id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0809.3159
Abdoulaye Bagayoko
Abdoulaye Bagayoko and Patrick Tortelier
A Geometrical Description of the SINR Region of the Gaussian Interference Channel: the two and three-user case
Submitted to IEEE ICC 2009, 5 pages
null
null
1569150569
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of computing the achievable rates for two (and three) users sharing a same frequency band without coordination and thus interfering with each other. It is thus primarily related to the field of cognitive radio studies as we look for the achievable increase in the spectrum use efficiency. It is also strongly related to the long standing problem of the capacity region of a Gaussian interference channel (GIC) because of the assumption of no user coordination (and the underlying assumption that all signals and interferences are Gaussian). We give a geometrical description of the SINR region for the two-user and three-user channels. This geometric approach provides a closed-form expression of the capacity region of the two-user interference channel and an insightful of known optimal power allocation scheme.
[ { "version": "v1", "created": "Thu, 18 Sep 2008 13:40:00 GMT" } ]
2008-09-19T00:00:00
[ [ "Bagayoko", "Abdoulaye", "" ], [ "Tortelier", "Patrick", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.3170
Xinjia Chen
Xinjia Chen
A New Framework of Multistage Hypothesis Tests
77 pages, no figure; added more references; in Proceedings of SPIE Conferences, Orlando, Florida, April 5-10, 2010 and April 25-29, 2011
null
null
null
math.ST cs.LG math.PR stat.ME stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we have established a general framework of multistage hypothesis tests which applies to arbitrarily many mutually exclusive and exhaustive composite hypotheses. Within the new framework, we have constructed specific multistage tests which rigorously control the risk of committing decision errors and are more efficient than previous tests in terms of average sample number and the number of sampling operations. Without truncation, the sample numbers of our testing plans are absolutely bounded.
[ { "version": "v1", "created": "Thu, 18 Sep 2008 14:25:06 GMT" }, { "version": "v10", "created": "Fri, 20 Nov 2009 22:17:43 GMT" }, { "version": "v11", "created": "Mon, 21 Dec 2009 22:56:13 GMT" }, { "version": "v12", "created": "Tue, 16 Feb 2010 00:27:27 GMT" }, { "version": "v13", "created": "Wed, 17 Feb 2010 03:04:41 GMT" }, { "version": "v14", "created": "Mon, 28 Jun 2010 22:26:57 GMT" }, { "version": "v15", "created": "Fri, 6 Aug 2010 20:16:51 GMT" }, { "version": "v16", "created": "Sat, 13 Nov 2010 16:41:18 GMT" }, { "version": "v17", "created": "Mon, 21 Mar 2011 01:28:32 GMT" }, { "version": "v18", "created": "Mon, 6 Jun 2011 01:16:15 GMT" }, { "version": "v19", "created": "Sat, 18 Jun 2011 00:46:04 GMT" }, { "version": "v2", "created": "Thu, 16 Oct 2008 16:19:07 GMT" }, { "version": "v20", "created": "Wed, 3 Aug 2011 16:02:49 GMT" }, { "version": "v21", "created": "Wed, 30 Nov 2011 19:11:21 GMT" }, { "version": "v22", "created": "Sat, 31 Dec 2011 02:28:00 GMT" }, { "version": "v23", "created": "Mon, 13 Feb 2012 17:11:54 GMT" }, { "version": "v24", "created": "Tue, 3 Apr 2012 16:36:09 GMT" }, { "version": "v25", "created": "Wed, 5 Dec 2012 00:35:38 GMT" }, { "version": "v3", "created": "Sun, 2 Nov 2008 23:37:14 GMT" }, { "version": "v4", "created": "Sun, 22 Mar 2009 21:23:57 GMT" }, { "version": "v5", "created": "Sun, 29 Mar 2009 20:20:01 GMT" }, { "version": "v6", "created": "Mon, 27 Apr 2009 18:37:54 GMT" }, { "version": "v7", "created": "Wed, 23 Sep 2009 17:00:30 GMT" }, { "version": "v8", "created": "Wed, 23 Sep 2009 20:12:53 GMT" }, { "version": "v9", "created": "Sun, 4 Oct 2009 19:06:44 GMT" } ]
2013-11-05T00:00:00
[ [ "Chen", "Xinjia", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0809.3179
Damien Chablat
Raza Ur-Rehman (IRCCyN), St\'ephane Caro (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Kinematic and Dynamic Analyses of the Orthoglide 5-axis
null
Congress on Mechatronics, Le Grand-Bornand : France (2008)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the kinematic and dynamic analyses of the Orthoglide 5-axis, a five-degree-of-freedom manipulator. It is derived from two manipulators: i) the Orthoglide 3-axis; a three dof translational manipulator and ii) the Agile eye; a parallel spherical wrist. First, the kinematic and dynamic models of the Orthoglide 5-axis are developed. The geometric and inertial parameters of the manipulator are determined by means of a CAD software. Then, the required motors performances are evaluated for some test trajectories. Finally, the motors are selected in the catalogue from the previous results.
[ { "version": "v1", "created": "Thu, 18 Sep 2008 15:11:50 GMT" } ]
2008-09-19T00:00:00
[ [ "Ur-Rehman", "Raza", "", "IRCCyN" ], [ "Caro", "Stéphane", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0809.3180
Damien Chablat
Daniel Kanaan (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Singularity Analysis of Limited-dof Parallel Manipulators using Grassmann-Cayley Algebra
null
11th International Symposium on Advances in Robot Kinematics, France (2008)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper characterizes geometrically the singularities of limited DOF parallel manipulators. The geometric conditions associated with the dependency of six Pl\"ucker vector of lines (finite and infinite) constituting the rows of the inverse Jacobian matrix are formulated using Grassmann-Cayley algebra. Manipulators under consideration do not need to have a passive spherical joint somewhere in each leg. This study is illustrated with three example robots
[ { "version": "v1", "created": "Thu, 18 Sep 2008 15:14:20 GMT" } ]
2008-09-19T00:00:00
[ [ "Kanaan", "Daniel", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0809.3181
Damien Chablat
Liang Ma (IRCCyN), Fouad Bennis (IRCCyN), Damien Chablat (IRCCyN), Wei Zhang (DIE)
Framework for Dynamic Evaluation of Muscle Fatigue in Manual Handling Work
International Conference On Industrial Technology, Chengdu : Chine (2008)
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Muscle fatigue is defined as the point at which the muscle is no longer able to sustain the required force or work output level. The overexertion of muscle force and muscle fatigue can induce acute pain and chronic pain in human body. When muscle fatigue is accumulated, the functional disability can be resulted as musculoskeletal disorders (MSD). There are several posture exposure analysis methods useful for rating the MSD risks, but they are mainly based on static postures. Even in some fatigue evaluation methods, muscle fatigue evaluation is only available for static postures, but not suitable for dynamic working process. Meanwhile, some existing muscle fatigue models based on physiological models cannot be easily used in industrial ergonomic evaluations. The external dynamic load is definitely the most important factor resulting muscle fatigue, thus we propose a new fatigue model under a framework for evaluating fatigue in dynamic working processes. Under this framework, virtual reality system is taken to generate virtual working environment, which can be interacted with the work with haptic interfaces and optical motion capture system. The motion information and load information are collected and further processed to evaluate the overall work load of the worker based on dynamic muscle fatigue models and other work evaluation criterions and to give new information to characterize the penibility of the task in design process.
[ { "version": "v1", "created": "Thu, 18 Sep 2008 15:15:58 GMT" } ]
2008-09-19T00:00:00
[ [ "Ma", "Liang", "", "IRCCyN" ], [ "Bennis", "Fouad", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Zhang", "Wei", "", "DIE" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0809.3182
Damien Chablat
Patricia Ben-Horin (Technion), Moshe Shoham (Technion), St\'ephane Caro (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
SINGULAB - A Graphical user Interface for the Singularity Analysis of Parallel Robots based on Grassmann-Cayley Algebra
Advances in Robot Kinematics, Batz sur Mer : France (2008)
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents SinguLab, a graphical user interface for the singularity analysis of parallel robots. The algorithm is based on Grassmann-Cayley algebra. The proposed tool is interactive and introduces the designer to the singularity analysis performed by this method, showing all the stages along the procedure and eventually showing the solution algebraically and graphically, allowing as well the singularity verification of different robot poses.
[ { "version": "v1", "created": "Thu, 18 Sep 2008 15:19:36 GMT" } ]
2008-09-19T00:00:00
[ [ "Ben-Horin", "Patricia", "", "Technion" ], [ "Shoham", "Moshe", "", "Technion" ], [ "Caro", "Stéphane", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0809.3187
Tarik Borogovac
T. Borogovac, F. J. Alexander, P. Vakili
A Control Variate Approach for Improving Efficiency of Ensemble Monte Carlo
15 pages, 2 ps figures, elsart.cls
null
null
LA-UR-08-05399
cs.CE cond-mat.stat-mech stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a new approach to control variates for improving computational efficiency of Ensemble Monte Carlo. We present the approach using simulation of paths of a time-dependent nonlinear stochastic equation. The core idea is to extract information at one or more nominal model parameters and use this information to gain estimation efficiency at neighboring parameters. This idea is the basis of a general strategy, called DataBase Monte Carlo (DBMC), for improving efficiency of Monte Carlo. In this paper we describe how this strategy can be implemented using the variance reduction technique of Control Variates (CV). We show that, once an initial setup cost for extracting information is incurred, this approach can lead to significant gains in computational efficiency. The initial setup cost is justified in projects that require a large number of estimations or in those that are to be performed under real-time constraints.
[ { "version": "v1", "created": "Thu, 18 Sep 2008 15:29:40 GMT" } ]
2008-09-25T00:00:00
[ [ "Borogovac", "T.", "" ], [ "Alexander", "F. J.", "" ], [ "Vakili", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Statistics", "code": "stat.CO", "description": "Algorithms, Simulation, Visualization", "span": "(Computation)" } ]
0809.3204
Matti J\"arvisalo
Matti J\"arvisalo and Emilia Oikarinen
Extended ASP tableaux and rule redundancy in normal logic programs
27 pages, 5 figures, 1 table
Theory and Practice of Logic Programming, 8(5-6):691-716, 2008
10.1017/S1471068408003578
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce an extended tableau calculus for answer set programming (ASP). The proof system is based on the ASP tableaux defined in [Gebser&Schaub, ICLP 2006], with an added extension rule. We investigate the power of Extended ASP Tableaux both theoretically and empirically. We study the relationship of Extended ASP Tableaux with the Extended Resolution proof system defined by Tseitin for sets of clauses, and separate Extended ASP Tableaux from ASP Tableaux by giving a polynomial-length proof for a family of normal logic programs P_n for which ASP Tableaux has exponential-length minimal proofs with respect to n. Additionally, Extended ASP Tableaux imply interesting insight into the effect of program simplification on the lengths of proofs in ASP. Closely related to Extended ASP Tableaux, we empirically investigate the effect of redundant rules on the efficiency of ASP solving. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Thu, 18 Sep 2008 16:35:20 GMT" } ]
2010-07-20T00:00:00
[ [ "Järvisalo", "Matti", "" ], [ "Oikarinen", "Emilia", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0809.3214
Soubhik Chakraborty
Soubhik Chakraborty, Sandeep Singh Solanki, Sayan Roy, Shivee Chauhan, Sanjaya Shankar Tripathy and Kartik Mahto
A Statistical Approach to Modeling Indian Classical Music Performance
24 pages,11 figures;a replacement paper is being uploaded because the the nyas swars of Yaman were not correctly given;some typos have been corrected
null
null
null
cs.SD stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A raga is a melodic structure with fixed notes and a set of rules characterizing a certain mood endorsed through performance. By a vadi swar is meant that note which plays the most significant role in expressing the raga. A samvadi swar similarly is the second most significant note. However, the determination of their significance has an element of subjectivity and hence we are motivated to find some truths through an objective analysis. The paper proposes a probabilistic method of note detection and demonstrates how the relative frequency (relative number of occurrences of the pitch) of the more important notes stabilize far more quickly than that of others. In addition, a count for distinct transitory and similar looking non-transitory (fundamental) frequency movements (but possibly embedding distinct emotions!) between the notes is also taken depicting the varnalankars or musical ornaments decorating the notes and note sequences as rendered by the artist. They reflect certain structural properties of the ragas. Several case studies are presented.
[ { "version": "v1", "created": "Thu, 18 Sep 2008 17:38:57 GMT" }, { "version": "v2", "created": "Sat, 25 Oct 2008 14:10:00 GMT" } ]
2008-10-25T00:00:00
[ [ "Chakraborty", "Soubhik", "" ], [ "Solanki", "Sandeep Singh", "" ], [ "Roy", "Sayan", "" ], [ "Chauhan", "Shivee", "" ], [ "Tripathy", "Sanjaya Shankar", "" ], [ "Mahto", "Kartik", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0809.3232
Daniel A. Spielman
Daniel A. Spielman, Shang-Hua Teng
A Local Clustering Algorithm for Massive Graphs and its Application to Nearly-Linear Time Graph Partitioning
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the design of local algorithms for massive graphs. A local algorithm is one that finds a solution containing or near a given vertex without looking at the whole graph. We present a local clustering algorithm. Our algorithm finds a good cluster--a subset of vertices whose internal connections are significantly richer than its external connections--near a given vertex. The running time of our algorithm, when it finds a non-empty local cluster, is nearly linear in the size of the cluster it outputs. Our clustering algorithm could be a useful primitive for handling massive graphs, such as social networks and web-graphs. As an application of this clustering algorithm, we present a partitioning algorithm that finds an approximate sparsest cut with nearly optimal balance. Our algorithm takes time nearly linear in the number edges of the graph. Using the partitioning algorithm of this paper, we have designed a nearly-linear time algorithm for constructing spectral sparsifiers of graphs, which we in turn use in a nearly-linear time algorithm for solving linear systems in symmetric, diagonally-dominant matrices. The linear system solver also leads to a nearly linear-time algorithm for approximating the second-smallest eigenvalue and corresponding eigenvector of the Laplacian matrix of a graph. These other results are presented in two companion papers.
[ { "version": "v1", "created": "Thu, 18 Sep 2008 19:20:07 GMT" } ]
2008-09-19T00:00:00
[ [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0809.3250
Andrey Kutuzov
Andrey Kutuzov
Using descriptive mark-up to formalize translation quality assessment
9 pages
Published in Russian in 'Translation industry and information supply in international business activities: materials of international conference' - Perm, 2008, pp. 90-101
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/3.0/
The paper deals with using descriptive mark-up to emphasize translation mistakes. The author postulates the necessity to develop a standard and formal XML-based way of describing translation mistakes. It is considered to be important for achieving impersonal translation quality assessment. Marked-up translations can be used in corpus translation studies; moreover, automatic translation assessment based on marked-up mistakes is possible. The paper concludes with setting up guidelines for further activity within the described field.
[ { "version": "v1", "created": "Thu, 18 Sep 2008 20:48:13 GMT" } ]
2008-09-22T00:00:00
[ [ "Kutuzov", "Andrey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0809.3273
Stefano Pirandola
Stefano Pirandola, Raul Garcia-Patron, Samuel L. Braunstein, and Seth Lloyd
Direct and Reverse Secret-Key Capacities of a Quantum Channel
4 pages, 5 figures, REVteX
Phys. Rev. Lett. 102, 050503 (2009)
10.1103/PhysRevLett.102.050503
null
quant-ph cs.CR cs.IT math.IT physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum key distribution protocols can reach by using a single forward classical communication (direct reconciliation) or a single feedback classical communication (reverse reconciliation). In particular, the reverse secret-key capacity can be positive for antidegradable channels, where no forward strategy is known to be secure. This property is explicitly shown in the continuous variable framework by considering arbitrary one-mode Gaussian channels.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 00:28:26 GMT" }, { "version": "v2", "created": "Mon, 9 Feb 2009 18:35:11 GMT" } ]
2009-02-09T00:00:00
[ [ "Pirandola", "Stefano", "" ], [ "Garcia-Patron", "Raul", "" ], [ "Braunstein", "Samuel L.", "" ], [ "Lloyd", "Seth", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "physics.optics", "description": "Adaptive optics. Astronomical optics. Atmospheric optics. Biomedical optics. Cardinal points. Collimation. Doppler effect. Fiber optics. Fourier optics. Geometrical optics (Gradient index optics. Holography. Infrared optics. Integrated optics. Laser applications. Laser optical systems. Lasers. Light amplification. Light diffraction. Luminescence. Microoptics. Nano optics. Ocean optics. Optical computing. Optical devices. Optical imaging. Optical materials. Optical metrology. Optical microscopy. Optical properties. Optical signal processing. Optical testing techniques. Optical wave propagation. Paraxial optics. Photoabsorption. Photoexcitations. Physical optics. Physiological optics. Quantum optics. Segmented optics. Spectra. Statistical optics. Surface optics. Ultrafast optics. Wave optics. X-ray optics.", "span": "(Optics)" } ]
0809.3276
Zheng Sun
Zheng Sun, Wenjun Xu, Zhiqiang He, Kai Niu
Criteria on Utility Designing of Convex Optimization in FDMA Networks
published in workshop of ICC '08
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate the network utility maximization problem in FDMA systems. We summarize with a suite of criteria on designing utility functions so as to achieve the global optimization convex. After proposing the general form of the utility functions, we present examples of commonly used utility function forms that are consistent with the criteria proposed in this paper, which include the well-known proportional fairness function and the sigmoidal-like functions. In the second part of this paper, we use numerical results to demonstrate a case study based on the criteria mentioned above, which deals with the subcarrier scheduling problem with dynamic rate allocation in FDMA system.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 01:08:47 GMT" }, { "version": "v2", "created": "Mon, 22 Sep 2008 08:42:03 GMT" } ]
2008-09-22T00:00:00
[ [ "Sun", "Zheng", "" ], [ "Xu", "Wenjun", "" ], [ "He", "Zhiqiang", "" ], [ "Niu", "Kai", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.3279
Zheng Sun
Zheng Sun
Distributed Spiral Optimization in Wireless Sensor Networks without Fusion Centers
submitted
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A distributed spiral algorithm for distributed optimization in WSN is proposed. By forming a spiral-shape message passing scheme among clusters, without loss of estimation accuracy and convergence speed, the algorithm is proved to converge with a lower total transport cost than the distributed in-cluster algorithm.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 01:18:16 GMT" } ]
2008-09-22T00:00:00
[ [ "Sun", "Zheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.3280
Zheng Sun
Zheng Sun, Zhiqiang He, Ruochen Wang, Kai Niu
A Heuristic Scheduling Scheme in Multiuser OFDMA Networks
published in VTC Fall '08
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conventional heterogeneous-traffic scheduling schemes utilize zero-delay constraint for real-time services, which aims to minimize the average packet delay among real-time users. However, in light or moderate load networks this strategy is unnecessary and leads to low data throughput for non-real-time users. In this paper, we propose a heuristic scheduling scheme to solve this problem. The scheme measures and assigns scheduling priorities to both real-time and non-real-time users, and schedules the radio resources for the two user classes simultaneously. Simulation results show that the proposed scheme efficiently handles the heterogeneous-traffic scheduling with diverse QoS requirements and alleviates the unfairness between real-time and non-real-time services under various traffic loads.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 01:25:16 GMT" } ]
2008-09-22T00:00:00
[ [ "Sun", "Zheng", "" ], [ "He", "Zhiqiang", "" ], [ "Wang", "Ruochen", "" ], [ "Niu", "Kai", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.3283
Zheng Sun
Zheng Sun, Wenjun Xu, Zhiqiang He, Kai Niu
Performance Comparison of Cooperative and Distributed Spectrum Sensing in Cognitive Radio
submitted
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we compare the performances of cooperative and distributed spectrum sensing in wireless sensor networks. After introducing the basic problem, we describe two strategies: 1) a cooperative sensing strategy, which takes advantage of cooperation diversity gain to increase probability of detection and 2) a distributed sensing strategy, which by passing the results in an inter-node manner increases energy efficiency and fairness among nodes. Then, we compare the performances of the strategies in terms of three criteria: agility, energy efficiency, and robustness against SNR changes, and summarize the comparison. It shows that: 1) the non-cooperative strategy has the best fairness of energy consumption, 2) the cooperative strategy leads to the best agility, and 3) the distributed strategy leads to the lowest energy consumption and the best robustness against SNR changes.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 01:31:55 GMT" }, { "version": "v2", "created": "Mon, 22 Sep 2008 08:39:21 GMT" } ]
2008-09-22T00:00:00
[ [ "Sun", "Zheng", "" ], [ "Xu", "Wenjun", "" ], [ "He", "Zhiqiang", "" ], [ "Niu", "Kai", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.3285
Zheng Sun
Zheng Sun, Xiaohong Huang, and Yan Ma
Load Balancing Strategies to Solve Flowshop Scheduling on Parallel Computing
submitted
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper first presents a parallel solution for the Flowshop Scheduling Problem in parallel environment, and then proposes a novel load balancing strategy. The proposed Proportional Fairness Strategy (PFS) takes computational performance of computing process sets into account, and assigns additional load to computing nodes proportionally to their evaluated performance. In order to efficiently utilize the power of parallel resource, we also discuss the data structure used in communications among computational nodes and design an optimized data transfer strategy. This data transfer strategy combined with the proposed load balancing strategy have been implemented and tested on a super computer consisted of 86 CPUs using MPI as the middleware. The results show that the proposed PFS achieves better performance in terms of computing time than the existing Adaptive Contracting Within Neighborhood Strategy. We also show that the combination of both the Proportional Fairness Strategy and the proposed data transferring strategy achieves additional 13~15% improvement in efficiency of parallelism.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 01:35:39 GMT" } ]
2008-09-22T00:00:00
[ [ "Sun", "Zheng", "" ], [ "Huang", "Xiaohong", "" ], [ "Ma", "Yan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.3352
Steffen Kuehn
Steffen Kuehn
Generalized Prediction Intervals for Arbitrary Distributed High-Dimensional Data
13 pages, 3 figures
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper generalizes the traditional statistical concept of prediction intervals for arbitrary probability density functions in high-dimensional feature spaces by introducing significance level distributions, which provides interval-independent probabilities for continuous random variables. The advantage of the transformation of a probability density function into a significance level distribution is that it enables one-class classification or outlier detection in a direct manner.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 11:02:39 GMT" } ]
2008-09-22T00:00:00
[ [ "Kuehn", "Steffen", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0809.3357
Sushmita Ruj
Sushmita Ruj and Bimal Roy
More on Combinatorial Batch Codes
null
null
null
null
cs.CR cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Paterson, Stinson and Wei \cite{PSW} introduced Combinatorial batch codes, which are combinatorial description of Batch code. Batch codes were first presented by Ishai, Kushilevita, Ostrovsky and Sahai \cite{IKOS} in STOC'04. In this paper we answer some of the questions put forward by Paterson, Stinson and Wei and give some results for the general case $t>1$ which were not studied by the authors.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 12:16:14 GMT" } ]
2008-10-01T00:00:00
[ [ "Ruj", "Sushmita", "" ], [ "Roy", "Bimal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0809.3365
Jean-Claude Belfiore
Laura Luzzi, Ghaya Rekaya-Ben Othman and Jean-Claude Belfiore
Algebraic reduction for space-time codes based on quaternion algebras
29 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a new right preprocessing method for the decoding of 2x2 algebraic STBCs, called algebraic reduction, which exploits the multiplicative structure of the code. The principle of the new reduction is to absorb part of the channel into the code, by approximating the channel matrix with an element of the maximal order of the algebra. We prove that algebraic reduction attains the receive diversity when followed by a simple ZF detection. Simulation results for the Golden Code show that using MMSE-GDFE left preprocessing, algebraic reduction with simple ZF detection has a loss of only $3 \dB$ with respect to ML decoding.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 12:44:32 GMT" }, { "version": "v2", "created": "Tue, 30 Sep 2008 09:22:05 GMT" } ]
2008-09-30T00:00:00
[ [ "Luzzi", "Laura", "" ], [ "Othman", "Ghaya Rekaya-Ben", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.3370
Alfonso Martinez
Alfonso Martinez
Achievability of the Rate ${1/2}\log(1+\es)$ in the Discrete-Time Poisson Channel
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A simple lower bound to the capacity of the discrete-time Poisson channel with average energy $\es$ is derived. The rate ${1/2}\log(1+\es)$ is shown to be the generalized mutual information of a modified minimum-distance decoder, when the input follows a gamma distribution of parameter 1/2 and mean $\es$.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 13:11:56 GMT" } ]
2008-09-22T00:00:00
[ [ "Martinez", "Alfonso", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.3384
Damien Chablat
Ilian Bonev (GPA), S\'ebastien Briot (GPA), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Changing Assembly Modes without Passing Parallel Singularities in Non-Cuspidal 3-R\underline{P}R Planar Parallel Robots
2nd International Workshop on Fundamental Issues and Future Research Directions for Parallel Mechanisms and Manipulators, Montpellier : France (2008)
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper demonstrates that any general 3-DOF three-legged planar parallel robot with extensible legs can change assembly modes without passing through parallel singularities (configurations where the mobile platform loses its stiffness). While the results are purely theoretical, this paper questions the very definition of parallel singularities.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 14:25:17 GMT" } ]
2008-09-22T00:00:00
[ [ "Bonev", "Ilian", "", "GPA" ], [ "Briot", "Sébastien", "", "GPA" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0809.3415
Cl\'emence Magnien
Frederic Aidouni, Matthieu Latapy and Clemence Magnien
Ten weeks in the life of an eDonkey server
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a capture of the queries managed by an eDonkey server during almost 10 weeks, leading to the observation of almost 9 billion messages involving almost 90 million users and more than 275 million distinct files. Acquisition and management of such data raises several challenges, which we discuss as well as the solutions we developed. We obtain a very rich dataset, orders of magnitude larger than previously avalaible ones, which we provide for public use. We finally present basic analysis of the obtained data, which already gives evidence of non-trivial features.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 16:45:26 GMT" } ]
2008-09-22T00:00:00
[ [ "Aidouni", "Frederic", "" ], [ "Latapy", "Matthieu", "" ], [ "Magnien", "Clemence", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.3447
Manas Tungare
Manas Tungare, Manuel Perez-Quinones, Alyssa Sams
An Exploratory Study of Calendar Use
null
null
null
null
cs.HC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we report on findings from an ethnographic study of how people use their calendars for personal information management (PIM). Our participants were faculty, staff and students who were not required to use or contribute to any specific calendaring solution, but chose to do so anyway. The study was conducted in three parts: first, an initial survey provided broad insights into how calendars were used; second, this was followed up with personal interviews of a few participants which were transcribed and content-analyzed; and third, examples of calendar artifacts were collected to inform our analysis. Findings from our study include the use of multiple reminder alarms, the reliance on paper calendars even among regular users of electronic calendars, and wide use of calendars for reporting and life-archival purposes. We conclude the paper with a discussion of what these imply for designers of interactive calendar systems and future work in PIM research.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 19:56:15 GMT" } ]
2008-09-22T00:00:00
[ [ "Tungare", "Manas", "" ], [ "Perez-Quinones", "Manuel", "" ], [ "Sams", "Alyssa", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0809.3479
Michael Chertkov
Vladimir Y. Chernyak and Michael Chertkov
Fermions and Loops on Graphs. I. Loop Calculus for Determinant
11 pages, 1 figure; misprints corrected
J.Stat.Mech.0812:P12011,2008
10.1088/1742-5468/2008/12/P12011
LA-UR-08-05537
cond-mat.stat-mech cond-mat.dis-nn cs.CC cs.IT hep-th math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is the first in the series devoted to evaluation of the partition function in statistical models on graphs with loops in terms of the Berezin/fermion integrals. The paper focuses on a representation of the determinant of a square matrix in terms of a finite series, where each term corresponds to a loop on the graph. The representation is based on a fermion version of the Loop Calculus, previously introduced by the authors for graphical models with finite alphabets. Our construction contains two levels. First, we represent the determinant in terms of an integral over anti-commuting Grassman variables, with some reparametrization/gauge freedom hidden in the formulation. Second, we show that a special choice of the gauge, called BP (Bethe-Peierls or Belief Propagation) gauge, yields the desired loop representation. The set of gauge-fixing BP conditions is equivalent to the Gaussian BP equations, discussed in the past as efficient (linear scaling) heuristics for estimating the covariance of a sparse positive matrix.
[ { "version": "v1", "created": "Sat, 20 Sep 2008 03:11:44 GMT" }, { "version": "v2", "created": "Fri, 21 Nov 2008 01:13:21 GMT" } ]
2010-05-27T00:00:00
[ [ "Chernyak", "Vladimir Y.", "" ], [ "Chertkov", "Michael", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "hep-th", "description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.", "span": "(High Energy Physics - Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.3481
Michael Chertkov
Vladimir Y. Chernyak and Michael Chertkov
Fermions and Loops on Graphs. II. Monomer-Dimer Model as Series of Determinants
11 pages, 2 figures; misprints corrected
J.Stat.Mech.0812:P12012,2008
10.1088/1742-5468/2008/12/P12012
LA-UR-08-05678
cond-mat.stat-mech cond-mat.dis-nn cs.CC cs.IT hep-th math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We continue the discussion of the fermion models on graphs that started in the first paper of the series. Here we introduce a Graphical Gauge Model (GGM) and show that : (a) it can be stated as an average/sum of a determinant defined on the graph over $\mathbb{Z}_{2}$ (binary) gauge field; (b) it is equivalent to the Monomer-Dimer (MD) model on the graph; (c) the partition function of the model allows an explicit expression in terms of a series over disjoint directed cycles, where each term is a product of local contributions along the cycle and the determinant of a matrix defined on the remainder of the graph (excluding the cycle). We also establish a relation between the MD model on the graph and the determinant series, discussed in the first paper, however, considered using simple non-Belief-Propagation choice of the gauge. We conclude with a discussion of possible analytic and algorithmic consequences of these results, as well as related questions and challenges.
[ { "version": "v1", "created": "Sat, 20 Sep 2008 03:17:59 GMT" }, { "version": "v2", "created": "Fri, 21 Nov 2008 01:22:08 GMT" } ]
2010-05-27T00:00:00
[ [ "Chernyak", "Vladimir Y.", "" ], [ "Chertkov", "Michael", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "hep-th", "description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.", "span": "(High Energy Physics - Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.3485
Hamed Firouzi
Hamed Firouzi, Massoud Babaie-Zadeh, Aria Ghasemian, Christian Jutten
A First Step to Convolutive Sparse Representation
4 Pages-In Proceeding of ICASSP 2008
null
null
null
cs.MM cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper an extension of the sparse decomposition problem is considered and an algorithm for solving it is presented. In this extension, it is known that one of the shifted versions of a signal s (not necessarily the original signal itself) has a sparse representation on an overcomplete dictionary, and we are looking for the sparsest representation among the representations of all the shifted versions of s. Then, the proposed algorithm finds simultaneously the amount of the required shift, and the sparse representation. Experimental results emphasize on the performance of our algorithm.
[ { "version": "v1", "created": "Sat, 20 Sep 2008 05:52:47 GMT" } ]
2008-09-23T00:00:00
[ [ "Firouzi", "Hamed", "" ], [ "Babaie-Zadeh", "Massoud", "" ], [ "Ghasemian", "Aria", "" ], [ "Jutten", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0809.3503
Praveen Sivadasan
Praveen Sivadasan, P Sojan Lal, Naveen Sivadasan
JDATATRANS for Array Obfuscation in Java Source Code to Defeat Reverse Engineering from Decompiled Codes
Manuscript submitted to ACM COMPUTE 2009 Conference,Bangalore
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the program in a semi complied form called 'byte' codes. The existing obfuscation systems obfuscate the Java class files. Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks. But source code obfuscation is much more difficult due to richer set of programming constructs and the scope of the different variables used in the program and only very little progress has been made on this front. Hence programmers resort to adhoc manual ways of obscuring their program which makes it difficult for its maintenance and usability. To address this issue partially, we developed a user friendly tool JDATATRANS to obfuscate Java source code by obscuring the array usages. Using various array restructuring techniques such as 'array splitting', 'array folding' and 'array flattening', in addition to constant hiding, our system obfuscate the input Java source code and produce an obfuscated Java source code that is functionally equivalent to the input program. We also perform a number of experiments to measure the potency, resilience and cost incurred by our tool.
[ { "version": "v1", "created": "Sat, 20 Sep 2008 13:18:26 GMT" } ]
2008-09-23T00:00:00
[ [ "Sivadasan", "Praveen", "" ], [ "Lal", "P Sojan", "" ], [ "Sivadasan", "Naveen", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0809.3527
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Angela Andreica, Romulus Andreica
Inferring Company Structure from Limited Available Information
Some of the algorithmic techniques presented in this paper were used as part of the solutions for some of the tasks proposed in several programming contests in which the first author participated (see the related materials for several such tasks and their solutions)
International Symposium on Social Development and Economic Performance, Satu Mare : Romania (2008)
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present several algorithmic techniques for inferring the structure of a company when only a limited amount of information is available. We consider problems with two types of inputs: the number of pairs of employees with a given property and restricted information about the hierarchical structure of the company. We provide dynamic programming and greedy algorithms for these problems.
[ { "version": "v1", "created": "Sat, 20 Sep 2008 20:05:21 GMT" }, { "version": "v2", "created": "Sun, 23 Dec 2012 06:56:16 GMT" } ]
2012-12-27T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Andreica", "Angela", "" ], [ "Andreica", "Romulus", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0809.3528
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Cristina Teodora Andreica, Madalina Ecaterina Andreica
Locating Restricted Facilities on Binary Maps
The algorithmic techniques presented in this paper were used by the first author in the implementation of solutions to various algorithmic contest tasks (see the attached zip archive for some examples)
International Symposium on Social Development and Economic Performance, Satu Mare : Romania (2008)
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider several facility location problems with applications to cost and social welfare optimization, when the area map is encoded as a binary (0,1) mxn matrix. We present algorithmic solutions for all the problems. Some cases are too particular to be used in practical situations, but they are at least a starting point for more generic solutions.
[ { "version": "v1", "created": "Sat, 20 Sep 2008 20:06:34 GMT" }, { "version": "v2", "created": "Wed, 30 Jan 2013 07:48:10 GMT" } ]
2013-01-31T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Andreica", "Cristina Teodora", "" ], [ "Andreica", "Madalina Ecaterina", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0809.3540
David Ford K
David Ford
A Note on the Equivalence of Gibbs Free Energy and Information Theoretic Capacity
6 pages, 3 figures
null
null
null
cond-mat.stat-mech cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The minimization of Gibbs free energy is based on the changes in work and free energy that occur in a physical or chemical system. The maximization of mutual information, the capacity, of a noisy channel is determined based on the marginal probabilities and conditional entropies associated with a communications system. As different as the procedures might first appear, through the exploration of a simple, "dual use" Ising model, it is seen that the two concepts are in fact the same. In particular, the case of a binary symmetric channel is calculated in detail.
[ { "version": "v1", "created": "Mon, 22 Sep 2008 18:34:55 GMT" } ]
2008-09-23T00:00:00
[ [ "Ford", "David", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.3542
Ivan Voras
Ivan Voras, Danko Basch, Mario Zagar
A High Performance Memory Database for Web Application Caches
null
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the architecture and characteristics of a memory database intended to be used as a cache engine for web applications. Primary goals of this database are speed and efficiency while running on SMP systems with several CPU cores (four and more). A secondary goal is the support for simple metadata structures associated with cached data that can aid in efficient use of the cache. Due to these goals, some data structures and algorithms normally associated with this field of computing needed to be adapted to the new environment.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 01:05:46 GMT" } ]
2008-09-23T00:00:00
[ [ "Voras", "Ivan", "" ], [ "Basch", "Danko", "" ], [ "Zagar", "Mario", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0809.3546
Danilo Silva
Danilo Silva, Frank R. Kschischang
Universal Secure Network Coding via Rank-Metric Codes
12 pages, 1 figure, substantially rewritten and improved. Submitted to IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, vol. 57, no. 2, pp. 1124-1135, Feb. 2011
10.1109/TIT.2010.2090212
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of securing a network coding communication system against an eavesdropper adversary is considered. The network implements linear network coding to deliver n packets from source to each receiver, and the adversary can eavesdrop on \mu arbitrarily chosen links. The objective is to provide reliable communication to all receivers, while guaranteeing that the source information remains information-theoretically secure from the adversary. A coding scheme is proposed that can achieve the maximum possible rate of n-\mu packets. The scheme, which is based on rank-metric codes, has the distinctive property of being universal: it can be applied on top of any communication network without requiring knowledge of or any modifications on the underlying network code. The only requirement of the scheme is that the packet length be at least n, which is shown to be strictly necessary for universal communication at the maximum rate. A further scenario is considered where the adversary is allowed not only to eavesdrop but also to inject up to t erroneous packets into the network, and the network may suffer from a rank deficiency of at most \rho. In this case, the proposed scheme can be extended to achieve the rate of n-\rho-2t-\mu packets. This rate is shown to be optimal under the assumption of zero-error communication.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 02:16:18 GMT" }, { "version": "v2", "created": "Tue, 27 Apr 2010 04:21:21 GMT" } ]
2019-05-07T00:00:00
[ [ "Silva", "Danilo", "" ], [ "Kschischang", "Frank R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.3554
Guy Bresler
Guy Bresler, Abhay Parekh, and David Tse
The Approximate Capacity of the Many-to-One and One-to-Many Gaussian Interference Channels
45 pages, 16 figures. Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2010.2054590
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, Etkin, Tse, and Wang found the capacity region of the two-user Gaussian interference channel to within one bit/s/Hz. A natural goal is to apply this approach to the Gaussian interference channel with an arbitrary number of users. We make progress towards this goal by finding the capacity region of the many-to-one and one-to-many Gaussian interference channels to within a constant number of bits. The result makes use of a deterministic model to provide insight into the Gaussian channel. The deterministic model makes explicit the dimension of signal scale. A central theme emerges: the use of lattice codes for alignment of interfering signals on the signal scale.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 07:00:03 GMT" } ]
2016-11-17T00:00:00
[ [ "Bresler", "Guy", "" ], [ "Parekh", "Abhay", "" ], [ "Tse", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.3565
Natalia Vanetik Mrs
N. Vanetik
On fractionality of the path packing problem
18 pages, 5 figures in .eps format, 2 latex files, main file is kc13.tex Resubmission due to incorrectly specified CS type of the article; no changes to the context have been made
null
10.1007/s10878-011-9405-3
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study fractional multiflows in undirected graphs. A fractional multiflow in a graph G with a node subset T, called terminals, is a collection of weighted paths with ends in T such that the total weights of paths traversing each edge does not exceed 1. Well-known fractional path packing problem consists of maximizing the total weight of paths with ends in a subset S of TxT over all fractional multiflows. Together, G,T and S form a network. A network is an Eulerian network if all nodes in N\T have even degrees. A term "fractionality" was defined for the fractional path packing problem by A. Karzanov as the smallest natural number D so that there exists a solution to the problem that becomes integer-valued when multiplied by D. A. Karzanov has defined the class of Eulerian networks in terms of T and S, outside which D is infinite and proved that whithin this class D can be 1,2 or 4. He conjectured that D should be 1 or 2 for this class of networks. In this paper we prove this conjecture.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 09:17:37 GMT" }, { "version": "v2", "created": "Sun, 23 Nov 2008 09:58:25 GMT" } ]
2011-06-03T00:00:00
[ [ "Vanetik", "N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0809.3571
Grenville Croll
Derek Flood, Kevin Mc Daid, Fergal Mc Caffery, Brian Bishop
Evaluation of an Intelligent Assistive Technology for Voice Navigation of Spreadsheets
10 Pages, 2 Colour Figures, 4 Tables
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 69-78 ISBN 978-905617-69-2
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An integral part of spreadsheet auditing is navigation. For sufferers of Repetitive Strain Injury who need to use voice recognition technology this navigation can be highly problematic. To counter this the authors have developed an intelligent voice navigation system, iVoice, which replicates common spreadsheet auditing behaviours through simple voice commands. This paper outlines the iVoice system and summarizes the results of a study to evaluate iVoice when compared to a leading voice recognition technology.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 11:06:23 GMT" } ]
2008-09-23T00:00:00
[ [ "Flood", "Derek", "" ], [ "Daid", "Kevin Mc", "" ], [ "Caffery", "Fergal Mc", "" ], [ "Bishop", "Brian", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.3574
Grenville Croll
Pandelis G. Ipsilandis
Spreadsheet modelling for solving combinatorial problems: The vendor selection problem
13 Pages, 8 Colour Figures, 1 Table
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 95-107 ISBN 978-905617-69-2
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spreadsheets have grown up and became very powerful and easy to use tools in applying analytical techniques for solving business problems. Operations managers, production managers, planners and schedulers can work with them in developing solid and practical Do-It-Yourself Decision Support Systems. Small and Medium size organizations, can apply OR methodologies without the presence of specialized software and trained personnel, which in many cases cannot afford anyway. This paper examines an efficient approach in solving combinatorial programming problems with the use of spreadsheets. A practical application, which demonstrates the approach, concerns the development of a spreadsheet-based DSS for the Multi Item Procurement Problem with Fixed Vendor Cost. The DSS has been build using exclusively standard spreadsheet feature and can solve real problems of substantial size. The benefits and limitations of the approach are also discussed.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 11:21:40 GMT" } ]
2008-09-23T00:00:00
[ [ "Ipsilandis", "Pandelis G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.3577
Philippe Robert
Han\`ene Mohamed, Philippe Robert
Dynamic tree algorithms
Published in at http://dx.doi.org/10.1214/09-AAP617 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2010, Vol. 20, No. 1, 26-51
10.1214/09-AAP617
IMS-AAP-AAP617
math.PR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a general tree algorithm processing a random flow of arrivals is analyzed. Capetanakis--Tsybakov--Mikhailov's protocol in the context of communication networks with random access is an example of such an algorithm. In computer science, this corresponds to a trie structure with a dynamic input. Mathematically, it is related to a stopped branching process with exogeneous arrivals (immigration). Under quite general assumptions on the distribution of the number of arrivals and on the branching procedure, it is shown that there exists a positive constant $\lambda_c$ so that if the arrival rate is smaller than $\lambda_c$, then the algorithm is stable under the flow of requests, that is, that the total size of an associated tree is integrable. At the same time, a gap in the earlier proofs of stability in the literature is fixed. When the arrivals are Poisson, an explicit characterization of $\lambda_c$ is given. Under the stability condition, the asymptotic behavior of the average size of a tree starting with a large number of individuals is analyzed. The results are obtained with the help of a probabilistic rewriting of the functional equations describing the dynamics of the system. The proofs use extensively this stochastic background throughout the paper. In this analysis, two basic limit theorems play a key role: the renewal theorem and the convergence to equilibrium of an auto-regressive process with a moving average.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 11:46:05 GMT" }, { "version": "v2", "created": "Wed, 13 Jan 2010 13:51:20 GMT" } ]
2010-01-13T00:00:00
[ [ "Mohamed", "Hanène", "" ], [ "Robert", "Philippe", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0809.3584
Grenville Croll
Jocelyn Paine
Spreadsheet Components For All
19 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 109-127 ISBN 978-905617-69-2
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have prototyped a "spreadsheet component repository" Web site, from which users can copy "components" into their own Excel or Google spreadsheets. Components are collections of cells containing formulae: in real life, they would do useful calculations that many practitioners find hard to program, and would be rigorously tested and documented. Crucially, the user can tell the repository which cells in their spreadsheet to use for a componen's inputs and outputs. The repository will then reshape the component to fit. A single component can therefore be used in many different sizes and shapes of spreadsheet. We hope to set up a spreadsheet equivalent of the high-quality numerical subroutine libraries that revolutionised scientific computing, but where instead of subroutines, the library contains such components.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 13:31:35 GMT" } ]
2008-09-23T00:00:00
[ [ "Paine", "Jocelyn", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.3586
Grenville Croll
Thomas A. Grossman
A Primer on Spreadsheet Analytics
12 Pages, 8 Colour Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 129-140 ISBN 978-905617-69-2
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides guidance to an analyst who wants to extract insight from a spreadsheet model. It discusses the terminology of spreadsheet analytics, how to prepare a spreadsheet model for analysis, and a hierarchy of analytical techniques. These techniques include sensitivity analysis, tornado charts,and backsolving (or goal-seeking). This paper presents native-Excel approaches for automating these techniques, and discusses add-ins that are even more efficient. Spreadsheet optimization and spreadsheet Monte Carlo simulation are briefly discussed. The paper concludes by calling for empirical research, and describing desired features spreadsheet sensitivity analysis and spreadsheet optimization add-ins.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 13:49:23 GMT" } ]
2008-09-23T00:00:00
[ [ "Grossman", "Thomas A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.3587
Grenville Croll
Brian Bishop, Kevin McDaid
Spreadsheet End-User Behaviour Analysis
12 Pages, 13 Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 141-152 ISBN 978-905617-69-2
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To aid the development of spreadsheet debugging tools, a knowledge of end-users natural behaviour within the Excel environment would be advantageous. This paper details the design and application of a novel data acquisition tool, which can be used for the unobtrusive recording of end-users mouse, keyboard and Excel specific actions during the debugging of Excel spreadsheets. A debugging experiment was conducted using this data acquisition tool, and based on analysis of end-users performance and behaviour data, the authors developed a "spreadsheet cell coverage feedback" debugging tool. Results from the debugging experiment are presented in terms of enduser debugging performance and behaviour, and the outcomes of an evaluation experiment with the debugging tool are detailed.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 13:59:03 GMT" } ]
2008-09-23T00:00:00
[ [ "Bishop", "Brian", "" ], [ "McDaid", "Kevin", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.3595
Grenville Croll
Jamie Chambers, John Hamill
Controlling End User Computing Applications - a case study
9 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 153-161 ISBN 978-905617-69-2
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report the results of a project to control the use of end user computing tools for business critical applications in a banking environment. Several workstreams were employed in order to bring about a cultural change within the bank towards the use of spreadsheets and other end-user tools, covering policy development, awareness and skills training, inventory monitoring, user licensing, key risk metrics and mitigation approaches. The outcomes of these activities are discussed, and conclusions are drawn as to the need for appropriate organisational models to guide the use of these tools.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 17:45:08 GMT" } ]
2008-09-23T00:00:00
[ [ "Chambers", "Jamie", "" ], [ "Hamill", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.3597
Grenville Croll
Mbwana Alliy, Patty Brown
Spreadsheets: Aiming the Accountant's Hammer to Hit the Nail on the Head
8 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 163-170 ISBN 978-905617-69-2
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Accounting and Finance (A&F) Professionals are arguably the most loyal and concentrated population of spreadsheet users. The work that they perform in spreadsheets has the most significant impact on financial data and business processes within global organizations today. Spreadsheets offer the flexibility and ease of use of a desktop application, combined with the power to perform complex data analysis. They are also the lowest cost business IT tool when stacked up against other functional tools. As a result, spreadsheets are used to support critical business processes in most organizations. In fact, research indicates that over half of financial management reporting is performed with spreadsheets by an accounting and finance professional. A disparity exists in the business world between the importance of spreadsheets on financial data (created by A&F Professionals) and the resources devoted to: The development and oversight of global spreadsheet standards; A recognized and accredited certification in spreadsheet proficiency; Corporate sponsored and required training; Awareness of emerging technologies as it relates to spreadsheet use. This management paper focuses on the current topics relevant to the largest user group (A&F Professionals) of the most widely used financial software application, spreadsheets, also known as the accountant's hammer.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 18:05:42 GMT" } ]
2008-09-23T00:00:00
[ [ "Alliy", "Mbwana", "" ], [ "Brown", "Patty", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.3600
Zheng Wang
Zheng Wang, Shirish Karande, Hamid R. Sadjadpour and J.J. Garcia-Luna-Aceves
On the Capacity Improvement of Multicast Traffic with Network Coding
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the contribution of network coding (NC) in improving the multicast capacity of random wireless ad hoc networks when nodes are endowed with multi-packet transmission (MPT) and multi-packet reception (MPR) capabilities. We show that a per session throughput capacity of $\Theta(nT^{3}(n))$, where $n$ is the total number of nodes and T(n) is the communication range, can be achieved as a tight bound when each session contains a constant number of sinks. Surprisingly, an identical order capacity can be achieved when nodes have only MPR and MPT capabilities. This result proves that NC does not contribute to the order capacity of multicast traffic in wireless ad hoc networks when MPR and MPT are used in the network. The result is in sharp contrast to the general belief (conjecture) that NC improves the order capacity of multicast. Furthermore, if the communication range is selected to guarantee the connectivity in the network, i.e., $T(n)\ge \Theta(\sqrt{\log n/n})$, then the combination of MPR and MPT achieves a throughput capacity of $\Theta(\frac{\log^{{3/2}} n}{\sqrt{n}})$ which provides an order capacity gain of $\Theta(\log^2 n)$ compared to the point-to-point multicast capacity with the same number of destinations.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 19:05:04 GMT" } ]
2008-09-23T00:00:00
[ [ "Wang", "Zheng", "" ], [ "Karande", "Shirish", "" ], [ "Sadjadpour", "Hamid R.", "" ], [ "Garcia-Luna-Aceves", "J. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.3609
Grenville Croll
Patrick O'Beirne
Information and Data Quality in Spreadsheets
15 Pages, 3 Tables, 1 Figure
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 171-185 ISBN 978-905617-69-2
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The quality of the data in spreadsheets is less discussed than the structural integrity of the formulas. Yet it is an area of great interest to the owners and users of the spreadsheet. This paper provides an overview of Information Quality (IQ) and Data Quality (DQ) with specific reference to how data is sourced, structured, and presented in spreadsheets.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 19:37:28 GMT" } ]
2008-09-23T00:00:00
[ [ "O'Beirne", "Patrick", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.3612
Grenville Croll
Francois-Marie Blondel, Eric Bruillard, Francoise Tort
Overview and main results of the DidaTab project
12 Pages, 5 Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 187-198 ISBN 978-905617-69-2
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The DidaTab project (Didactics of Spreadsheet, teaching and learning spreadsheets) is a three year project (2005-2007) funded by the French Ministry of Research and dedicated to the study of personal and classroom uses of spreadsheets in the French context, focussing on the processes of appropriation and uses by secondary school students. In this paper, we present an overview of the project, briefly report the studies performed in the framework of the DidaTab project, and give the main results we obtained. We then explore the new research tracks we intend to develop, more in connection with EuSpRIG. Our main result is that the use of spreadsheet during secondary education (grade 6 to 12) is rather sparse for school work (and even more seldom at home) and that student competencies are weak. Curricula have to be reviewed to include more training of dynamics tabular tools (including databases queries) in order to ensure sufficient mastery of computer tools that have became necessary in many educational activities.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 20:16:14 GMT" } ]
2008-09-23T00:00:00
[ [ "Blondel", "Francois-Marie", "" ], [ "Bruillard", "Eric", "" ], [ "Tort", "Francoise", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.3613
Grenville Croll
Raymond R. Panko
Revisiting the Panko-Halverson Taxonomy of Spreadsheet Errors
22 Pages, 17 Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 199-220 ISBN 978-905617-69-2
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The purpose of this paper is to revisit the Panko-Halverson taxonomy of spreadsheet errors and suggest revisions. There are several reasons for doing so: First, the taxonomy has been widely used. Therefore, it should have scrutiny; Second, the taxonomy has not been widely available in its original form and most users refer to secondary sources. Consequently, they often equate the taxonomy with the simplified extracts used in particular experiments or field studies; Third, perhaps as a consequence, most users use only a fraction of the taxonomy. In particular, they tend not to use the taxonomy's life-cycle dimension; Fourth, the taxonomy has been tested against spreadsheets in experiments and spreadsheets in operational use. It is time to review how it has fared in these tests; Fifth, the taxonomy was based on the types of spreadsheet errors that were known to the authors in the mid-1990s. Subsequent experience has shown that the taxonomy needs to be extended for situations beyond those original experiences; Sixth, the omission category in the taxonomy has proven to be too narrow. Although this paper will focus on the Panko-Halverson taxonomy, this does not mean that that it is the only possible error taxonomy or even the best error taxonomy.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 20:29:53 GMT" } ]
2008-09-23T00:00:00
[ [ "Panko", "Raymond R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.3614
Sergey Volkov
Sergey Volkov
Improved Monotone Circuit Depth Upper Bound for Directed Graph Reachability
preprint
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that the directed graph reachability problem (transitive closure) can be solved by monotone fan-in 2 boolean circuits of depth (1/2+o(1))(log n)^2, where n is the number of nodes. This improves the previous known upper bound (1+o(1))(log n)^2. The proof is non-constructive, but we give a constructive proof of the upper bound (7/8+o(1))(log n)^2.
[ { "version": "v1", "created": "Mon, 22 Sep 2008 15:14:06 GMT" } ]
2008-09-23T00:00:00
[ [ "Volkov", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0809.3618
Julian McAuley
Julian J. McAuley, Tiberio S. Caetano, Alexander J. Smola
Robust Near-Isometric Matching via Structured Learning of Graphical Models
11 pages, 9 figures
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Models for near-rigid shape matching are typically based on distance-related features, in order to infer matches that are consistent with the isometric assumption. However, real shapes from image datasets, even when expected to be related by "almost isometric" transformations, are actually subject not only to noise but also, to some limited degree, to variations in appearance and scale. In this paper, we introduce a graphical model that parameterises appearance, distance, and angle features and we learn all of the involved parameters via structured prediction. The outcome is a model for near-rigid shape matching which is robust in the sense that it is able to capture the possibly limited but still important scale and appearance variations. Our experimental results reveal substantial improvements upon recent successful models, while maintaining similar running times.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 23:23:26 GMT" } ]
2008-09-23T00:00:00
[ [ "McAuley", "Julian J.", "" ], [ "Caetano", "Tiberio S.", "" ], [ "Smola", "Alexander J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0809.3646
Petr Golovach
Fedor V. Fomin, Petr A. Golovach and Dimitrios M. Thilikos
Approximating acyclicity parameters of sparse hypergraphs
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notions of hypertree width and generalized hypertree width were introduced by Gottlob, Leone, and Scarcello in order to extend the concept of hypergraph acyclicity. These notions were further generalized by Grohe and Marx, who introduced the fractional hypertree width of a hypergraph. All these width parameters on hypergraphs are useful for extending tractability of many problems in database theory and artificial intelligence. In this paper, we study the approximability of (generalized, fractional) hyper treewidth of sparse hypergraphs where the criterion of sparsity reflects the sparsity of their incidence graphs. Our first step is to prove that the (generalized, fractional) hypertree width of a hypergraph H is constant-factor sandwiched by the treewidth of its incidence graph, when the incidence graph belongs to some apex-minor-free graph class. This determines the combinatorial borderline above which the notion of (generalized, fractional) hypertree width becomes essentially more general than treewidth, justifying that way its functionality as a hypergraph acyclicity measure. While for more general sparse families of hypergraphs treewidth of incidence graphs and all hypertree width parameters may differ arbitrarily, there are sparse families where a constant factor approximation algorithm is possible. In particular, we give a constant factor approximation polynomial time algorithm for (generalized, fractional) hypertree width on hypergraphs whose incidence graphs belong to some H-minor-free graph class.
[ { "version": "v1", "created": "Mon, 22 Sep 2008 08:17:22 GMT" } ]
2008-09-23T00:00:00
[ [ "Fomin", "Fedor V.", "" ], [ "Golovach", "Petr A.", "" ], [ "Thilikos", "Dimitrios M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0809.3650
Nicolas Dobigeon
Nicolas Dobigeon, Alfred O. Hero and Jean-Yves Tourneret
Hierarchical Bayesian sparse image reconstruction with application to MRFM
v2: final version; IEEE Trans. Image Processing, 2009
IEEE Trans. Image Processing, vol. 18, no. 9, pp. 2059-2070, Sept. 2009
10.1109/TIP.2009.2024067
null
physics.data-an cs.IT math.IT stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a hierarchical Bayesian model to reconstruct sparse images when the observations are obtained from linear transformations and corrupted by an additive white Gaussian noise. Our hierarchical Bayes model is well suited to such naturally sparse image applications as it seamlessly accounts for properties such as sparsity and positivity of the image via appropriate Bayes priors. We propose a prior that is based on a weighted mixture of a positive exponential distribution and a mass at zero. The prior has hyperparameters that are tuned automatically by marginalization over the hierarchical Bayesian model. To overcome the complexity of the posterior distribution, a Gibbs sampling strategy is proposed. The Gibbs samples can be used to estimate the image to be recovered, e.g. by maximizing the estimated posterior distribution. In our fully Bayesian approach the posteriors of all the parameters are available. Thus our algorithm provides more information than other previously proposed sparse reconstruction methods that only give a point estimate. The performance of our hierarchical Bayesian sparse reconstruction method is illustrated on synthetic and real data collected from a tobacco virus sample using a prototype MRFM instrument.
[ { "version": "v1", "created": "Mon, 22 Sep 2008 08:56:51 GMT" }, { "version": "v2", "created": "Wed, 23 Sep 2009 08:23:42 GMT" } ]
2011-01-19T00:00:00
[ [ "Dobigeon", "Nicolas", "" ], [ "Hero", "Alfred O.", "" ], [ "Tourneret", "Jean-Yves", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" } ]
0809.3688
Armen Bagdasaryan
Armen Bagdasaryan
Mathematical and computer tools of discrete dynamic modeling and analysis of complex systems in control loop
14 pages, 15 figures
Int J Mathematical Models and Methods in Applied Sciences, vol. 2, issue 1, 2008, pp. 82-95
null
null
cs.CE cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a method of discrete modeling and analysis of multilevel dynamics of complex large-scale hierarchical dynamic systems subject to external dynamic control mechanism. Architectural model of information system supporting simulation and analysis of dynamic processes and development scenarios (strategies) of complex large-scale hierarchical systems is also proposed.
[ { "version": "v1", "created": "Mon, 22 Sep 2008 12:03:52 GMT" } ]
2008-09-23T00:00:00
[ [ "Bagdasaryan", "Armen", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0809.3690
Steffen Kuehn
Steffen K\"uhn and Clemens G\"uhmann
Modeling and Control with Local Linearizing Nadaraya Watson Regression
13 pages, 5 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Black box models of technical systems are purely descriptive. They do not explain why a system works the way it does. Thus, black box models are insufficient for some problems. But there are numerous applications, for example, in control engineering, for which a black box model is absolutely sufficient. In this article, we describe a general stochastic framework with which such models can be built easily and fully automated by observation. Furthermore, we give a practical example and show how this framework can be used to model and control a motorcar powertrain.
[ { "version": "v1", "created": "Mon, 22 Sep 2008 12:08:24 GMT" } ]
2008-09-23T00:00:00
[ [ "Kühn", "Steffen", "" ], [ "Gühmann", "Clemens", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0809.3731
Yonina C. Eldar
Yonina C. Eldar
Uncertainty Relations for Shift-Invariant Analog Signals
Accepted to IEEE Trans. on Inform. Theory
null
10.1109/TIT.2009.2032711
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The past several years have witnessed a surge of research investigating various aspects of sparse representations and compressed sensing. Most of this work has focused on the finite-dimensional setting in which the goal is to decompose a finite-length vector into a given finite dictionary. Underlying many of these results is the conceptual notion of an uncertainty principle: a signal cannot be sparsely represented in two different bases. Here, we extend these ideas and results to the analog, infinite-dimensional setting by considering signals that lie in a finitely-generated shift-invariant (SI) space. This class of signals is rich enough to include many interesting special cases such as multiband signals and splines. By adapting the notion of coherence defined for finite dictionaries to infinite SI representations, we develop an uncertainty principle similar in spirit to its finite counterpart. We demonstrate tightness of our bound by considering a bandlimited lowpass train that achieves the uncertainty principle. Building upon these results and similar work in the finite setting, we show how to find a sparse decomposition in an overcomplete dictionary by solving a convex optimization problem. The distinguishing feature of our approach is the fact that even though the problem is defined over an infinite domain with infinitely many variables and constraints, under certain conditions on the dictionary spectrum our algorithm can find the sparsest representation by solving a finite-dimensional problem.
[ { "version": "v1", "created": "Mon, 22 Sep 2008 15:54:24 GMT" }, { "version": "v2", "created": "Thu, 23 Jul 2009 20:26:54 GMT" } ]
2016-11-17T00:00:00
[ [ "Eldar", "Yonina C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.3908
Vinay Joseph
Vinod Sharma, Utpal Mukherji, Vinay Joseph, Shrey Gupta
Optimal Energy Management Policies for Energy Harvesting Sensor Nodes
Submitted to the IEEE Transactions on Wireless Communications; 22 pages with 10 figures
null
10.1109/TWC.2010.04.080749
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a sensor node with an energy harvesting source. The generated energy can be stored in a buffer. The sensor node periodically senses a random field and generates a packet. These packets are stored in a queue and transmitted using the energy available at that time. We obtain energy management policies that are throughput optimal, i.e., the data queue stays stable for the largest possible data rate. Next we obtain energy management policies which minimize the mean delay in the queue.We also compare performance of several easily implementable sub-optimal energy management policies. A greedy policy is identified which, in low SNR regime, is throughput optimal and also minimizes mean delay.
[ { "version": "v1", "created": "Tue, 23 Sep 2008 13:05:22 GMT" } ]
2016-11-17T00:00:00
[ [ "Sharma", "Vinod", "" ], [ "Mukherji", "Utpal", "" ], [ "Joseph", "Vinay", "" ], [ "Gupta", "Shrey", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.3935
Heping Gao
Meera Sitharam, Heping Gao
Characterizing graphs with convex and connected configuration spaces
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define and study exact, efficient representations of realization spaces Euclidean Distance Constraint Systems (EDCS), which includes Linkages and Frameworks. Each representation corresponds to a choice of Cayley parameters and yields a different parametrized configuration space. Significantly, we give purely graph-theoretic, forbidden minor characterizations that capture (i) the class of graphs that always admit efficient configuration spaces and (ii) the possible choices of representation parameters that yield efficient configuration spaces for a given graph. In addition, our results are tight: we show counterexamples to obvious extensions. This is the first step in a systematic and graded program of combinatorial characterizations of efficient configuration spaces. We discuss several future theoretical and applied research directions. Some of our proofs employ an unusual interplay of (a) classical analytic results related to positive semi-definiteness of Euclidean distance matrices, with (b) recent forbidden minor characterizations and algorithms related to the notion of d-realizability of EDCS. We further introduce a novel type of restricted edge contraction or reduction to a graph minor, a "trick" that we anticipate will be useful in other situations.
[ { "version": "v1", "created": "Tue, 23 Sep 2008 15:44:54 GMT" }, { "version": "v2", "created": "Mon, 29 Sep 2008 13:54:55 GMT" }, { "version": "v3", "created": "Sat, 11 Oct 2008 03:19:32 GMT" }, { "version": "v4", "created": "Fri, 24 Oct 2008 05:00:02 GMT" }, { "version": "v5", "created": "Thu, 6 Nov 2008 03:51:25 GMT" }, { "version": "v6", "created": "Sun, 22 Mar 2009 20:01:51 GMT" } ]
2009-03-22T00:00:00
[ [ "Sitharam", "Meera", "" ], [ "Gao", "Heping", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0809.3942
Philippe Hoogvorst
Philippe Hoogvorst, Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Danger, Taha Beyrouthy and Laurent Fesquet
A Reconfigurable Programmable Logic Block for a Multi-Style Asynchronous FPGA resistant to Side-Channel Attacks
29 pages
null
null
null
cs.CR cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Side-channel attacks are efficient attacks against cryptographic devices. They use only quantities observable from outside, such as the duration and the power consumption. Attacks against synchronous devices using electric observations are facilitated by the fact that all transitions occur simultaneously with some global clock signal. Asynchronous control remove this synchronization and therefore makes it more difficult for the attacker to insulate \emph{interesting intervals}. In addition the coding of data in an asynchronous circuit is inherently more difficult to attack. This article describes the Programmable Logic Block of an asynchronous FPGA resistant against \emph{side-channel attacks}. Additionally it can implement different styles of asynchronous control and of data representation.
[ { "version": "v1", "created": "Tue, 23 Sep 2008 15:27:06 GMT" } ]
2008-09-24T00:00:00
[ [ "Hoogvorst", "Philippe", "" ], [ "Guilley", "Sylvain", "" ], [ "Chaudhuri", "Sumanta", "" ], [ "Danger", "Jean-Luc", "" ], [ "Beyrouthy", "Taha", "" ], [ "Fesquet", "Laurent", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0809.3960
Jesper Bengtson Mr
Jesper Bengtson, Joachim Parrow
Formalising the pi-calculus using nominal logic
36 pages, 3 figures
Logical Methods in Computer Science, Volume 5, Issue 2 (June 30, 2009) lmcs:832
10.2168/LMCS-5(2:16)2009
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We formalise the pi-calculus using the nominal datatype package, based on ideas from the nominal logic by Pitts et al., and demonstrate an implementation in Isabelle/HOL. The purpose is to derive powerful induction rules for the semantics in order to conduct machine checkable proofs, closely following the intuitive arguments found in manual proofs. In this way we have covered many of the standard theorems of bisimulation equivalence and congruence, both late and early, and both strong and weak in a uniform manner. We thus provide one of the most extensive formalisations of a process calculus ever done inside a theorem prover. A significant gain in our formulation is that agents are identified up to alpha-equivalence, thereby greatly reducing the arguments about bound names. This is a normal strategy for manual proofs about the pi-calculus, but that kind of hand waving has previously been difficult to incorporate smoothly in an interactive theorem prover. We show how the nominal logic formalism and its support in Isabelle accomplishes this and thus significantly reduces the tedium of conducting completely formal proofs. This improves on previous work using weak higher order abstract syntax since we do not need extra assumptions to filter out exotic terms and can keep all arguments within a familiar first-order logic.
[ { "version": "v1", "created": "Tue, 23 Sep 2008 16:39:03 GMT" }, { "version": "v2", "created": "Tue, 30 Jun 2009 13:23:59 GMT" } ]
2015-07-01T00:00:00
[ [ "Bengtson", "Jesper", "" ], [ "Parrow", "Joachim", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0809.3994
Wolfgang Steiner
Wolfgang Steiner (LIAFA)
Regularities of the distribution of abstract van der Corput sequences
null
null
null
null
math.NT cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Similarly to $\beta$-adic van der Corput sequences, abstract van der Corput sequences can be defined for abstract numeration systems. Under some assumptions, these sequences are low discrepancy sequences. The discrepancy function is computed explicitely, and a characterization of bounded remainder sets of the form $[0,y)$ is provided.
[ { "version": "v1", "created": "Tue, 23 Sep 2008 19:34:12 GMT" }, { "version": "v2", "created": "Sat, 23 Jan 2010 06:25:29 GMT" } ]
2010-01-23T00:00:00
[ [ "Steiner", "Wolfgang", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0809.4017
Krishnendu Chatterjee
Krishnendu Chatterjee and Luca de Alfaro and Thomas A. Henzinger
Termination Criteria for Solving Concurrent Safety and Reachability Games
null
null
null
null
cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider concurrent games played on graphs. At every round of a game, each player simultaneously and independently selects a move; the moves jointly determine the transition to a successor state. Two basic objectives are the safety objective to stay forever in a given set of states, and its dual, the reachability objective to reach a given set of states. We present in this paper a strategy improvement algorithm for computing the value of a concurrent safety game, that is, the maximal probability with which player~1 can enforce the safety objective. The algorithm yields a sequence of player-1 strategies which ensure probabilities of winning that converge monotonically to the value of the safety game. Our result is significant because the strategy improvement algorithm provides, for the first time, a way to approximate the value of a concurrent safety game from below. Since a value iteration algorithm, or a strategy improvement algorithm for reachability games, can be used to approximate the same value from above, the combination of both algorithms yields a method for computing a converging sequence of upper and lower bounds for the values of concurrent reachability and safety games. Previous methods could approximate the values of these games only from one direction, and as no rates of convergence are known, they did not provide a practical way to solve these games.
[ { "version": "v1", "created": "Tue, 23 Sep 2008 20:29:37 GMT" } ]
2008-09-25T00:00:00
[ [ "Chatterjee", "Krishnendu", "" ], [ "de Alfaro", "Luca", "" ], [ "Henzinger", "Thomas A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0809.4019
Shengshan Cui
Shengshan Cui, Alexander M. Haimovich, Oren Somekh, H. Vincent Poor, Shlomo Shamai (Shitz)
Throughput Scaling of Wireless Networks With Random Connections
13 pages, 4 figures, To appear in IEEE Transactions on Information Theory
null
10.1109/ICC.2009.5199528
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work studies the throughput scaling laws of ad hoc wireless networks in the limit of a large number of nodes. A random connections model is assumed in which the channel connections between the nodes are drawn independently from a common distribution. Transmitting nodes are subject to an on-off strategy, and receiving nodes employ conventional single-user decoding. The following results are proven: 1) For a class of connection models with finite mean and variance, the throughput scaling is upper-bounded by $O(n^{1/3})$ for single-hop schemes, and $O(n^{1/2})$ for two-hop (and multihop) schemes. 2) The $\Theta (n^{1/2})$ throughput scaling is achievable for a specific connection model by a two-hop opportunistic relaying scheme, which employs full, but only local channel state information (CSI) at the receivers, and partial CSI at the transmitters. 3) By relaxing the constraints of finite mean and variance of the connection model, linear throughput scaling $\Theta (n)$ is achievable with Pareto-type fading models.
[ { "version": "v1", "created": "Tue, 23 Sep 2008 20:44:30 GMT" }, { "version": "v2", "created": "Sun, 25 Oct 2009 01:55:29 GMT" }, { "version": "v3", "created": "Mon, 22 Feb 2010 06:09:33 GMT" } ]
2016-11-18T00:00:00
[ [ "Cui", "Shengshan", "", "Shitz" ], [ "Haimovich", "Alexander M.", "", "Shitz" ], [ "Somekh", "Oren", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.4058
Hana Godrich
Hana Godrich, Alexander M. Haimovich, and Rick S. Blum
Target Localization Accuracy Gain in MIMO Radar Based Systems
36 pages, 5 figures, submitted to IEEE Transaction on Information Theory
null
10.1109/TIT.2010.2046246
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an analysis of target localization accuracy, attainable by the use of MIMO (Multiple-Input Multiple-Output) radar systems, configured with multiple transmit and receive sensors, widely distributed over a given area. The Cramer-Rao lower bound (CRLB) for target localization accuracy is developed for both coherent and non-coherent processing. Coherent processing requires a common phase reference for all transmit and receive sensors. The CRLB is shown to be inversely proportional to the signal effective bandwidth in the non-coherent case, but is approximately inversely proportional to the carrier frequency in the coherent case. We further prove that optimization over the sensors' positions lowers the CRLB by a factor equal to the product of the number of transmitting and receiving sensors. The best linear unbiased estimator (BLUE) is derived for the MIMO target localization problem. The BLUE's utility is in providing a closed form localization estimate that facilitates the analysis of the relations between sensors locations, target location, and localization accuracy. Geometric dilution of precision (GDOP) contours are used to map the relative performance accuracy for a given layout of radars over a given geographic area.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 18:52:57 GMT" } ]
2016-11-18T00:00:00
[ [ "Godrich", "Hana", "" ], [ "Haimovich", "Alexander M.", "" ], [ "Blum", "Rick S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.4059
Kilian Koepsell
Kilian Koepsell and Friedrich T. Sommer
Information transmission in oscillatory neural activity
18 pages, 8 figures, to appear in Biological Cybernetics
Biological Cybernetics (2008) 99:403-416
10.1007/s00422-008-0273-6
null
q-bio.NC cs.IT math.IT q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Periodic neural activity not locked to the stimulus or to motor responses is usually ignored. Here, we present new tools for modeling and quantifying the information transmission based on periodic neural activity that occurs with quasi-random phase relative to the stimulus. We propose a model to reproduce characteristic features of oscillatory spike trains, such as histograms of inter-spike intervals and phase locking of spikes to an oscillatory influence. The proposed model is based on an inhomogeneous Gamma process governed by a density function that is a product of the usual stimulus-dependent rate and a quasi-periodic function. Further, we present an analysis method generalizing the direct method (Rieke et al, 1999; Brenner et al, 2000) to assess the information content in such data. We demonstrate these tools on recordings from relay cells in the lateral geniculate nucleus of the cat.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 00:34:13 GMT" }, { "version": "v2", "created": "Tue, 7 Oct 2008 17:02:58 GMT" } ]
2008-12-05T00:00:00
[ [ "Koepsell", "Kilian", "" ], [ "Sommer", "Friedrich T.", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0809.4082
Vandy Berten
Vandy Berten and Jo\"el Goossens
Multiprocessor Global Scheduling on Frame-Based DVFS Systems
null
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this ongoing work, we are interested in multiprocessor energy efficient systems, where task durations are not known in advance, but are know stochastically. More precisely, we consider global scheduling algorithms for frame-based multiprocessor stochastic DVFS (Dynamic Voltage and Frequency Scaling) systems. Moreover, we consider processors with a discrete set of available frequencies.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 06:10:39 GMT" } ]
2008-09-25T00:00:00
[ [ "Berten", "Vandy", "" ], [ "Goossens", "Joël", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0809.4086
Valentino Crespi
George Cybenko and Valentino Crespi
Learning Hidden Markov Models using Non-Negative Matrix Factorization
Submitted to IEEE Transactions on Information Theory in September 2008
null
null
null
cs.LG cs.AI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Baum-Welsh algorithm together with its derivatives and variations has been the main technique for learning Hidden Markov Models (HMM) from observational data. We present an HMM learning algorithm based on the non-negative matrix factorization (NMF) of higher order Markovian statistics that is structurally different from the Baum-Welsh and its associated approaches. The described algorithm supports estimation of the number of recurrent states of an HMM and iterates the non-negative matrix factorization (NMF) algorithm to improve the learned HMM parameters. Numerical examples are provided as well.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 05:34:56 GMT" }, { "version": "v2", "created": "Sat, 8 Jan 2011 03:16:39 GMT" } ]
2011-01-11T00:00:00
[ [ "Cybenko", "George", "" ], [ "Crespi", "Valentino", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.4093
Ignacio Vega-Paez M en C
Ignacio Vega-Paez, Jose Angel Ortega, Georgina G. Pulido
Perspective Drawing of Surfaces with Line Hidden Line Elimination, Dibujando Superficies En Perspectiva Con Eliminacion De Lineas Ocultas
null
Proceedings in Technical Memory, XI Congreso Nacional de Ingenieria Electromecanica y de Sistemas, pp. 136-144, Mexico, DF., Nov 2009
null
IBP-TR2008-08
cs.GR cs.CG
http://creativecommons.org/licenses/by/3.0/
An efficient computer algorithm is described for the perspective drawing of a wide class of surfaces. The class includes surfaces corresponding lo single-valued, continuous functions which are defined over rectangular domains. The algorithm automatically computes and eliminates hidden lines. The number of computations in the algorithm grows linearly with the number of sample points on the surface to be drawn. An analysis of the algorithm is presented, and extensions lo certain multi-valued functions are indicated. The algorithm is implemented and tested on .Net 2.0 platform that left interactive use. Running times are found lo be exceedingly efficient for visualization, where interaction on-line and view-point control, enables effective and rapid examination of a surfaces from many perspectives.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 05:50:56 GMT" }, { "version": "v2", "created": "Wed, 27 Jul 2011 23:29:19 GMT" } ]
2011-07-29T00:00:00
[ [ "Vega-Paez", "Ignacio", "" ], [ "Ortega", "Jose Angel", "" ], [ "Pulido", "Georgina G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0809.4101
Lan Zhang
Lan Zhang, Rui Zhang, Ying-Chang Liang, Yan Xin, H. Vincent Poor
On Gaussian MIMO BC-MAC Duality With Multiple Transmit Covariance Constraints
36 pages, 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Owing to the structure of the Gaussian multiple-input multiple-output (MIMO) broadcast channel (BC), associated optimization problems such as capacity region computation and beamforming optimization are typically non-convex, and cannot be solved directly. One feasible approach to these problems is to transform them into their dual multiple access channel (MAC) problems, which are easier to deal with due to their convexity properties. The conventional BC-MAC duality is established via BC-MAC signal transformation, and has been successfully applied to solve beamforming optimization, signal-to-interference-plus-noise ratio (SINR) balancing, and capacity region computation. However, this conventional duality approach is applicable only to the case, in which the base station (BS) of the BC is subject to a single sum power constraint. An alternative approach is minimax duality, established by Yu in the framework of Lagrange duality, which can be applied to solve the per-antenna power constraint problem. This paper extends the conventional BC-MAC duality to the general linear constraint case, and thereby establishes a general BC-MAC duality. This new duality is applied to solve the capacity computation and beamforming optimization for the MIMO and multiple-input single-output (MISO) BC, respectively, with multiple linear constraints. Moreover, the relationship between this new general BC-MAC duality and minimax duality is also presented. It is shown that the general BC-MAC duality offers more flexibility in solving BC optimization problems relative to minimax duality. Numerical results are provided to illustrate the effectiveness of the proposed algorithms.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 06:32:11 GMT" } ]
2008-09-25T00:00:00
[ [ "Zhang", "Lan", "" ], [ "Zhang", "Rui", "" ], [ "Liang", "Ying-Chang", "" ], [ "Xin", "Yan", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.4107
Karama Kanoun
Jean-Claude Laprie (LAAS), Karama Kanoun (LAAS), Mohamed Kaaniche (LAAS)
Modelling interdependencies between the electricity and information infrastructures
null
26th International Conference on Computer Safety, Reliability and Security, SAFECOMP-2007, Nurenberg : Allemagne (2007)
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this paper is to provide qualitative models characterizing interdependencies related failures of two critical infrastructures: the electricity infrastructure and the associated information infrastructure. The interdependencies of these two infrastructures are increasing due to a growing connection of the power grid networks to the global information infrastructure, as a consequence of market deregulation and opening. These interdependencies increase the risk of failures. We focus on cascading, escalating and common-cause failures, which correspond to the main causes of failures due to interdependencies. We address failures in the electricity infrastructure, in combination with accidental failures in the information infrastructure, then we show briefly how malicious attacks in the information infrastructure can be addressed.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 07:26:09 GMT" } ]
2010-01-10T00:00:00
[ [ "Laprie", "Jean-Claude", "", "LAAS" ], [ "Kanoun", "Karama", "", "LAAS" ], [ "Kaaniche", "Mohamed", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0809.4108
Karama Kanoun
Ana E. Rugina (LAAS), Karama Kanoun (LAAS), Mohamed Kaaniche (LAAS)
The ADAPT Tool: From AADL Architectural Models to Stochastic Petri Nets through Model Transformation
6 pages
7th European Dependable Computing Conference (EDCC), Kaunas : Lituanie (2008)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ADAPT is a tool that aims at easing the task of evaluating dependability measures in the context of modern model driven engineering processes based on AADL (Architecture Analysis and Design Language). Hence, its input is an AADL architectural model annotated with dependability-related information. Its output is a dependability evaluation model in the form of a Generalized Stochastic Petri Net (GSPN). The latter can be processed by existing dependability evaluation tools, to compute quantitative measures such as reliability, availability, etc.. ADAPT interfaces OSATE (the Open Source AADL Tool Environment) on the AADL side and SURF-2, on the dependability evaluation side. In addition, ADAPT provides the GSPN in XML/XMI format, which represents a gateway to other dependability evaluation tools, as the processing techniques for XML files allow it to be easily converted to a tool-specific GSPN.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 07:26:30 GMT" } ]
2008-09-25T00:00:00
[ [ "Rugina", "Ana E.", "", "LAAS" ], [ "Kanoun", "Karama", "", "LAAS" ], [ "Kaaniche", "Mohamed", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0809.4109
Karama Kanoun
Ana-Elena Rugina (LAAS), Peter H. Feiler (CMU-SEI), Karama Kanoun (LAAS), Mohamed Kaaniche (LAAS)
Software dependability modeling using an industry-standard architecture description language
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Performing dependability evaluation along with other analyses at architectural level allows both making architectural tradeoffs and predicting the effects of architectural decisions on the dependability of an application. This paper gives guidelines for building architectural dependability models for software systems using the AADL (Architecture Analysis and Design Language). It presents reusable modeling patterns for fault-tolerant applications and shows how the presented patterns can be used in the context of a subsystem of a real-life application.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 07:26:34 GMT" } ]
2008-09-25T00:00:00
[ [ "Rugina", "Ana-Elena", "", "LAAS" ], [ "Feiler", "Peter H.", "", "CMU-SEI" ], [ "Kanoun", "Karama", "", "LAAS" ], [ "Kaaniche", "Mohamed", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0809.4115
Paolo Baldan
Paolo Baldan, Andrea Corradini, Hartmut Ehrig, Reiko Heckel, Barbara K\"onig
Bisimilarity and Behaviour-Preserving Reconfigurations of Open Petri Nets
To appear in "Logical Methods in Computer Science", 41 pages
Logical Methods in Computer Science, Volume 4, Issue 4 (October 21, 2008) lmcs:1165
10.2168/LMCS-4(4:3)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a framework for the specification of behaviour-preserving reconfigurations of systems modelled as Petri nets. The framework is based on open nets, a mild generalisation of ordinary Place/Transition nets suited to model open systems which might interact with the surrounding environment and endowed with a colimit-based composition operation. We show that natural notions of bisimilarity over open nets are congruences with respect to the composition operation. The considered behavioural equivalences differ for the choice of the observations, which can be single firings or parallel steps. Additionally, we consider weak forms of such equivalences, arising in the presence of unobservable actions. We also provide an up-to technique for facilitating bisimilarity proofs. The theory is used to identify suitable classes of reconfiguration rules (in the double-pushout approach to rewriting) whose application preserves the observational semantics of the net.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 09:28:18 GMT" }, { "version": "v2", "created": "Tue, 21 Oct 2008 21:29:11 GMT" } ]
2015-07-01T00:00:00
[ [ "Baldan", "Paolo", "" ], [ "Corradini", "Andrea", "" ], [ "Ehrig", "Hartmut", "" ], [ "Heckel", "Reiko", "" ], [ "König", "Barbara", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0809.4149
Hossein Bahramgiri
Hossein Bahramgiri and Farshad Lahouti
Block Network Error Control Codes and Syndrome-based Complete Maximum Likelihood Decoding
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, network error control coding is studied for robust and efficient multicast in a directed acyclic network with imperfect links. The block network error control coding framework, BNEC, is presented and the capability of the scheme to correct a mixture of symbol errors and packet erasures and to detect symbol errors is studied. The idea of syndrome-based decoding and error detection is introduced for BNEC, which removes the effect of input data and hence decreases the complexity. Next, an efficient three-stage syndrome-based BNEC decoding scheme for network error correction is proposed, in which prior to finding the error values, the position of the edge errors are identified based on the error spaces at the receivers. In addition to bounded-distance decoding schemes for error correction up to the refined Singleton bound, a complete decoding scheme for BNEC is also introduced. Specifically, it is shown that using the proposed syndrome-based complete decoding, a network error correcting code with redundancy order d for receiver t, can correct d-1 random additive errors with a probability sufficiently close to 1, if the field size is sufficiently large. Also, a complete maximum likelihood decoding scheme for BNEC is proposed. As the probability of error in different network edges is not equal in general, and given the equivalency of certain edge errors within the network at a particular receiver, the number of edge errors, assessed in the refined Singleton bound, is not a sufficient statistic for ML decoding.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 10:38:22 GMT" } ]
2008-09-25T00:00:00
[ [ "Bahramgiri", "Hossein", "" ], [ "Lahouti", "Farshad", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.4183
Aslan Tchamkerten
Gildas Avoine and Aslan Tchamkerten
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
10 pages
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate prover. We present an authentication protocol suited for RFID systems. Our solution is the first that prevents relay attacks without degrading the authentication security level: it minimizes the probability that the verifier accepts a fake proof of identity, whether or not a relay attack occurs.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 13:27:43 GMT" } ]
2008-09-25T00:00:00
[ [ "Avoine", "Gildas", "" ], [ "Tchamkerten", "Aslan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.4194
Benedek Kov\'acs
Benedek Kovacs
Rate based call gapping with priorities and fairness between traffic classes
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new rate based call gapping method. The main advantage is that it provides maximal throughput, priority handling and fairness for traffic classes without queues, unlike Token Bucket which provides only the first two or Weighted Fair Queuing that uses queues. The Token Bucket is used for call gapping because it has good throughput characteristics. For this reason we present a mixture of the two methods keeping the good properties of both. A mathematical model has been developed to support our proposal. It defines the three requirements and proves theorems about if they are satisfied with the different call gapping mechanisms. Simulation, numerical results and statistical discussion are also presented to underpin the findings.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 14:09:54 GMT" }, { "version": "v2", "created": "Mon, 8 Dec 2008 09:02:04 GMT" } ]
2008-12-08T00:00:00
[ [ "Kovacs", "Benedek", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.4296
Ueli Rutishauser
Ueli Rutishauser, Rodney J. Douglas
State dependent computation using coupled recurrent networks
32 pages, 10 figures. Neural computation (in press)
Neural computation, 21(2):478-509, 2009
10.1162/neco.2008.03-08-734
null
q-bio.NC cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although conditional branching between possible behavioural states is a hallmark of intelligent behavior, very little is known about the neuronal mechanisms that support this processing. In a step toward solving this problem we demonstrate by theoretical analysis and simulation how networks of richly inter-connected neurons, such as those observed in the superficial layers of the neocortex, can embed reliable robust finite state machines. We show how a multi-stable neuronal network containing a number of states can be created very simply, by coupling two recurrent networks whose synaptic weights have been configured for soft winner-take-all (sWTA) performance. These two sWTAs have simple, homogenous locally recurrent connectivity except for a small fraction of recurrent cross-connections between them, which are used to embed the required states. This coupling between the maps allows the network to continue to express the current state even after the input that elicted that state is withdrawn. In addition, a small number of 'transition neurons' implement the necessary input-driven transitions between the embedded states. We provide simple rules to systematically design and construct neuronal state machines of this kind. The significance of our finding is that it offers a method whereby the cortex could construct networks supporting a broad range of sophisticated processing by applying only small specializations to the same generic neuronal circuit.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 22:52:05 GMT" } ]
2012-01-16T00:00:00
[ [ "Rutishauser", "Ueli", "" ], [ "Douglas", "Rodney J.", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0809.4316
Sriram Sridharan
Sriram Sridharan, Amin Jafarian, Sriram Vishwanath, Syed A. Jafar and Shlomo Shamai (Shitz)
A Layered Lattice Coding Scheme for a Class of Three User Gaussian Interference Channels
8 pages, 4 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper studies a class of three user Gaussian interference channels. A new layered lattice coding scheme is introduced as a transmission strategy. The use of lattice codes allows for an "alignment" of the interference observed at each receiver. The layered lattice coding is shown to achieve more than one degree of freedom for a class of interference channels and also achieves rates which are better than the rates obtained using the Han-Kobayashi coding scheme.
[ { "version": "v1", "created": "Thu, 25 Sep 2008 03:58:43 GMT" } ]
2008-09-26T00:00:00
[ [ "Sridharan", "Sriram", "", "Shitz" ], [ "Jafarian", "Amin", "", "Shitz" ], [ "Vishwanath", "Sriram", "", "Shitz" ], [ "Jafar", "Syed A.", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.4317
Byung-Soo Choi
Byung-Soo Choi and Rodney Van Meter
On the Effect of Quantum Interaction Distance on Quantum Addition Circuits
accepted for ACM Journal on Emerging Technologies in Computing Systems
null
10.1145/2000502.2000504
null
quant-ph cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the theoretical limits of the effect of the quantum interaction distance on the speed of exact quantum addition circuits. For this study, we exploit graph embedding for quantum circuit analysis. We study a logical mapping of qubits and gates of any $\Omega(\log n)$-depth quantum adder circuit for two $n$-qubit registers onto a practical architecture, which limits interaction distance to the nearest neighbors only and supports only one- and two-qubit logical gates. Unfortunately, on the chosen $k$-dimensional practical architecture, we prove that the depth lower bound of any exact quantum addition circuits is no longer $\Omega(\log {n})$, but $\Omega(\sqrt[k]{n})$. This result, the first application of graph embedding to quantum circuits and devices, provides a new tool for compiler development, emphasizes the impact of quantum computer architecture on performance, and acts as a cautionary note when evaluating the time performance of quantum algorithms.
[ { "version": "v1", "created": "Thu, 25 Sep 2008 03:59:24 GMT" }, { "version": "v2", "created": "Fri, 27 Mar 2009 06:32:00 GMT" }, { "version": "v3", "created": "Thu, 20 May 2010 22:15:27 GMT" }, { "version": "v4", "created": "Thu, 23 Dec 2010 14:43:34 GMT" }, { "version": "v5", "created": "Fri, 24 Dec 2010 02:55:11 GMT" } ]
2012-09-17T00:00:00
[ [ "Choi", "Byung-Soo", "" ], [ "Van Meter", "Rodney", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0809.4325
Liangping Ma
Liangping Ma
On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The first result is on the separability of the unicast capacity of stationary multi-channel multi-radio wireless networks, i.e., whether the capacity of such a network is equal to the sum of the capacities of the corresponding single-channel single-radio wireless networks. For both the Arbitrary Network model and the Random Network model, given a channel assignment, the separability property does not always hold. However, if the number of radio interfaces at each node is equal to the number of channels, the separability property holds. The second result is on the impact of multi-channel routing (i.e., routing a bit through multiple channels as opposed to through a single channel) on the network capacity. For both network models, the network capacities conditioned on a channel assignment under the two routing schemes are not always equal, but if again the number of radio interfaces at each node is equal to the number of channels, the two routing schemes yield equal network capacities.
[ { "version": "v1", "created": "Thu, 25 Sep 2008 06:17:08 GMT" }, { "version": "v2", "created": "Sat, 26 Dec 2009 16:44:59 GMT" } ]
2009-12-26T00:00:00
[ [ "Ma", "Liangping", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.4326
Vishwanath Raman
Krishnendu Chatterjee (Institute of Science and Technology, Vienna, Austria), Luca de Alfaro (University of California, Santa Cruz, USA), Rupak Majumdar (University of California, Los Angeles, USA), Vishwanath Raman (University of California, Santa Cruz, USA)
Algorithms for Game Metrics
27 pages. Full version of the paper accepted at FSTTCS 2008
Logical Methods in Computer Science, Volume 6, Issue 3 (September 1, 2010) lmcs:783
10.2168/LMCS-6(3:13)2010
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simulation and bisimulation metrics for stochastic systems provide a quantitative generalization of the classical simulation and bisimulation relations. These metrics capture the similarity of states with respect to quantitative specifications written in the quantitative {\mu}-calculus and related probabilistic logics. We first show that the metrics provide a bound for the difference in long-run average and discounted average behavior across states, indicating that the metrics can be used both in system verification, and in performance evaluation. For turn-based games and MDPs, we provide a polynomial-time algorithm for the computation of the one-step metric distance between states. The algorithm is based on linear programming; it improves on the previous known exponential-time algorithm based on a reduction to the theory of reals. We then present PSPACE algorithms for both the decision problem and the problem of approximating the metric distance between two states, matching the best known algorithms for Markov chains. For the bisimulation kernel of the metric our algorithm works in time O(n^4) for both turn-based games and MDPs; improving the previously best known O(n^9\cdot log(n)) time algorithm for MDPs. For a concurrent game G, we show that computing the exact distance between states is at least as hard as computing the value of concurrent reachability games and the square-root-sum problem in computational geometry. We show that checking whether the metric distance is bounded by a rational r, can be done via a reduction to the theory of real closed fields, involving a formula with three quantifier alternations, yielding O(|G|^O(|G|^5)) time complexity, improving the previously known reduction, which yielded O(|G|^O(|G|^7)) time complexity. These algorithms can be iterated to approximate the metrics using binary search.
[ { "version": "v1", "created": "Thu, 25 Sep 2008 06:32:48 GMT" }, { "version": "v2", "created": "Thu, 9 Oct 2008 16:48:06 GMT" }, { "version": "v3", "created": "Wed, 30 Jun 2010 05:19:07 GMT" }, { "version": "v4", "created": "Wed, 1 Sep 2010 15:18:29 GMT" } ]
2015-07-01T00:00:00
[ [ "Chatterjee", "Krishnendu", "", "Institute of Science and Technology, Vienna,\n Austria" ], [ "de Alfaro", "Luca", "", "University of California, Santa Cruz, USA" ], [ "Majumdar", "Rupak", "", "University of California, Los Angeles, USA" ], [ "Raman", "Vishwanath", "", "University of California, Santa Cruz, USA" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0809.4332
Haijun Zhou
Kang Li, Hui Ma, and Haijun Zhou
From one solution of a 3-satisfiability formula to a solution cluster: Frozen variables and entropy
13 pages, 6 figures. Final version as published in PRE
Physical Review E 79, 031102 (2009)
10.1103/PhysRevE.79.031102
null
cond-mat.dis-nn cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A solution to a 3-satisfiability (3-SAT) formula can be expanded into a cluster, all other solutions of which are reachable from this one through a sequence of single-spin flips. Some variables in the solution cluster are frozen to the same spin values by one of two different mechanisms: frozen-core formation and long-range frustrations. While frozen cores are identified by a local whitening algorithm, long-range frustrations are very difficult to trace, and they make an entropic belief-propagation (BP) algorithm fail to converge. For BP to reach a fixed point the spin values of a tiny fraction of variables (chosen according to the whitening algorithm) are externally fixed during the iteration. From the calculated entropy values, we infer that, for a large random 3-SAT formula with constraint density close to the satisfiability threshold, the solutions obtained by the survey-propagation or the walksat algorithm belong neither to the most dominating clusters of the formula nor to the most abundant clusters. This work indicates that a single solution cluster of a random 3-SAT formula may have further community structures.
[ { "version": "v1", "created": "Thu, 25 Sep 2008 07:50:22 GMT" }, { "version": "v2", "created": "Wed, 29 Oct 2008 13:45:50 GMT" }, { "version": "v3", "created": "Tue, 17 Mar 2009 06:15:38 GMT" } ]
2009-03-17T00:00:00
[ [ "Li", "Kang", "" ], [ "Ma", "Hui", "" ], [ "Zhou", "Haijun", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0809.4342
Caihong Kai
Caihong Kai, Soung Chang Liew
Towards a More Accurate Carrier Sensing Model for CSMA Wireless Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work calls into question a substantial body of past work on CSMA wireless networks. In the majority of studies on CSMA wireless networks, a contention graph is used to model the carrier sensing relationships (CS) among links. This is a 0-1 model in which two links can either sense each other completely or not. In real experiments, we observed that this is generally not the case: the CS relationship between the links are often probabilistic and can vary dynamically over time. This is the case even if the distance between the links is fixed and there is no drastic change in the environment. Furthermore, this partial carrier sensing relationship is prevalent and occurs over a wide range of distances between the links. This observation is not consistent with the 0-1 contention graph and implies that many results and conclusions drawn from previous theoretical studies need to be re-examined. This paper establishes a more accurate CS model with the objective of laying down a foundation for future theoretical studies that reflect reality. Towards that end, we set up detailed experiments to investigate the partial carrier sensing phenomenon. We discuss the implications and the use of our partial carrier sensing model in network analysis.
[ { "version": "v1", "created": "Thu, 25 Sep 2008 08:55:26 GMT" } ]
2008-09-26T00:00:00
[ [ "Kai", "Caihong", "" ], [ "Liew", "Soung Chang", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.4395
Rudi Ball
Rudi Ball
Content Sharing for Mobile Devices
98 page, Masters Dissertation, 64 figures, September 2007
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The miniaturisation of computing devices has seen computing devices become increasingly pervasive in society. With this increased pervasiveness, the technologies of small computing devices have also improved. Mobile devices are now capable of capturing various forms of multimedia and able to communicate wirelessly using increasing numbers of communication techniques. The owners and creators of local content are motivated to share this content in ever increasing volume; the conclusion has been that social networks sites are seeing a revolution in the sharing of information between communities of people. As load on centralised systems increases, we present a novel decentralised peer-to-peer approach dubbed the Market Contact Protocol (MCP) to achieve cost effective, scalable and efficient content sharing using opportunistic networking (pocket switched networking), incentive, context-awareness, social contact and mobile devices. Within the report we describe how the MCP is simulated with a superimposed geographic framework on top of the JiST (Java in Simulation Time) framework to evaluate and measure its capability to share content between massively mobile peers. The MCP is shown in conclusion to be a powerful means by which to share content in a massively mobile ad-hoc environment.
[ { "version": "v1", "created": "Thu, 25 Sep 2008 12:58:40 GMT" } ]
2008-09-26T00:00:00
[ [ "Ball", "Rudi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.4398
Philipp Schuetz
Philipp Schuetz, Amedeo Caflisch
Multistep greedy algorithm identifies community structure in real-world and computer-generated networks
17 pages, 2 figures
Phys. Rev. E 78, 026112 (2008)
10.1103/PhysRevE.78.026112
null
cs.DS cond-mat.dis-nn physics.soc-ph q-bio.MN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have recently introduced a multistep extension of the greedy algorithm for modularity optimization. The extension is based on the idea that merging l pairs of communities (l>1) at each iteration prevents premature condensation into few large communities. Here, an empirical formula is presented for the choice of the step width l that generates partitions with (close to) optimal modularity for 17 real-world and 1100 computer-generated networks. Furthermore, an in-depth analysis of the communities of two real-world networks (the metabolic network of the bacterium E. coli and the graph of coappearing words in the titles of papers coauthored by Martin Karplus) provides evidence that the partition obtained by the multistep greedy algorithm is superior to the one generated by the original greedy algorithm not only with respect to modularity but also according to objective criteria. In other words, the multistep extension of the greedy algorithm reduces the danger of getting trapped in local optima of modularity and generates more reasonable partitions.
[ { "version": "v1", "created": "Thu, 25 Sep 2008 13:46:30 GMT" } ]
2008-09-26T00:00:00
[ [ "Schuetz", "Philipp", "" ], [ "Caflisch", "Amedeo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0809.4484
Lane A. Hemaspaandra
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg Rothe
Llull and Copeland Voting Computationally Resist Bribery and Control
This 2008/9/28 version is the same as both the 2008/9/25 version at arxiv.org and the 2008/9/25 revision of URCS TR-2008-933, except the present version corrects a minor typo in the penultimate paragraph of Section 3
null
null
URCS-TR-2008-933
cs.GT cs.CC cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The only systems previously known to be resistant to all the standard control types were highly artificial election systems created by hybridization. We study a parameterized version of Copeland voting, denoted by Copeland^\alpha, where the parameter \alpha is a rational number between 0 and 1 that specifies how ties are valued in the pairwise comparisons of candidates. We prove that Copeland^{0.5}, the system commonly referred to as "Copeland voting," provides full resistance to constructive control, and we prove the same for Copeland^\alpha, for all rational \alpha, 0 < \alpha < 1. Copeland voting is the first natural election system proven to have full resistance to constructive control. We also prove that both Copeland^1 (Llull elections) and Copeland^0 are resistant to all standard types of constructive control other than one variant of addition of candidates. Moreover, we show that for each rational \alpha, 0 \leq \alpha \leq 1, Copeland^\alpha voting is fully resistant to bribery attacks, and we establish fixed-parameter tractability of bounded-case control for Copeland^\alpha. We also study Copeland^\alpha elections under more flexible models such as microbribery and extended control and we integrate the potential irrationality of voter preferences into many of our results.
[ { "version": "v1", "created": "Thu, 25 Sep 2008 19:49:38 GMT" }, { "version": "v2", "created": "Sun, 28 Sep 2008 04:25:35 GMT" } ]
2008-09-29T00:00:00
[ [ "Faliszewski", "Piotr", "" ], [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0809.4501
Guoshen Yu
Guoshen Yu, Jean-Jacques Slotine
Audio Classification from Time-Frequency Texture
null
null
null
null
cs.CV cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time-frequency representations of audio signals often resemble texture images. This paper derives a simple audio classification algorithm based on treating sound spectrograms as texture images. The algorithm is inspired by an earlier visual classification scheme particularly efficient at classifying textures. While solely based on time-frequency texture features, the algorithm achieves surprisingly good performance in musical instrument classification experiments.
[ { "version": "v1", "created": "Thu, 25 Sep 2008 20:54:29 GMT" } ]
2008-09-29T00:00:00
[ [ "Yu", "Guoshen", "" ], [ "Slotine", "Jean-Jacques", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
0809.4529
Wing-Kin Ma
Wing-Kin Ma, Chao-Cheng Su, Joakim Jalden, Tsung-Hui Chang, and Chong-Yung Chi
The Equivalence of Semidefinite Relaxation MIMO Detectors for Higher-Order QAM
Submitted to IEEE Journal of Selected Topics in Signal Processing, Aug 2008
null
10.1109/JSTSP.2009.2035798
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In multi-input-multi-output (MIMO) detection, semidefinite relaxation (SDR) has been shown to be an efficient high-performance approach. Developed initially for BPSK and QPSK, SDR has been found to be capable of providing near-optimal performance (for those constellations). This has stimulated a number of recent research endeavors that aim to apply SDR to the high-order QAM cases. These independently developed SDRs are different in concept and structure, and presently no serious analysis has been given to compare these methods. This paper analyzes the relationship of three such SDR methods, namely the polynomial-inspired SDR (PI-SDR) by Wiesel et al., the bound-constrained SDR (BC-SDR) by Sidiropoulos and Luo, and the virtually-antipodal SDR (VA-SDR) by Mao et al. The result that we have proven is somehow unexpected: the three SDRs are equivalent. Simply speaking, we show that solving any one SDR is equivalent to solving the other SDRs. This paper also discusses some implications arising from the SDR equivalence, and provides simulation results to verify our theoretical findings.
[ { "version": "v1", "created": "Fri, 26 Sep 2008 04:16:33 GMT" } ]
2015-05-13T00:00:00
[ [ "Ma", "Wing-Kin", "" ], [ "Su", "Chao-Cheng", "" ], [ "Jalden", "Joakim", "" ], [ "Chang", "Tsung-Hui", "" ], [ "Chi", "Chong-Yung", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0809.4530
Olena Medelyan
Olena Medelyan, David Milne, Catherine Legg and Ian H. Witten
Mining Meaning from Wikipedia
An extensive survey of re-using information in Wikipedia in natural language processing, information retrieval and extraction and ontology building. Accepted for publication in International Journal of Human-Computer Studies
null
null
ISSN 1177-777X
cs.AI cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wikipedia is a goldmine of information; not just for its many readers, but also for the growing community of researchers who recognize it as a resource of exceptional scale and utility. It represents a vast investment of manual effort and judgment: a huge, constantly evolving tapestry of concepts and relations that is being applied to a host of tasks. This article provides a comprehensive description of this work. It focuses on research that extracts and makes use of the concepts, relations, facts and descriptions found in Wikipedia, and organizes the work into four broad categories: applying Wikipedia to natural language processing; using it to facilitate information retrieval and information extraction; and as a resource for ontology building. The article addresses how Wikipedia is being used as is, how it is being improved and adapted, and how it is being combined with other structures to create entirely new resources. We identify the research groups and individuals involved, and how their work has developed in the last few years. We provide a comprehensive list of the open-source software they have produced.
[ { "version": "v1", "created": "Fri, 26 Sep 2008 04:47:19 GMT" }, { "version": "v2", "created": "Sun, 10 May 2009 01:51:15 GMT" } ]
2009-05-10T00:00:00
[ [ "Medelyan", "Olena", "" ], [ "Milne", "David", "" ], [ "Legg", "Catherine", "" ], [ "Witten", "Ian H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0809.4576
Emmanuel Lochin
Jerome Lacan and Emmanuel Lochin
On-the-Fly Coding to Enable Full Reliability Without Retransmission
9 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a new reliability algorithm specifically useful when retransmission is either problematic or not possible. In case of multimedia or multicast communications and in the context of the Delay Tolerant Networking (DTN), the classical retransmission schemes can be counterproductive in terms of data transfer performance or not possible when the acknowledgment path is not always available. Indeed, over long delay links, packets retransmission has a meaning of cost and must be minimized.In this paper, we detail a novel reliability mechanism with an implicit acknowledgment strategy that could be used either within these new DTN proposals, for multimedia traffic or in the context of multicast transport protocols. This proposal is based on a new on-the-fly erasure coding concept specifically designed to operate efficient reliable transfer over bi-directional links. This proposal, named Tetrys, allows to unify a full reliability with an error correction scheme. In this paper, we model the performance of this proposal and demonstrate with a prototype, that we can achieve a full reliability without acknowledgment path confirmation. Indeed, the main findings are that Tetrys is not sensitive to the loss of acknowledgments while ensuring a faster data availability to the application compared to other traditional acknowledgment schemes. Finally, we pave the first step of the integration of such algorithm inside a congestion controlled protocol.
[ { "version": "v1", "created": "Fri, 26 Sep 2008 09:41:26 GMT" } ]
2008-09-29T00:00:00
[ [ "Lacan", "Jerome", "" ], [ "Lochin", "Emmanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.4577
Jiajin Yu
Mordecai Golin, Xiaoming Xu and Jiajin Yu
A Generic Top-Down Dynamic-Programming Approach to Prefix-Free Coding
null
null
null
null
cs.DS cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a probability distribution over a set of n words to be transmitted, the Huffman Coding problem is to find a minimal-cost prefix free code for transmitting those words. The basic Huffman coding problem can be solved in O(n log n) time but variations are more difficult. One of the standard techniques for solving these variations utilizes a top-down dynamic programming approach. In this paper we show that this approach is amenable to dynamic programming speedup techniques, permitting a speedup of an order of magnitude for many algorithms in the literature for such variations as mixed radix, reserved length and one-ended coding. These speedups are immediate implications of a general structural property that permits batching together the calculation of many DP entries.
[ { "version": "v1", "created": "Fri, 26 Sep 2008 09:42:04 GMT" } ]
2008-09-29T00:00:00
[ [ "Golin", "Mordecai", "" ], [ "Xu", "Xiaoming", "" ], [ "Yu", "Jiajin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.4582
Emilia Oikarinen
Emilia Oikarinen, Tomi Janhunen
Achieving compositionality of the stable model semantics for Smodels programs
44 pages, 2 tables
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a Gaifman-Shapiro-style module architecture is tailored to the case of Smodels programs under the stable model semantics. The composition of Smodels program modules is suitably limited by module conditions which ensure the compatibility of the module system with stable models. Hence the semantics of an entire Smodels program depends directly on stable models assigned to its modules. This result is formalized as a module theorem which truly strengthens Lifschitz and Turner's splitting-set theorem for the class of Smodels programs. To streamline generalizations in the future, the module theorem is first proved for normal programs and then extended to cover Smodels programs using a translation from the latter class of programs to the former class. Moreover, the respective notion of module-level equivalence, namely modular equivalence, is shown to be a proper congruence relation: it is preserved under substitutions of modules that are modularly equivalent. Principles for program decomposition are also addressed. The strongly connected components of the respective dependency graph can be exploited in order to extract a module structure when there is no explicit a priori knowledge about the modules of a program. The paper includes a practical demonstration of tools that have been developed for automated (de)composition of Smodels programs. To appear in Theory and Practice of Logic Programming.
[ { "version": "v1", "created": "Fri, 26 Sep 2008 10:32:32 GMT" } ]
2008-09-29T00:00:00
[ [ "Oikarinen", "Emilia", "" ], [ "Janhunen", "Tomi", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0809.4622
Jeremy Fix
J\'er\'emy Fix (INRIA Lorraine - Loria), Nicolas P. Rougier (INRIA Lorraine - Loria, University of Colorado, Boulder), Fr\'ed\'eric Alexandre (INRIA Lorraine - Loria)
A computational approach to the covert and overt deployment of spatial attention
null
Dans NeuroComp 2008 : 2i\`eme Conf\'erence Fran\c{c}aise de Neurosciences Computationnelles (2008)
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Popular computational models of visual attention tend to neglect the influence of saccadic eye movements whereas it has been shown that the primates perform on average three of them per seconds and that the neural substrate for the deployment of attention and the execution of an eye movement might considerably overlap. Here we propose a computational model in which the deployment of attention with or without a subsequent eye movement emerges from local, distributed and numerical computations.
[ { "version": "v1", "created": "Fri, 26 Sep 2008 13:12:36 GMT" } ]
2008-09-29T00:00:00
[ [ "Fix", "Jérémy", "", "INRIA Lorraine - Loria" ], [ "Rougier", "Nicolas P.", "", "INRIA\n Lorraine - Loria, University of Colorado, Boulder" ], [ "Alexandre", "Frédéric", "", "INRIA Lorraine - Loria" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0809.4632
Sriharsha Veeramachaneni
Sriharsha Veeramachaneni and Ravikumar Kondadadi
Surrogate Learning - An Approach for Semi-Supervised Classification
8 pages, 2 figures
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the task of learning a classifier from the feature space $\mathcal{X}$ to the set of classes $\mathcal{Y} = \{0, 1\}$, when the features can be partitioned into class-conditionally independent feature sets $\mathcal{X}_1$ and $\mathcal{X}_2$. We show the surprising fact that the class-conditional independence can be used to represent the original learning task in terms of 1) learning a classifier from $\mathcal{X}_2$ to $\mathcal{X}_1$ and 2) learning the class-conditional distribution of the feature set $\mathcal{X}_1$. This fact can be exploited for semi-supervised learning because the former task can be accomplished purely from unlabeled samples. We present experimental evaluation of the idea in two real world applications.
[ { "version": "v1", "created": "Fri, 26 Sep 2008 13:47:36 GMT" } ]
2008-09-29T00:00:00
[ [ "Veeramachaneni", "Sriharsha", "" ], [ "Kondadadi", "Ravikumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0809.4635
Jan Bergstra
Jan A. Bergstra and Mark B. van der Zwaag
Mechanistic Behavior of Single-Pass Instruction Sequences
12 pages
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Earlier work on program and thread algebra detailed the functional, observable behavior of programs under execution. In this article we add the modeling of unobservable, mechanistic processing, in particular processing due to jump instructions. We model mechanistic processing preceding some further behavior as a delay of that behavior; we borrow a unary delay operator from discrete time process algebra. We define a mechanistic improvement ordering on threads and observe that some threads do not have an optimal implementation.
[ { "version": "v1", "created": "Fri, 26 Sep 2008 13:57:36 GMT" } ]
2008-09-29T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "van der Zwaag", "Mark B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0809.4668
Jose Ignacio Alvarez-Hamelin
Jose Ignacio Orlicki (CoreLabs, ITBA), Pablo Ignacio Fierens (ITBA), Jos\'e Ignacio Alvarez-Hamelin (ITBA, CONICET)
Faceted Ranking of Egos in Collaborative Tagging Systems
null
WEBIST 2009, Lisboa : Portugal (2009)
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multimedia uploaded content is tagged and recommended by users of collaborative systems, resulting in informal classifications also known as folksonomies. Faceted web ranking has been proved a reasonable alternative to a single ranking which does not take into account a personalized context. In this paper we analyze the online computation of rankings of users associated to facets made up of multiple tags. Possible applications are user reputation evaluation (ego-ranking) and improvement of content quality in case of retrieval. We propose a solution based on PageRank as centrality measure: (i) a ranking for each tag is computed offline on the basis of the corresponding tag-dependent subgraph; (ii) a faceted order is generated by merging rankings corresponding to all the tags in the facet. The fundamental assumption, validated by empirical observations, is that step (i) is scalable. We also present algorithms for part (ii) having time complexity O(k), where k is the number of tags in the facet, well suited to online computation.
[ { "version": "v1", "created": "Fri, 26 Sep 2008 16:26:50 GMT" } ]
2009-03-21T00:00:00
[ [ "Orlicki", "Jose Ignacio", "", "CoreLabs, ITBA" ], [ "Fierens", "Pablo Ignacio", "", "ITBA" ], [ "Alvarez-Hamelin", "José Ignacio", "", "ITBA, CONICET" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0809.4743
Boris Ryabko
Boris Ryabko
The Imaginary Sliding Window As a New Data Structure for Adaptive Algorithms
Published in: Problems of information transmission,1996,v.32,#2
null
null
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The scheme of the sliding window is known in Information Theory, Computer Science, the problem of predicting and in stastistics. Let a source with unknown statistics generate some word $... x_{-1}x_{0}x_{1}x_{2}...$ in some alphabet $A$. For every moment $t, t=... $ $-1, 0, 1, ...$, one stores the word ("window") $ x_{t-w} x_{t-w+1}... x_{t-1}$ where $w$,$w \geq 1$, is called "window length". In the theory of universal coding, the code of the $x_{t}$ depends on source ststistics estimated by the window, in the problem of predicting, each letter $x_{t}$ is predicted using information of the window, etc. After that the letter $x_{t}$ is included in the window on the right, while $x_{t-w}$ is removed from the window. It is the sliding window scheme. This scheme has two merits: it allows one i) to estimate the source statistics quite precisely and ii) to adapt the code in case of a change in the source' statistics. However this scheme has a defect, namely, the necessity to store the window (i.e. the word $x_{t-w}... x_{t-1})$ which needs a large memory size for large $w$. A new scheme named "the Imaginary Sliding Window (ISW)" is constructed. The gist of this scheme is that not the last element $x_{t-w}$ but rather a random one is removed from the window. This allows one to retain both merits of the sliding window as well as the possibility of not storing the window and thus significantly decreasing the memory size.
[ { "version": "v1", "created": "Sat, 27 Sep 2008 07:42:44 GMT" } ]
2008-09-30T00:00:00
[ [ "Ryabko", "Boris", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.4747
Jean-Marie Vanherpe
Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO)
On parsimonious edge-colouring of graphs with maximum degree three
Revised version submitted to Graphs and Combinatorics
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a graph $G$ of maximum degree $\Delta$ let $\gamma$ denote the largest fraction of edges that can be $\Delta$ edge-coloured. Albertson and Haas showed that $\gamma \geq 13/15$ when $G$ is cubic . We show here that this result can be extended to graphs with maximum degree 3 with the exception of a graph on 5 vertices. Moreover, there are exactly two graphs with maximum degree 3 (one being obviously the Petersen graph) for which $\gamma = 13/15$. This extends a result given by Steffen. These results are obtained by using structural properties of the so called $\delta$-minimum edge colourings for graphs with maximum degree 3. Keywords : Cubic graph; Edge-colouring
[ { "version": "v1", "created": "Sat, 27 Sep 2008 07:35:51 GMT" }, { "version": "v2", "created": "Wed, 8 Apr 2009 08:49:46 GMT" }, { "version": "v3", "created": "Sat, 25 Apr 2009 10:29:34 GMT" }, { "version": "v4", "created": "Thu, 15 Jul 2010 13:57:26 GMT" }, { "version": "v5", "created": "Wed, 28 Sep 2011 19:21:04 GMT" }, { "version": "v6", "created": "Sat, 28 Jan 2012 20:16:21 GMT" } ]
2012-02-01T00:00:00
[ [ "Fouquet", "Jean-Luc", "", "LIFO" ], [ "Vanherpe", "Jean-Marie", "", "LIFO" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0809.4784
Luis Paulo Reis
Luis Paulo Reis, Daria Barteneva, Nuno Lau
A Computational Study on Emotions and Temperament in Multi-Agent Systems
null
null
null
null
cs.AI cs.MA cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advances in neurosciences and psychology have provided evidence that affective phenomena pervade intelligence at many levels, being inseparable from the cognitionaction loop. Perception, attention, memory, learning, decisionmaking, adaptation, communication and social interaction are some of the aspects influenced by them. This work draws its inspirations from neurobiology, psychophysics and sociology to approach the problem of building autonomous robots capable of interacting with each other and building strategies based on temperamental decision mechanism. Modelling emotions is a relatively recent focus in artificial intelligence and cognitive modelling. Such models can ideally inform our understanding of human behavior. We may see the development of computational models of emotion as a core research focus that will facilitate advances in the large array of computational systems that model, interpret or influence human behavior. We propose a model based on a scalable, flexible and modular approach to emotion which allows runtime evaluation between emotional quality and performance. The results achieved showed that the strategies based on temperamental decision mechanism strongly influence the system performance and there are evident dependency between emotional state of the agents and their temperamental type, as well as the dependency between the team performance and the temperamental configuration of the team members, and this enable us to conclude that the modular approach to emotional programming based on temperamental theory is the good choice to develop computational mind models for emotional behavioral Multi-Agent systems.
[ { "version": "v1", "created": "Sat, 27 Sep 2008 16:33:34 GMT" } ]
2008-09-30T00:00:00
[ [ "Reis", "Luis Paulo", "" ], [ "Barteneva", "Daria", "" ], [ "Lau", "Nuno", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0809.4792
Orestis Telelis
Thomas Dueholm Hansen, Orestis A. Telelis
On Pure and (approximate) Strong Equilibria of Facility Location Games
19 pages, 5 figures, 2 tables, partially appeared in WINE 2008
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study social cost losses in Facility Location games, where $n$ selfish agents install facilities over a network and connect to them, so as to forward their local demand (expressed by a non-negative weight per agent). Agents using the same facility share fairly its installation cost, but every agent pays individually a (weighted) connection cost to the chosen location. We study the Price of Stability (PoS) of pure Nash equilibria and the Price of Anarchy of strong equilibria (SPoA), that generalize pure equilibria by being resilient to coalitional deviations. A special case of recently studied network design games, Facility Location merits separate study as a classic model with numerous applications and individual characteristics: our analysis for unweighted agents on metric networks reveals constant upper and lower bounds for the PoS, while an $O(\ln n)$ upper bound implied by previous work is tight for non-metric networks. Strong equilibria do not always exist, even for the unweighted metric case. We show that $e$-approximate strong equilibria exist ($e=2.718...$). The SPoA is generally upper bounded by $O(\ln W)$ ($W$ is the sum of agents' weights), which becomes tight $\Theta(\ln n)$ for unweighted agents. For the unweighted metric case we prove a constant upper bound. We point out several challenging open questions that arise.
[ { "version": "v1", "created": "Sun, 28 Sep 2008 19:26:39 GMT" }, { "version": "v2", "created": "Sun, 14 Dec 2008 17:06:54 GMT" }, { "version": "v3", "created": "Sun, 8 Mar 2009 20:01:19 GMT" } ]
2009-03-08T00:00:00
[ [ "Hansen", "Thomas Dueholm", "" ], [ "Telelis", "Orestis A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0809.4794
Adam Smith
Adam Smith
Efficient, Differentially Private Point Estimators
9 pages
null
null
null
cs.CR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Differential privacy is a recent notion of privacy for statistical databases that provides rigorous, meaningful confidentiality guarantees, even in the presence of an attacker with access to arbitrary side information. We show that for a large class of parametric probability models, one can construct a differentially private estimator whose distribution converges to that of the maximum likelihood estimator. In particular, it is efficient and asymptotically unbiased. This result provides (further) compelling evidence that rigorous notions of privacy in statistical databases can be consistent with statistically valid inference.
[ { "version": "v1", "created": "Sat, 27 Sep 2008 19:57:34 GMT" } ]
2008-09-30T00:00:00
[ [ "Smith", "Adam", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0809.4804
Tiangao Gou
Tiangao Gou, Syed A. Jafar
On the Secure Degrees of Freedom of Wireless X Networks
To appear in Proceedings of 46th Annual Allerton Conference on Communication, Control and Computing, Sept. 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previous work showed that the X network with M transmitters, N receivers has MN/(M+N-1) degrees of freedom. In this work we study the degrees of freedom of the X network with secrecy constraints, i.e. the X network where some/all messages are confidential. We consider the $M \times N$ network where all messages are secured and show that N(M-1)/(M+N-1) degrees of freedom can be achieved. Secondly, we show that if messages from only M-1 transmitters are confidential, then MN/(M+N-1) degrees of freedom can be achieved meaning that there is no loss of degrees of freedom because of secrecy constraints. We also consider the achievable secure degrees of freedom under a more conservative secrecy constraint. We require that messages from any subset of transmitters are secure even if other transmitters are compromised, i.e., messages from the compromised transmitter are revealed to the unintended receivers. We also study the achievable secure degrees of freedom of the K user Gaussian interference channel under two different secrecy constraints where 1/2 secure degrees of freedom per message can be achieved. The achievable scheme in all cases is based on random binning combined with interference alignment.
[ { "version": "v1", "created": "Sat, 27 Sep 2008 22:48:45 GMT" } ]
2008-09-30T00:00:00
[ [ "Gou", "Tiangao", "" ], [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]