it easy to adopt in ad-hoc networks.
| [
{
"version": "v1",
"created": "Sat, 13 Sep 2008 08:56:25 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Veerayya",
"Mallapur",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0809.2350 | Daniel Lucani | Daniel E. Lucani, Milica Stojanovic, Muriel M\'edard | Random Linear Network Coding For Time Division Duplexing: When To Stop
Talking And Start Listening | 9 pages, 9 figures, Submitted to INFOCOM'09 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new random linear network coding scheme for reliable communications for
time division duplexing channels is proposed. The setup assumes a packet
erasure channel and that nodes cannot transmit and receive information
simultaneously. The sender transmits coded data packets back-to-back before
stopping to wait for the receiver to acknowledge (ACK) the number of degrees of
freedom, if any, that are required to decode correctly the information. We
provide an analysis of this problem to show that there is an optimal number of
coded data packets, in terms of mean completion time, to be sent before
stopping to listen. This number depends on the latency, probabilities of packet
erasure and ACK erasure, and the number of degrees of freedom that the receiver
requires to decode the data. This scheme is optimal in terms of the mean time
to complete the transmission of a fixed number of data packets. We show that
its performance is very close to that of a full duplex system, while
transmitting a different number of coded packets can cause large degradation in
performance, especially if latency is high. Also, we study the throughput
performance of our scheme and compare it to existing half-duplex Go-back-N and
Selective Repeat ARQ schemes. Numerical results, obtained for different
latencies, show that our scheme has similar performance to the Selective Repeat
in most cases and considerable performance gain when latency and packet error
probability is high.
| [
{
"version": "v1",
"created": "Sat, 13 Sep 2008 16:19:03 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Lucani",
"Daniel E.",
""
],
[
"Stojanovic",
"Milica",
""
],
[
"Médard",
"Muriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2386 | Manuel Bodirsky | Manuel Bodirsky, Victor Dalmau | Datalog and Constraint Satisfaction with Infinite Templates | 28 pages. This is an extended long version of a conference paper that
appeared at STACS'06. In the third version in the arxiv we have revised the
presentation again and added a section that relates our results to
formalizations of CSPs using relation algebras | null | null | null | cs.LO cs.CC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | On finite structures, there is a well-known connection between the expressive
power of Datalog, finite variable logics, the existential pebble game, and
bounded hypertree duality. We study this connection for infinite structures.
This has applications for constraint satisfaction with infinite templates. If
the template Gamma is omega-categorical, we present various equivalent
characterizations of those Gamma such that the constraint satisfaction problem
(CSP) for Gamma can be solved by a Datalog program. We also show that
CSP(Gamma) can be solved in polynomial time for arbitrary omega-categorical
structures Gamma if the input is restricted to instances of bounded treewidth.
Finally, we characterize those omega-categorical templates whose CSP has
Datalog width 1, and those whose CSP has strict Datalog width k.
| [
{
"version": "v1",
"created": "Sun, 14 Sep 2008 10:01:27 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2008 21:11:57 GMT"
},
{
"version": "v3",
"created": "Sun, 15 Apr 2012 11:44:24 GMT"
}
]
| 2012-04-17T00:00:00 | [
[
"Bodirsky",
"Manuel",
""
],
[
"Dalmau",
"Victor",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0809.2394 | Jean-Louis Krivine | Jean-Louis Krivine (PPS) | Structures de r\'ealisabilit\'e, RAM et ultrafiltre sur N | 34 p | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show how to transform into programs the proofs in classical Analysis which
use the existence of an ultrafilter on the integers. The method mixes the
classical realizability introduced by the author, with the "forcing" of P.
Cohen. The programs we obtain, use read and write instructions in random access
memory.
| [
{
"version": "v1",
"created": "Sun, 14 Sep 2008 12:01:24 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Krivine",
"Jean-Louis",
"",
"PPS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0809.2421 | Juan Manuel Ojeda Sarmiento | Juan Ojeda Sarmiento | Electricity Demand and Energy Consumption Management System | null | null | null | null | cs.AI cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This project describes the electricity demand and energy consumption
management system and its application to Southern Peru smelter. It is composed
of an hourly demand-forecasting module and of a simulation component for a
plant electrical system. The first module was done using dynamic neural
networks with backpropagation training algorithm; it is used to predict the
electric power demanded every hour, with an error percentage below of 1%. This
information allows efficient management of energy peak demands before this
happen, distributing the raise of electric load to other hours or improving
those equipments that increase the demand. The simulation module is based in
advanced estimation techniques, such as: parametric estimation, neural network
modeling, statistic regression and previously developed models, which simulates
the electric behavior of the smelter plant. These modules facilitate
electricity demand and consumption proper planning, because they allow knowing
the behavior of the hourly demand and the consumption patterns of the plant,
including the bill components, but also energy deficiencies and opportunities
for improvement, based on analysis of information about equipments, processes
and production plans, as well as maintenance programs. Finally the results of
its application in Southern Peru smelter are presented.
| [
{
"version": "v1",
"created": "Sun, 14 Sep 2008 22:26:49 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Oct 2008 20:28:45 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Jun 2009 17:20:27 GMT"
},
{
"version": "v4",
"created": "Sun, 30 Aug 2009 05:22:10 GMT"
},
{
"version": "v5",
"created": "Mon, 18 Apr 2011 23:08:41 GMT"
}
]
| 2011-04-20T00:00:00 | [
[
"Sarmiento",
"Juan Ojeda",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
]
|
0809.2423 | Thierry Sousbie | T. Sousbie, S. Colombi, C. Pichon | The fully connected N-dimensional skeleton: probing the evolution of the
cosmic web | Accepted for publication in MNRAS | Mon.Not.Roy.Astron.Soc.393:457,2009 | 10.1111/j.1365-2966.2008.14244.x | null | astro-ph cs.CG physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A method to compute the full hierarchy of the critical subsets of a density
field is presented. It is based on a watershed technique and uses a probability
propagation scheme to improve the quality of the segmentation by circumventing
the discreteness of the sampling. It can be applied within spaces of arbitrary
dimensions and geometry. This recursive segmentation of space yields, for a
$d$-dimensional space, a $d-1$ succession of $n$-dimensional subspaces that
fully characterize the topology of the density field. The final 1D manifold of
the hierarchy is the fully connected network of the primary critical lines of
the field : the skeleton. It corresponds to the subset of lines linking maxima
to saddle points, and provides a definition of the filaments that compose the
cosmic web as a precise physical object, which makes it possible to compute any
of its properties such as its length, curvature, connectivity etc... When the
skeleton extraction is applied to initial conditions of cosmological N-body
simulations and their present day non linear counterparts, it is shown that the
time evolution of the cosmic web, as traced by the skeleton, is well accounted
for by the Zel'dovich approximation. Comparing this skeleton to the initial
skeleton undergoing the Zel'dovich mapping shows that two effects are competing
during the formation of the cosmic web: a general dilation of the larger
filaments that is captured by a simple deformation of the skeleton of the
initial conditions on the one hand, and the shrinking, fusion and disappearance
of the more numerous smaller filaments on the other hand. Other applications of
the N dimensional skeleton and its peak patch hierarchy are discussed.
| [
{
"version": "v1",
"created": "Sun, 14 Sep 2008 22:22:05 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Nov 2008 23:21:31 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Sousbie",
"T.",
""
],
[
"Colombi",
"S.",
""
],
[
"Pichon",
"C.",
""
]
]
| [
null,
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
]
|
0809.2443 | Bhawani sankar Panda | B. S. Panda and D. Pradhan | NP-Completeness of Hamiltonian Cycle Problem on Rooted Directed Path
Graphs | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Hamiltonian cycle problem is to decide whether a given graph has a
Hamiltonian cycle. Bertossi and Bonuccelli (1986, Information Processing
Letters, 23, 195-200) proved that the Hamiltonian Cycle Problem is NP-Complete
even for undirected path graphs and left the Hamiltonian cycle problem open for
directed path graphs. Narasimhan (1989, Information Processing Letters, 32,
167-170) proved that the Hamiltonian Cycle Problem is NP-Complete even for
directed path graphs and left the Hamiltonian cycle problem open for rooted
directed path graphs. In this paper we resolve this open problem by proving
that the Hamiltonian Cycle Problem is also NP-Complete for rooted directed path
graphs.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2008 05:49:13 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Panda",
"B. S.",
""
],
[
"Pradhan",
"D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0809.2446 | Ananthanarayanan Chockalingam | Saif K. Mohammed, Ahmed Zaki, A. Chockalingam, and B. Sundar Rajan | High-Rate Space-Time Coded Large MIMO Systems: Low-Complexity Detection
and Channel Estimation | v3: Performance/complexity comparison of the proposed scheme with
other large-MIMO architectures/detectors has been added (Sec. IV-D). The
paper has been accepted for publication in IEEE Journal of Selected Topics in
Signal Processing (JSTSP): Spl. Iss. on Managing Complexity in Multiuser MIMO
Systems. v2: Section V on Channel Estimation is updated | null | 10.1109/JSTSP.2009.2035862 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a low-complexity algorithm for detection in
high-rate, non-orthogonal space-time block coded (STBC) large-MIMO systems that
achieve high spectral efficiencies of the order of tens of bps/Hz. We also
present a training-based iterative detection/channel estimation scheme for such
large STBC MIMO systems. Our simulation results show that excellent bit error
rate and nearness-to-capacity performance are achieved by the proposed
multistage likelihood ascent search (M-LAS) detector in conjunction with the
proposed iterative detection/channel estimation scheme at low complexities. The
fact that we could show such good results for large STBCs like 16x16 and 32x32
STBCs from Cyclic Division Algebras (CDA) operating at spectral efficiencies in
excess of 20 bps/Hz (even after accounting for the overheads meant for pilot
based training for channel estimation and turbo coding) establishes the
effectiveness of the proposed detector and channel estimator. We decode perfect
codes of large dimensions using the proposed detector. With the feasibility of
such a low-complexity detection/channel estimation scheme, large-MIMO systems
with tens of antennas operating at several tens of bps/Hz spectral efficiencies
can become practical, enabling interesting high data rate wireless
applications.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2008 05:55:41 GMT"
},
{
"version": "v2",
"created": "Sat, 4 Oct 2008 06:32:48 GMT"
},
{
"version": "v3",
"created": "Wed, 16 Sep 2009 07:57:12 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Mohammed",
"Saif K.",
""
],
[
"Zaki",
"Ahmed",
""
],
[
"Chockalingam",
"A.",
""
],
[
"Rajan",
"B. Sundar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2489 | Petteri Kaski | Andreas Bj\"orklund, Thore Husfeldt, Petteri Kaski, Mikko Koivisto | The fast intersection transform with applications to counting paths | 11 pages | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an algorithm for evaluating a linear ``intersection transform'' of
a function defined on the lattice of subsets of an $n$-element set. In
particular, the algorithm constructs an arithmetic circuit for evaluating the
transform in ``down-closure time'' relative to the support of the function and
the evaluation domain. As an application, we develop an algorithm that, given
as input a digraph with $n$ vertices and bounded integer weights at the edges,
counts paths by weight and given length $0\leq\ell\leq n-1$ in time
$O^*(\exp(n\cdot H(\ell/(2n))))$, where $H(p)=-p\log p-(1-p)\log(1-p)$, and the
notation $O^*(\cdot)$ suppresses a factor polynomial in $n$.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2008 11:15:05 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Björklund",
"Andreas",
""
],
[
"Husfeldt",
"Thore",
""
],
[
"Kaski",
"Petteri",
""
],
[
"Koivisto",
"Mikko",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0809.2508 | Massoud Babaie-Zadeh Dr | Hossein Mohimani, Massoud Babaie-Zadeh, and Christian Jutten | A fast approach for overcomplete sparse decomposition based on smoothed
L0 norm | Accepted in IEEE Transactions on Signal Processing. For MATLAB codes,
see (http://ee.sharif.ir/~SLzero). File replaced, because Fig. 5 was missing
erroneously | null | 10.1109/TSP.2008.2007606 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a fast algorithm for overcomplete sparse decomposition, called
SL0, is proposed. The algorithm is essentially a method for obtaining sparse
solutions of underdetermined systems of linear equations, and its applications
include underdetermined Sparse Component Analysis (SCA), atomic decomposition
on overcomplete dictionaries, compressed sensing, and decoding real field
codes. Contrary to previous methods, which usually solve this problem by
minimizing the L1 norm using Linear Programming (LP) techniques, our algorithm
tries to directly minimize the L0 norm. It is experimentally shown that the
proposed algorithm is about two to three orders of magnitude faster than the
state-of-the-art interior-point LP solvers, while providing the same (or
better) accuracy.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2008 12:20:56 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Sep 2008 08:31:54 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Mohimani",
"Hossein",
""
],
[
"Babaie-Zadeh",
"Massoud",
""
],
[
"Jutten",
"Christian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2525 | Michel Grabisch | Michel Grabisch (CES), Pedro Miranda | On the vertices of the k-addiive core | null | Discrete Mathematics (2008) 5204-5217 | null | null | cs.DM cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The core of a game $v$ on $N$, which is the set of additive games $\phi$
dominating $v$ such that $\phi(N)=v(N)$, is a central notion in cooperative
game theory, decision making and in combinatorics, where it is related to
submodular functions, matroids and the greedy algorithm. In many cases however,
the core is empty, and alternative solutions have to be found. We define the
$k$-additive core by replacing additive games by $k$-additive games in the
definition of the core, where $k$-additive games are those games whose M\"obius
transform vanishes for subsets of more than $k$ elements. For a sufficiently
high value of $k$, the $k$-additive core is nonempty, and is a convex closed
polyhedron. Our aim is to establish results similar to the classical results of
Shapley and Ichiishi on the core of convex games (corresponds to Edmonds'
theorem for the greedy algorithm), which characterize the vertices of the core.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2008 13:33:53 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Grabisch",
"Michel",
"",
"CES"
],
[
"Miranda",
"Pedro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0809.2532 | Neil J. Gunther | Tanel Poder and Neil J. Gunther | Multidimensional Visualization of Oracle Performance Using Barry007 | To appear in the Proc. CMG International Conference, Las Vegas,
Nevada, December 2008 | null | null | null | cs.PF cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most generic performance tools display only system-level performance data
using 2-dimensional plots or diagrams and this limits the informational detail
that can be displayed. Moreover, a modern relational database system, like
Oracle, can concurrently serve thousands of client processes with different
workload characteristics, so that generic performance-data displays inevitably
hide important information. Drawing on our previous work, this paper
demonstrates the application of Barry007 multidimensional visualization to the
analysis of Oracle end-user, session-level, performance data, showing both
collective trends and individual performance anomalies.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2008 14:11:34 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Poder",
"Tanel",
""
],
[
"Gunther",
"Neil J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0809.2541 | Neil J. Gunther | Jim Holtman and Neil J. Gunther | Getting in the Zone for Successful Scalability | 14 pages, 15 figures. To appear in Proc. CMG International
Conference, Las Vegas, Nevada, December 2008 | null | null | null | cs.PF cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The universal scalability law (USL) is an analytic model used to quantify
application scaling. It is universal because it subsumes Amdahl's law and
Gustafson linearized scaling as special cases. Using simulation, we show: (i)
that the USL is equivalent to synchronous queueing in a load-dependent machine
repairman model and (ii) how USL, Amdahl's law, and Gustafson scaling can be
regarded as boundaries defining three scalability zones. Typical throughput
measurements lie across all three zones. Simulation scenarios provide deeper
insight into queueing effects and thus provide a clearer indication of which
application features should be tuned to get into the optimal performance zone.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2008 14:51:04 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Holtman",
"Jim",
""
],
[
"Gunther",
"Neil J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0809.2546 | Paul Vitanyi | Luis Antunes (Univ. Porto), Armando Matos (Univ. Porto), Andre Souto
(Univ. Porto), Paul Vitanyi (CWI and Univ. Amsterdam) | Depth as Randomness Deficiency | Lates, 15 pages, no figures. Theory of Computing Systems, To appear | null | null | null | cs.CC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Depth of an object concerns a tradeoff between computation time and excess of
program length over the shortest program length required to obtain the object.
It gives an unconditional lower bound on the computation time from a given
program in absence of auxiliary information. Variants known as logical depth
and computational depth are expressed in Kolmogorov complexity theory.
We derive quantitative relation between logical depth and computational depth
and unify the different depth notions by relating them to A. Kolmogorov and L.
Levin's fruitful notion of randomness deficiency. Subsequently, we revisit the
computational depth of infinite strings, introducing the notion of super deep
sequences and relate it with other approaches.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2008 15:11:31 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Antunes",
"Luis",
"",
"Univ. Porto"
],
[
"Matos",
"Armando",
"",
"Univ. Porto"
],
[
"Souto",
"Andre",
"",
"Univ. Porto"
],
[
"Vitanyi",
"Paul",
"",
"CWI and Univ. Amsterdam"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2553 | Paul Vitanyi | Paul M.B. Vitanyi (CWI and Univ. Amsterdam), Frank J. Balbach (Univ.
Waterloo), Rudi L. Cilibrasi (CWI), and Ming Li (Univ. Waterloo) | Normalized Information Distance | 33 pages, 12 figures, pdf, in: Normalized information distance, in:
Information Theory and Statistical Learning, Eds. M. Dehmer, F.
Emmert-Streib, Springer-Verlag, New-York, To appear | null | null | null | cs.IR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The normalized information distance is a universal distance measure for
objects of all kinds. It is based on Kolmogorov complexity and thus
uncomputable, but there are ways to utilize it. First, compression algorithms
can be used to approximate the Kolmogorov complexity if the objects have a
string representation. Second, for names and abstract concepts, page count
statistics from the World Wide Web can be used. These practical realizations of
the normalized information distance can then be applied to machine learning
tasks, expecially clustering, to perform feature-free and parameter-free data
mining. This chapter discusses the theoretical foundations of the normalized
information distance and both practical realizations. It presents numerous
examples of successful real-world applications based on these distance
measures, ranging from bioinformatics to music clustering to machine
translation.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2008 15:33:11 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Vitanyi",
"Paul M. B.",
"",
"CWI and Univ. Amsterdam"
],
[
"Balbach",
"Frank J.",
"",
"Univ.\n Waterloo"
],
[
"Cilibrasi",
"Rudi L.",
"",
"CWI"
],
[
"Li",
"Ming",
"",
"Univ. Waterloo"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0809.2554 | Kanat Tangwongsan | Anupam Gupta and Kanat Tangwongsan | Simpler Analyses of Local Search Algorithms for Facility Location | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study local search algorithms for metric instances of facility location
problems: the uncapacitated facility location problem (UFL), as well as
uncapacitated versions of the $k$-median, $k$-center and $k$-means problems.
All these problems admit natural local search heuristics: for example, in the
UFL problem the natural moves are to open a new facility, close an existing
facility, and to swap a closed facility for an open one; in $k$-medians, we are
allowed only swap moves. The local-search algorithm for $k$-median was analyzed
by Arya et al. (SIAM J. Comput. 33(3):544-562, 2004), who used a clever
``coupling'' argument to show that local optima had cost at most constant times
the global optimum. They also used this argument to show that the local search
algorithm for UFL was 3-approximation; their techniques have since been applied
to other facility location problems.
In this paper, we give a proof of the $k$-median result which avoids this
coupling argument. These arguments can be used in other settings where the Arya
et al. arguments have been used. We also show that for the problem of opening
$k$ facilities $F$ to minimize the objective function $\Phi_p(F) = \big(\sum_{j
\in V} d(j, F)^p\big)^{1/p}$, the natural swap-based local-search algorithm is
a $\Theta(p)$-approximation. This implies constant-factor approximations for
$k$-medians (when $p=1$), and $k$-means (when $p = 2$), and an $O(\log
n)$-approximation algorithm for the $k$-center problem (which is essentially $p
= \log n$).
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2008 15:42:47 GMT"
}
]
| 2008-09-16T00:00:00 | [
[
"Gupta",
"Anupam",
""
],
[
"Tangwongsan",
"Kanat",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0809.2639 | Yiyue Wu | Yiyue Wu and Robert Calderbank | Code diversity in multiple antenna wireless communication | 9 pages | null | 10.1109/JSTSP.2009.2035861 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The standard approach to the design of individual space-time codes is based
on optimizing diversity and coding gains. This geometric approach leads to
remarkable examples, such as perfect space-time block codes, for which the
complexity of Maximum Likelihood (ML) decoding is considerable. Code diversity
is an alternative and complementary approach where a small number of feedback
bits are used to select from a family of space-time codes. Different codes lead
to different induced channels at the receiver, where Channel State Information
(CSI) is used to instruct the transmitter how to choose the code. This method
of feedback provides gains associated with beamforming while minimizing the
number of feedback bits. It complements the standard approach to code design by
taking advantage of different (possibly equivalent) realizations of a
particular code design. Feedback can be combined with sub-optimal low
complexity decoding of the component codes to match ML decoding performance of
any individual code in the family. It can also be combined with ML decoding of
the component codes to improve performance beyond ML decoding performance of
any individual code. One method of implementing code diversity is the use of
feedback to adapt the phase of a transmitted signal as shown for 4 by 4
Quasi-Orthogonal Space-Time Block Code (QOSTBC) and multi-user detection using
the Alamouti code. Code diversity implemented by selecting from equivalent
variants is used to improve ML decoding performance of the Golden code. This
paper introduces a family of full rate circulant codes which can be linearly
decoded by fourier decomposition of circulant matrices within the code
diversity framework. A 3 by 3 circulant code is shown to outperform the
Alamouti code at the same transmission rate.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 05:30:39 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Wu",
"Yiyue",
""
],
[
"Calderbank",
"Robert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2651 | Sasanka Roy | John Augustine, Brian Putnam, Sasanka Roy | Largest Empty Circle Centered on a Query Line | 18 pages, 13 figures | null | 10.1016/j.jda.2009.10.002 | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Largest Empty Circle problem seeks the largest circle centered within the
convex hull of a set $P$ of $n$ points in $\mathbb{R}^2$ and devoid of points
from $P$. In this paper, we introduce a query version of this well-studied
problem. In our query version, we are required to preprocess $P$ so that when
given a query line $Q$, we can quickly compute the largest empty circle
centered at some point on $Q$ and within the convex hull of $P$.
We present solutions for two special cases and the general case; all our
queries run in $O(\log n)$ time. We restrict the query line to be horizontal in
the first special case, which we preprocess in $O(n \alpha(n) \log n)$ time and
space, where $\alpha(n)$ is the slow growing inverse of the Ackermann's
function. When the query line is restricted to pass through a fixed point, the
second special case, our preprocessing takes $O(n \alpha(n)^{O(\alpha(n))} \log
n)$ time and space. We use insights from the two special cases to solve the
general version of the problem with preprocessing time and space in $O(n^3 \log
n)$ and $O(n^3)$ respectively.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 15:00:50 GMT"
}
]
| 2010-04-15T00:00:00 | [
[
"Augustine",
"John",
""
],
[
"Putnam",
"Brian",
""
],
[
"Roy",
"Sasanka",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0809.2680 | Armen Bagdasaryan | Armen Bagdasaryan | Mathematical Tool of Discrete Dynamic Modeling of Complex Systems in
Control Loop | 9 pages, paper presented at the American Conference on Applied
Mathematics (MATH'08), Harvard University; published in book Recent Advances
on Applied Mathematics, WSEAS Press, 2008 | null | null | null | cs.MA cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a method of discrete modeling and analysis of
multi-level dynamics of complex large-scale hierarchical dynamic systems
subject to external dynamic control mechanism. In a model each state describes
parallel dynamics and simultaneous trends of changes in system parameters. The
essence of the approach is in analysis of system state dynamics while it is in
the control loop.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 11:14:20 GMT"
}
]
| 2008-09-17T00:00:00 | [
[
"Bagdasaryan",
"Armen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
]
|
0809.2686 | Jerome Darmont | Omar Boussa\"id (ERIC), Fadila Bentayeb (ERIC), J\'er\^ome Darmont
(ERIC) | An MAS-Based ETL Approach for Complex Data | in 10th ISPE International Conference on Concurrent Engineering:
Research and Applications (CE 03), Madeira : Portugal (2003) | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a data warehousing process, the phase of data integration is crucial. Many
methods for data integration have been published in the literature. However,
with the development of the Internet, the availability of various types of data
(images, texts, sounds, videos, databases...) has increased, and structuring
such data is a difficult task. We name these data, which may be structured or
unstructured, "complex data". In this paper, we propose a new approach for
complex data integration, based on a Multi-Agent System (MAS), in association
to a data warehousing approach. Our objective is to take advantage of the MAS
to perform the integration phase for complex data. We indeed consider the
different tasks of the data integration process as services offered by agents.
To validate this approach, we have actually developed an MAS for complex data
integration.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 11:42:42 GMT"
}
]
| 2008-09-17T00:00:00 | [
[
"Boussaïd",
"Omar",
"",
"ERIC"
],
[
"Bentayeb",
"Fadila",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0809.2687 | Jerome Darmont | Kamel Aouiche (ERIC), J\'er\^ome Darmont (ERIC), Le Gruenwald | Frequent itemsets mining for database auto-administration | in 7th International Database Engineering and Application Symposium
(IDEAS 03), Hong-Kong : Chine (2003) | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the wide development of databases in general and data warehouses in
particular, it is important to reduce the tasks that a database administrator
must perform manually. The aim of auto-administrative systems is to
administrate and adapt themselves automatically without loss (or even with a
gain) in performance. The idea of using data mining techniques to extract
useful knowledge for administration from the data themselves has existed for
some years. However, little research has been achieved. This idea nevertheless
remains a very promising approach, notably in the field of data warehousing,
where queries are very heterogeneous and cannot be interpreted easily. The aim
of this study is to search for a way of extracting useful knowledge from stored
data themselves to automatically apply performance optimization techniques, and
more particularly indexing techniques. We have designed a tool that extracts
frequent itemsets from a given workload to compute an index configuration that
helps optimizing data access time. The experiments we performed showed that the
index configurations generated by our tool allowed performance gains of 15% to
25% on a test database and a test data warehouse.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 11:44:39 GMT"
}
]
| 2008-09-17T00:00:00 | [
[
"Aouiche",
"Kamel",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
],
[
"Gruenwald",
"Le",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0809.2688 | Jerome Darmont | J\'er\^ome Darmont (ERIC), Emerson Olivier (ERIC) | A Complex Data Warehouse for Personalized, Anticipative Medicine | in 17th Information Resources Management Association International
Conference (IRMA 06), Wahsington, DC : \'Etats-Unis d'Am\'erique (2006) | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the growing use of new technologies, healthcare is nowadays undergoing
significant changes. Information-based medicine has to exploit medical
decision-support systems and requires the analysis of various, heterogeneous
data, such as patient records, medical images, biological analysis results,
etc. In this paper, we present the design of the complex data warehouse
relating to high-level athletes. It is original in two ways. First, it is aimed
at storing complex medical data. Second, it is designed to allow innovative and
quite different kinds of analyses to support: (1) personalized and anticipative
medicine (in opposition to curative medicine) for well-identified patients; (2)
broad-band statistical studies over a given population of patients.
Furthermore, the system includes data relating to several medical fields. It is
also designed to be evolutionary to take into account future advances in
medical research.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 11:47:58 GMT"
}
]
| 2008-09-17T00:00:00 | [
[
"Darmont",
"Jérôme",
"",
"ERIC"
],
[
"Olivier",
"Emerson",
"",
"ERIC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0809.2691 | Jerome Darmont | Marouane Hachicha (ERIC), Hadj Mahboubi (ERIC), J\'er\^ome Darmont
(ERIC) | Expressing OLAP operators with the TAX XML algebra | in 3rd International Workshop on Database Technologies for Handling
XML Information on the Web (DataX-EDBT 08), Nantes : France (2008) | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rise of XML as a standard for representing business data, XML data
warehouses appear as suitable solutions for Web-based decision-support
applications. In this context, it is necessary to allow OLAP analyses over XML
data cubes (XOLAP). Thus, XQuery extensions are needed. To help define a formal
framework and allow much-needed performance optimizations on analytical queries
expressed in XQuery, having an algebra at one's disposal is desirable. However,
XOLAP approaches and algebras from the literature still largely rely on the
relational model and/or only feature a small number of OLAP operators. In
opposition, we propose in this paper to express a broad set of OLAP operators
with the TAX XML algebra.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 12:12:15 GMT"
}
]
| 2008-09-17T00:00:00 | [
[
"Hachicha",
"Marouane",
"",
"ERIC"
],
[
"Mahboubi",
"Hadj",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0809.2696 | Christoph Schommer | Christoph Schommer | An Unified Definition of Data Mining | 7 pages, 3 figures | null | null | null | cs.SC cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Since many years, theoretical concepts of Data Mining have been developed and
improved. Data Mining has become applied to many academic and industrial
situations, and recently, soundings of public opinion about privacy have been
carried out. However, a consistent and standardized definition is still
missing, and the initial explanation given by Frawley et al. has pragmatically
often changed over the years. Furthermore, alternative terms like Knowledge
Discovery have been conjured and forged, and a necessity of a Data Warehouse
has been endeavoured to persuade the users. In this work, we pick up current
definitions and introduce an unified definition that covers existing attempted
explanations. For this, we appeal to the natural original of chemical states of
aggregation.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 13:13:17 GMT"
}
]
| 2008-09-17T00:00:00 | [
[
"Schommer",
"Christoph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0809.2730 | Julinda Stefa | Alessandro Mei (1) and Julinda Stefa (1) ((1) Department of Computer
Science, Sapienza University of Rome, Italy) | SWIM: A Simple Model to Generate Small Mobile Worlds | Accepted for publication in IEEE INFOCOM 09, Rio de Janeiro, Brazil,
April 2009 | null | null | null | cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents small world in motion (SWIM), a new mobility model for
ad-hoc networking. SWIM is relatively simple, is easily tuned by setting just a
few parameters, and generates traces that look real--synthetic traces have the
same statistical properties of real traces. SWIM shows experimentally and
theoretically the presence of the power law and exponential decay dichotomy of
inter-contact time, and, most importantly, our experiments show that it can
predict very accurately the performance of forwarding protocols.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 15:07:58 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Jan 2009 20:26:21 GMT"
}
]
| 2009-01-22T00:00:00 | [
[
"Mei",
"Alessandro",
""
],
[
"Stefa",
"Julinda",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0809.2754 | Paul Vitanyi | Peter D. Grunwald (CWI) and Paul M.B. Vitanyi (CWI and Univ.
Amsterdam) | Algorithmic information theory | 37 pages, 2 figures, pdf, in: Philosophy of Information, P. Adriaans
and J. van Benthem, Eds., A volume in Handbook of the philosophy of science,
D. Gabbay, P. Thagard, and J. Woods, Eds., Elsevier, 2008. In version 1 of
September 16 the refs are missing. Corrected in version 2 of September 17 | null | null | null | cs.IT cs.LG math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce algorithmic information theory, also known as the theory of
Kolmogorov complexity. We explain the main concepts of this quantitative
approach to defining `information'. We discuss the extent to which Kolmogorov's
and Shannon's information theory have a common purpose, and where they are
fundamentally different. We indicate how recent developments within the theory
allow one to formally distinguish between `structural' (meaningful) and
`random' information as measured by the Kolmogorov structure function, which
leads to a mathematical formalization of Occam's razor in inductive inference.
We end by discussing some of the philosophical implications of the theory.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 16:38:18 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Sep 2008 17:25:44 GMT"
}
]
| 2008-09-17T00:00:00 | [
[
"Grunwald",
"Peter D.",
"",
"CWI"
],
[
"Vitanyi",
"Paul M. B.",
"",
"CWI and Univ.\n Amsterdam"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0809.2768 | Paul Slater | Paul B. Slater | Hubs and Clusters in the Evolving U. S. Internal Migration Network | 38 pages, 16 figures, 2 tables. Additional analyses of the 1995-2000
migration data and new figures are presented in Secs. V.C and V.D. To examine
the four (searchable) master dendrograms (the first two [cardinal and
ordinal] based on the doubly-stochastic table, and the next two, on its
square), one must download the source | null | null | null | physics.soc-ph cs.SI physics.data-an stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most nations of the world periodically publish N x N origin-destination
tables, recording the number of people who lived in geographic subdivision i at
time t and j at t+1. We have developed and widely applied to such national
tables and other analogous (weighted, directed) socioeconomic networks, a
two-stage--double-standardization and (strong component) hierarchical
clustering--procedure. Previous applications of this methodology and related
analytical issues are discussed. Its use is illustrated in a large-scale study,
employing recorded United States internal migration flows between the 3,000+
county-level units of the nation for the periods 1965-1970 and 1995-2000.
Prominent, important features--such as ''cosmopolitan hubs'' and ``functional
regions''--are extracted from master dendrograms. The extent to which such
characteristics have varied over the intervening thirty years is evaluated.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 18:45:45 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Sep 2008 16:14:19 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Oct 2008 15:54:09 GMT"
}
]
| 2012-07-03T00:00:00 | [
[
"Slater",
"Paul B.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
]
|
0809.2792 | Ronny Luss | Ronny Luss, Alexandre d'Aspremont | Predicting Abnormal Returns From News Using Text Classification | Larger data sets, results on time of day effect, and use of delta
hedged covered call options to trade on daily predictions | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show how text from news articles can be used to predict intraday price
movements of financial assets using support vector machines. Multiple kernel
learning is used to combine equity returns with text as predictive features to
increase classification performance and we develop an analytic center cutting
plane method to solve the kernel learning problem efficiently. We observe that
while the direction of returns is not predictable using either text or returns,
their size is, with text features producing significantly better performance
than historical returns alone.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 20:05:00 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Nov 2008 23:31:38 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Jun 2009 17:45:11 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Luss",
"Ronny",
""
],
[
"d'Aspremont",
"Alexandre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0809.2818 | Christoph Schommer | Christoph Schommer | A Simple Framework to Typify Social Bibliographic Communities | 14 pages, 12 figures | null | null | null | cs.DL cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Social Communities in bibliographic databases exist since many years,
researchers share common research interests, and work and publish together. A
social community may vary in type and size, being fully connected between
participating members or even more expressed by a consortium of small and
individual members who play individual roles in it. In this work, we focus on
social communities inside the bibliographic database DBLP and characterize
communities through a simple typifying description model. Generally, we
understand a publication as a transaction between the associated authors. The
idea therefore is to concern with directed associative relationships among
them, to decompose each pattern to its fundamental structure, and to describe
the communities by expressive attributes. Finally, we argue that the
decomposition supports the management of discovered structures towards the use
of adaptive-incremental mind-maps.
| [
{
"version": "v1",
"created": "Tue, 16 Sep 2008 21:25:41 GMT"
}
]
| 2008-09-18T00:00:00 | [
[
"Schommer",
"Christoph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0809.2835 | Leonard Grokop | Leonard Grokop, David N. C. Tse | Fundamental Constraints on Multicast Capacity Regions | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Much of the existing work on the broadcast channel focuses only on the
sending of private messages. In this work we examine the scenario where the
sender also wishes to transmit common messages to subsets of receivers. For an
L user broadcast channel there are 2L - 1 subsets of receivers and
correspondingly 2L - 1 independent messages. The set of achievable rates for
this channel is a 2L - 1 dimensional region. There are fundamental constraints
on the geometry of this region. For example, observe that if the transmitter is
able to simultaneously send L rate-one private messages, error-free to all
receivers, then by sending the same information in each message, it must be
able to send a single rate-one common message, error-free to all receivers.
This swapping of private and common messages illustrates that for any broadcast
channel, the inclusion of a point R* in the achievable rate region implies the
achievability of a set of other points that are not merely component-wise less
than R*. We formerly define this set and characterize it for L = 2 and L = 3.
Whereas for L = 2 all the points in the set arise only from operations relating
to swapping private and common messages, for L = 3 a form of network coding is
required.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 00:56:32 GMT"
}
]
| 2016-09-08T00:00:00 | [
[
"Grokop",
"Leonard",
""
],
[
"Tse",
"David N. C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2840 | Leonard Grokop | Leonard Grokop, David N. C. Tse | Spectrum Sharing between Wireless Networks | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of two wireless networks operating on the same
(presumably unlicensed) frequency band. Pairs within a given network cooperate
to schedule transmissions, but between networks there is competition for
spectrum. To make the problem tractable, we assume transmissions are scheduled
according to a random access protocol where each network chooses an access
probability for its users. A game between the two networks is defined. We
characterize the Nash Equilibrium behavior of the system. Three regimes are
identified; one in which both networks simultaneously schedule all
transmissions; one in which the denser network schedules all transmissions and
the sparser only schedules a fraction; and one in which both networks schedule
only a fraction of their transmissions. The regime of operation depends on the
pathloss exponent $\alpha$, the latter regime being desirable, but attainable
only for $\alpha>4$. This suggests that in certain environments, rival wireless
networks may end up naturally cooperating. To substantiate our analytical
results, we simulate a system where networks iteratively optimize their access
probabilities in a greedy manner. We also discuss a distributed scheduling
protocol that employs carrier sensing, and demonstrate via simulations, that
again a near cooperative equilibrium exists for sufficiently large $\alpha$.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 01:52:21 GMT"
}
]
| 2008-09-18T00:00:00 | [
[
"Grokop",
"Leonard",
""
],
[
"Tse",
"David N. C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2851 | Michael Nelson | Michael L. Nelson, Martin Klein, Manoranjan Magudamudi | Correlation of Expert and Search Engine Rankings | 10 pages, 5 figures (figures 3-5 corrected in version 2) | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In previous research it has been shown that link-based web page metrics can
be used to predict experts' assessment of quality. We are interested in a
related question: do expert rankings of real-world entities correlate with
search engine rankings of corresponding web resources? For example, each year
US News & World Report publishes a list of (among others) top 50 graduate
business schools. Does their expert ranking correlate with the search engine
ranking of the URLs of those business schools? To answer this question we
conducted 9 experiments using 8 expert rankings on a range of academic,
athletic, financial and popular culture topics. We compared the expert rankings
with the rankings in Google, Live Search (formerly MSN) and Yahoo (with list
lengths of 10, 25, and 50). In 57 search engine vs. expert comparisons, only 1
strong and 4 moderate correlations were statistically significant. In 42
inter-search engine comparisons, only 2 strong and 4 moderate correlations were
statistically significant. The correlations appeared to decrease with the size
of the lists: the 3 strong correlations were for lists of 10, the 8 moderate
correlations were for lists of 25, and no correlations were found for lists of
50.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 04:27:14 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Oct 2008 15:41:55 GMT"
}
]
| 2008-10-21T00:00:00 | [
[
"Nelson",
"Michael L.",
""
],
[
"Klein",
"Martin",
""
],
[
"Magudamudi",
"Manoranjan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0809.2858 | Christophe Paul | Stephane Bessy and Christophe Paul and Anthony Perez | Polynomial kernels for 3-leaf power graph modification problems | Submitted | null | 10.1007/978-3-642-10217-2_10 | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A graph G=(V,E) is a 3-leaf power iff there exists a tree T whose leaves are
V and such that (u,v) is an edge iff u and v are at distance at most 3 in T.
The 3-leaf power graph edge modification problems, i.e. edition (also known as
the closest 3-leaf power), completion and edge-deletion, are FTP when
parameterized by the size of the edge set modification. However polynomial
kernel was known for none of these three problems. For each of them, we provide
cubic kernels that can be computed in linear time for each of these problems.
We thereby answer an open problem first mentioned by Dom, Guo, Huffner and
Niedermeier (2005).
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 06:16:37 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Sep 2008 20:10:57 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Bessy",
"Stephane",
""
],
[
"Paul",
"Christophe",
""
],
[
"Perez",
"Anthony",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0809.2884 | Soubhik Chakraborty | Bidu Prakash Das and Soubhik Chakraborty | On an algorithm that generates an interesting maximal set P(n) of the
naturals for any n greater than or equal to 2 | There are some problems with the page numbering. I could not remove
the unwanted page numbers! please read the pages one after another as they
come. There are 11 pages in all | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper considers the problem of finding the largest possible set P(n), a
subset of the set N of the natural numbers, with the property that a number is
in P(n) if and only if it is a sum of n distinct naturals all in P(n) or none
in P(n). Here largest is in the set theoretic sense and n is greater than or
equal to 2. We call P(n) a maximal set obeying this property. For small n say 2
or 3, it is possible to develop P(n) intuitively but we strongly felt the
necessity of an algorithm for any n greater than or equal to 2. Now P(n) shall
invariably be a infinite set so we define another set Q(n) such that
Q(n)=N-P(n), prove that Q(n) is finite and, since P(n) is automatically known
if Q(n) is known, design an algorithm of worst case O(1) complexity which
generates Q(n).
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 09:28:58 GMT"
}
]
| 2008-09-18T00:00:00 | [
[
"Das",
"Bidu Prakash",
""
],
[
"Chakraborty",
"Soubhik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0809.2931 | ArunKumar Jayaprakasam | Vinod Sharma and ArunKumar Jayaprakasam | An Efficient Algorithm for Cooperative Spectrum Sensing in Cognitive
Radio Networks | 6 pages, 4 tables | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of Spectrum Sensing in Cognitive Radio Systems. We
have developed a distributed algorithm that the Secondary users can run to
sense the channel cooperatively. It is based on sequential detection algorithms
which optimally use the past observations. We use the algorithm on secondary
users with energy detectors although it can be used with matched filter and
other spectrum sensing algorithms also. The algorithm provides very low
detection delays and also consumes little energy. Furthermore it causes low
interference to the primary users. We compare this algorithm to several
recently proposed algorithms and show that it detects changes in spectrum
faster than these algorithms and uses significantly less energy.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 13:58:41 GMT"
}
]
| 2008-09-19T00:00:00 | [
[
"Sharma",
"Vinod",
""
],
[
"Jayaprakasam",
"ArunKumar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2956 | Paz Carmi | Prosenjit Bose, Paz Carmi, Michiel Smid, Daming Xu | Communication-Efficient Construction of the Plane Localized Delaunay
Graph | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $V$ be a finite set of points in the plane. We present a 2-local
algorithm that constructs a plane $\frac{4 \pi \sqrt{3}}{9}$-spanner of the
unit-disk graph $\UDG(V)$. This algorithm makes only one round of communication
and each point of $V$ broadcasts at most 5 messages. This improves the
previously best message-bound of 11 by Ara\'{u}jo and Rodrigues (Fast localized
Delaunay triangulation, Lecture Notes in Computer Science, volume 3544, 2004).
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 16:28:06 GMT"
}
]
| 2008-09-18T00:00:00 | [
[
"Bose",
"Prosenjit",
""
],
[
"Carmi",
"Paz",
""
],
[
"Smid",
"Michiel",
""
],
[
"Xu",
"Daming",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0809.2957 | Sergi Elizalde | Sergi Elizalde, Peter Winkler | Sorting by Placement and Shift | 13 pages, 4 figures, Proceedings of SODA 2009 | null | null | null | math.CO cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In sorting situations where the final destination of each item is known, it
is natural to repeatedly choose items and place them where they belong,
allowing the intervening items to shift by one to make room. (In fact, a
special case of this algorithm is commonly used to hand-sort files.) However,
it is not obvious that this algorithm necessarily terminates.
We show that in fact the algorithm terminates after at most $2^{n-1}-1$ steps
in the worst case (confirming a conjecture of L. Larson), and that there are
super-exponentially many permutations for which this exact bound can be
achieved. The proof involves a curious symmetrical binary representation.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 16:29:38 GMT"
}
]
| 2008-09-18T00:00:00 | [
[
"Elizalde",
"Sergi",
""
],
[
"Winkler",
"Peter",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0809.2965 | Paul Vitanyi | E.G. Daylight (Univ. Amsterdam), W.M. Koolen (CWI), P.M.B. Vitanyi
(CWI and Univ Amsterdam) | On Time-Bounded Incompressibility of Compressible Strings and Sequences | 9 pages, LaTeX, no figures, submitted to Information Processing
Letters. Changed and added a Barzdins-like lemma for infinite sequences with
different quantification oreder, a fixed constant, and uncountably many
sequences | null | null | null | cs.CC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For every total recursive time bound $t$, a constant fraction of all
compressible (low Kolmogorov complexity) strings is $t$-bounded incompressible
(high time-bounded Kolmogorov complexity); there are uncountably many infinite
sequences of which every initial segment of length $n$ is compressible to $\log
n$ yet $t$-bounded incompressible below ${1/4}n - \log n$; and there are
countable infinitely many recursive infinite sequence of which every initial
segment is similarly $t$-bounded incompressible. These results are related to,
but different from, Barzdins's lemma.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 17:05:11 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Sep 2008 16:31:59 GMT"
},
{
"version": "v3",
"created": "Fri, 22 May 2009 14:12:59 GMT"
},
{
"version": "v4",
"created": "Tue, 11 Aug 2009 14:19:42 GMT"
}
]
| 2009-08-11T00:00:00 | [
[
"Daylight",
"E. G.",
"",
"Univ. Amsterdam"
],
[
"Koolen",
"W. M.",
"",
"CWI"
],
[
"Vitanyi",
"P. M. B.",
"",
"CWI and Univ Amsterdam"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2968 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | Bounds on Covering Codes with the Rank Metric | 8 pages, 1 table, extended version with all the proofs | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate geometrical properties of the rank metric space
and covering properties of rank metric codes. We first establish an analytical
expression for the intersection of two balls with rank radii, and then derive
an upper bound on the volume of the union of multiple balls with rank radii.
Using these geometrical properties, we derive both upper and lower bounds on
the minimum cardinality of a code with a given rank covering radius. The
geometrical properties and bounds proposed in this paper are significant to the
design, decoding, and performance analysis of rank metric codes.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 17:46:43 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jun 2009 12:48:31 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.2970 | Raphael Yuster | Raphael Yuster | Single source shortest paths in $H$-minor free graphs | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an algorithm for the Single Source Shortest Paths (SSSP) problem
in \emph{$H$-minor free} graphs. For every fixed $H$, if $G$ is a graph with
$n$ vertices having integer edge lengths and $s$ is a designated source vertex
of $G$, the algorithm runs in $\tilde{O}(n^{\sqrt{11.5}-2} \log L) \le
O(n^{1.392} \log L)$ time, where $L$ is the absolute value of the smallest edge
length. The algorithm computes shortest paths and the distances from $s$ to all
vertices of the graph, or else provides a certificate that $G$ is not $H$-minor
free. Our result improves an earlier $O(n^{1.5} \log L)$ time algorithm for
this problem, which follows from a general SSSP algorithm of Goldberg.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 17:51:09 GMT"
}
]
| 2008-09-18T00:00:00 | [
[
"Yuster",
"Raphael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0809.2978 | Jon Wilkening | Jon Wilkening and Jia Yu | A local construction of the Smith normal form of a matrix polynomial | 26 pages, 6 figures; introduction expanded, 10 references added, two
additional tests performed | null | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an algorithm for computing a Smith form with multipliers of a
regular matrix polynomial over a field. This algorithm differs from previous
ones in that it computes a local Smith form for each irreducible factor in the
determinant separately and then combines them into a global Smith form, whereas
other algorithms apply a sequence of unimodular row and column operations to
the original matrix. The performance of the algorithm in exact arithmetic is
reported for several test cases.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 18:58:42 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Jun 2010 19:23:17 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Wilkening",
"Jon",
""
],
[
"Yu",
"Jia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0809.2995 | Marian Boguna | Marian Boguna and Dmitri Krioukov | Navigating ultrasmall worlds in ultrashort time | 4 pages, 2 figures | Phys. Rev. Lett. 102, 058701 (2009) | 10.1103/PhysRevLett.102.058701 | null | cond-mat.dis-nn cs.NI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Random scale-free networks are ultrasmall worlds. The average length of the
shortest paths in networks of size N scales as lnlnN. Here we show that these
ultrasmall worlds can be navigated in ultrashort time. Greedy routing on
scale-free networks embedded in metric spaces finds paths with the average
length scaling also as lnlnN. Greedy routing uses only local information to
navigate a network. Nevertheless, it finds asymptotically the shortest paths, a
direct computation of which requires global topology knowledge. Our findings
imply that the peculiar structure of complex networks ensures that the lack of
global topological awareness has asymptotically no impact on the length of
communication paths. These results have important consequences for
communication systems such as the Internet, where maintaining knowledge of
current topology is a major scalability bottleneck.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 20:01:04 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Feb 2009 06:56:05 GMT"
}
]
| 2009-02-08T00:00:00 | [
[
"Boguna",
"Marian",
""
],
[
"Krioukov",
"Dmitri",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0809.3009 | Grenville Croll | Karin Hodnigg, Roland T. Mittermeir | Metrics-Based Spreadsheet Visualization: Support for Focused Maintenance | 16 Pages, 7 Colour Figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 79-94
ISBN 978-905617-69-2 | null | null | cs.SE cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Legacy spreadsheets are both, an asset, and an enduring problem concerning
spreadsheets in business. To make spreadsheets stay alive and remain correct,
comprehension of a given spreadsheet is highly important. Visualization
techniques should ease the complex and mindblowing challenges of finding
structures in a huge set of spreadsheet cells for building an adequate mental
model of spreadsheet programs. Since spreadsheet programs are as diverse as the
purpose they are serving and as inhomogeneous as their programmers, to find an
appropriate representation or visualization technique for every spreadsheet
program seems futile. We thus propose different visualization and
representation methods that may ease spreadsheet comprehension but should not
be applied with all kind of spreadsheet programs. Therefore, this paper
proposes to use (complexity) measures as indicators for proper visualization.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 20:58:29 GMT"
}
]
| 2008-09-19T00:00:00 | [
[
"Hodnigg",
"Karin",
""
],
[
"Mittermeir",
"Roland T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0809.3010 | Jessica Metcalf-Burton | Jessica Ruth Metcalf-Burton | Improved Upper Bounds for the Information Rates of the Secret Sharing
Schemes Induced by the Vamos Matroid | null | null | null | null | cs.CR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An access structure specifying the qualified sets of a secret sharing scheme
must have information rate less than or equal to one. The Vamos matroid induces
two non-isomorphic access structures V1 and V6, which were shown by Marti-Farre
and Padro to have information rates of at least 3/4. Beimel, Livne, and Padro
showed that the information rates of V1 and V6 are bounded above by 10/11 and
9/10 respectively. Here we improve those upper bounds to 19/21 for V1 and 17/19
for V6.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 20:58:44 GMT"
}
]
| 2008-09-19T00:00:00 | [
[
"Metcalf-Burton",
"Jessica Ruth",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.3016 | Grenville Croll | Eric Perry | Automating Spreadsheet Discovery & Risk Assessment | 7 Pages, 6 Colour Figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 61-67
ISBN 978-905617-69-2 | null | null | cs.SE cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There have been many articles and mishaps published about the risks of
uncontrolled spreadsheets in today's business environment, including
non-compliance, operational risk, errors, and fraud all leading to significant
loss events. Spreadsheets fall into the realm of end user developed
applications and are often absent the proper safeguards and controls an IT
organization would enforce for enterprise applications. There is also an
overall lack of software programming discipline enforced in how spreadsheets
are developed. However, before an organization can apply proper controls and
discipline to critical spreadsheets, an accurate and living inventory of
spreadsheets across the enterprise must be created, and all critical
spreadsheets must be identified. As such, this paper proposes an automated
approach to the initial stages of the spreadsheet management lifecycle -
discovery, inventory and risk assessment. Without the use of technology, these
phases are often treated as a one-off project. By leveraging technology, they
become a sustainable business process.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 21:16:02 GMT"
}
]
| 2008-09-19T00:00:00 | [
[
"Perry",
"Eric",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0809.3023 | Charles Wells | Atish Bagchi and Charles Wells | Graph-based Logic and Sketches | PDFLaTeX with xy-pic. 112 pages, 182 diagrams | null | null | null | math.CT cs.IT math.IT math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the basic ideas of forms (a generalization of Ehresmann's
sketches) and their theories and models, more explicitly than in previous
expositions. Forms provide the ability to specify mathematical structures and
data types in any appropriate category, including many types of structures
(e.g. function spaces) that cannot be specified by sketches. We also outline a
new kind of formal logic (based on graphs instead of strings of symbols) that
gives an intrinsically categorial definition of assertion and proof for each
type of form. This formal logic is new to this monograph. The relationship
between multisorted equational logic and finite product theories is worked out
in detail.
| [
{
"version": "v1",
"created": "Thu, 18 Sep 2008 02:57:08 GMT"
}
]
| 2008-09-19T00:00:00 | [
[
"Bagchi",
"Atish",
""
],
[
"Wells",
"Charles",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0809.3027 | Evimaria Terzi | Heikki Mannila and Evimaria Terzi | Finding links and initiators: a graph reconstruction problem | null | null | null | null | cs.AI cs.DB physics.soc-ph | http://creativecommons.org/licenses/publicdomain/ | Consider a 0-1 observation matrix M, where rows correspond to entities and
columns correspond to signals; a value of 1 (or 0) in cell (i,j) of M indicates
that signal j has been observed (or not observed) in entity i. Given such a
matrix we study the problem of inferring the underlying directed links between
entities (rows) and finding which entries in the matrix are initiators.
We formally define this problem and propose an MCMC framework for estimating
the links and the initiators given the matrix of observations M. We also show
how this framework can be extended to incorporate a temporal aspect; instead of
considering a single observation matrix M we consider a sequence of observation
matrices M1,..., Mt over time.
We show the connection between our problem and several problems studied in
the field of social-network analysis. We apply our method to paleontological
and ecological data and show that our algorithms work well in practice and give
reasonable results.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 22:28:29 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Mannila",
"Heikki",
""
],
[
"Terzi",
"Evimaria",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0809.3030 | Bernardo Huberman | Bernardo A. Huberman, Daniel M. Romero and Fang Wu | Crowdsourcing, Attention and Productivity | null | null | null | null | cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The tragedy of the digital commons does not prevent the copious voluntary
production of content that one witnesses in the web. We show through an
analysis of a massive data set from \texttt{YouTube} that the productivity
exhibited in crowdsourcing exhibits a strong positive dependence on attention,
measured by the number of downloads. Conversely, a lack of attention leads to a
decrease in the number of videos uploaded and the consequent drop in
productivity, which in many cases asymptotes to no uploads whatsoever.
Moreover, uploaders compare themselves to others when having low productivity
and to themselves when exceeding a threshold.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2008 22:42:55 GMT"
}
]
| 2008-09-20T00:00:00 | [
[
"Huberman",
"Bernardo A.",
""
],
[
"Romero",
"Daniel M.",
""
],
[
"Wu",
"Fang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0809.3035 | Leonard Grokop | Leonard Grokop, David N. C. Tse, Roy D. Yates | Interference Alignment for Line-of-Sight Channels | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The fully connected K-user interference channel is studied in a multipath
environment with bandwidth W. We show that when each link consists of D
physical paths, the total spectral efficiency can grow {\it linearly} with K.
This result holds not merely in the limit of large transmit power P, but for
any fixed P, and is therefore a stronger characterization than degrees of
freedom. It is achieved via a form of interference alignment in the time
domain. A caveat of this result is that W must grow with K, a phenomenon we
refer to as {\it bandwidth scaling}. Our insight comes from examining channels
with single path links (D=1), which we refer to as line-of-sight (LOS) links.
For such channels we build a time-indexed interference graph and associate the
communication problem with finding its maximal independent set. This graph has
a stationarity property that we exploit to solve the problem efficiently via
dynamic programming. Additionally, the interference graph enables us to
demonstrate the necessity of bandwidth scaling for any scheme operating over
LOS interference channels. Bandwidth scaling is then shown to also be a
necessary ingredient for interference alignment in the K-user interference
channel.
| [
{
"version": "v1",
"created": "Thu, 18 Sep 2008 00:28:49 GMT"
}
]
| 2008-09-19T00:00:00 | [
[
"Grokop",
"Leonard",
""
],
[
"Tse",
"David N. C.",
""
],
[
"Yates",
"Roy D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.3044 | Damien Chablat | Novona Rakotomanga (GPA), Damien Chablat (IRCCyN), St\'ephane Caro
(IRCCyN) | Kinetostatic Performance of a Planar Parallel Mechanism with Variable
Actuation | Published in: Advances in Robot Kinematics, France (2008) | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with a new planar parallel mechanism with variable actuation
and its kinetostatic performance. A drawback of parallel mechanisms is the non
homogeneity of kinetostatic performance within their workspace. The common
approach to solve this problem is the introduction of actuation redundancy,
that involves force control algorithms. Another approach, highlighted in this
paper, is to select the actuated joint in each limb with regard to the pose of
the end-effector. First, the architecture of the mechanism and two kinetostatic
performance indices are described. Then, the actuating modes of the mechanism
are compared.
| [
{
"version": "v1",
"created": "Thu, 18 Sep 2008 14:13:40 GMT"
}
]
| 2008-09-19T00:00:00 | [
[
"Rakotomanga",
"Novona",
"",
"GPA"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Caro",
"Stéphane",
"",
"IRCCyN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0809.3083 | Julien Mairal | Julien Mairal (WILLOW), Francis Bach (WILLOW), Jean Ponce (WILLOW,
LIENS), Guillermo Sapiro, Andrew Zisserman (WILLOW, VGG) | Supervised Dictionary Learning | null | null | null | RR-6652 | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is now well established that sparse signal models are well suited to
restoration tasks and can effectively be learned from audio, image, and video
data. Recent research has been aimed at learning discriminative sparse models
instead of purely reconstructive ones. This paper proposes a new step in that
direction, with a novel sparse representation for signals belonging to
different classes in terms of a shared dictionary and multiple class-decision
functions. The linear variant of the proposed model admits a simple
probabilistic interpretation, while its most general variant admits an
interpretation in terms of kernels. An optimization framework for learning all
the components of the proposed model is presented, along with experimental
results on standard handwritten digit and texture classification tasks.
| [
{
"version": "v1",
"created": "Thu, 18 Sep 2008 07:16:34 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Mairal",
"Julien",
"",
"WILLOW"
],
[
"Bach",
"Francis",
"",
"WILLOW"
],
[
"Ponce",
"Jean",
"",
"WILLOW,\n LIENS"
],
[
"Sapiro",
"Guillermo",
"",
"WILLOW, VGG"
],
[
"Zisserman",
"Andrew",
"",
"WILLOW, VGG"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0809.3091 | Bruno Gaujal | Pierre Coucheney (INRIA Rh\^one-Alpes / LIG laboratoire d'Informatique
de Grenoble), Corinne Touati (INRIA Rh\^one-Alpes / LIG laboratoire
d'Informatique de Grenoble), Bruno Gaujal (INRIA Rh\^one-Alpes / LIG
laboratoire d'Informatique de Grenoble) | A Distributed Algorithm for Fair and Efficient User-Network Association
in Multi-Technology Wireless Networks | null | null | null | RR-6653 | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent mobile equipment (as well as the norm IEEE 802.21) now offers the
possibility for users to switch from one technology to another (vertical
handover). This allows flexibility in resource assignments and, consequently,
increases the potential throughput allocated to each user. In this paper, we
design a fully distributed algorithm based on trial and error mechanisms that
exploits the benefits of vertical handover by finding fair and efficient
assignment schemes. On the one hand, mobiles gradually update the fraction of
data packets they send to each network based on the rewards they receive from
the stations. On the other hand, network stations send rewards to each mobile
that represent the impact each mobile has on the cell throughput. This reward
function is closely related to the concept of marginal cost in the pricing
literature. Both the station and the mobile algorithms are simple enough to be
implemented in current standard equipment. Based on tools from evolutionary
games, potential games and replicator dynamics, we analytically show the
convergence of the algorithm to solutions that are efficient and fair in terms
of throughput. Moreover, we show that after convergence, each user is connected
to a single network cell which avoids costly repeated vertical handovers.
Several simple heuristics based on this algorithm are proposed to achieve fast
convergence. Indeed, for implementation purposes, the number of iterations
should remain in the order of a few tens. We also compare, for different loads,
the quality of their solutions.
| [
{
"version": "v1",
"created": "Thu, 18 Sep 2008 07:47:31 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Sep 2009 14:39:11 GMT"
}
]
| 2009-09-07T00:00:00 | [
[
"Coucheney",
"Pierre",
"",
"INRIA Rhône-Alpes / LIG laboratoire d'Informatique\n de Grenoble"
],
[
"Touati",
"Corinne",
"",
"INRIA Rhône-Alpes / LIG laboratoire\n d'Informatique de Grenoble"
],
[
"Gaujal",
"Bruno",
"",
"INRIA Rhône-Alpes / LIG\n laboratoire d'Informatique de Grenoble"
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0809.3140 | Fang Wei | Georg Gottlob, Reinhard Pichler, Fang Wei | Monadic Datalog over Finite Structures with Bounded Treewidth | null | null | null | null | cs.DB cs.CC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bounded treewidth and Monadic Second Order (MSO) logic have proved to be key
concepts in establishing fixed-parameter tractability results. Indeed, by
Courcelle's Theorem we know: Any property of finite structures, which is
expressible by an MSO sentence, can be decided in linear time (data complexity)
if the structures have bounded treewidth.
In principle, Courcelle's Theorem can be applied directly to construct
concrete algorithms by transforming the MSO evaluation problem into a tree
language recognition problem. The latter can then be solved via a finite tree
automaton (FTA). However, this approach has turned out to be problematical,
since even relatively simple MSO formulae may lead to a ``state explosion'' of
the FTA.
In this work we propose monadic datalog (i.e., datalog where all intentional
predicate symbols are unary) as an alternative method to tackle this class of
fixed-parameter tractable problems. We show that if some property of finite
structures is expressible in MSO then this property can also be expressed by
means of a monadic datalog program over the structure plus the tree
decomposition.
Moreover, we show that the resulting fragment of datalog can be evaluated in
linear time (both w.r.t. the program size and w.r.t. the data size). This new
approach is put to work by devising new algorithms for the 3-Colorability
problem of graphs and for the PRIMALITY problem of relational schemas (i.e.,
testing if some attribute in a relational schema is part of a key). We also
report on experimental results with a prototype implementation.
| [
{
"version": "v1",
"created": "Thu, 18 Sep 2008 12:40:49 GMT"
}
]
| 2008-09-19T00:00:00 | [
[
"Gottlob",
"Georg",
""
],
[
"Pichler",
"Reinhard",
""
],
[
"Wei",
"Fang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.