id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0809.4807
Lun Dong
Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent Poor
Secure Wireless Communications via Cooperation
7 pages, 5 figures, appeared in 2008 Allerton Conference on Communication, Control, and Computing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The feasibility of physical-layer-based security approaches for wireless communications in the presence of one or more eavesdroppers is hampered by channel conditions. In this paper, cooperation is investigated as an approach to overcome this problem and improve the performance of secure communications. In particular, a decode-and-forward (DF) based cooperative protocol is considered, and the objective is to design the system for secrecy capacity maximization or transmit power minimization. System design for the DF-based cooperative protocol is first studied by assuming the availability of global channel state information (CSI). For the case of one eavesdropper, an iterative scheme is proposed to obtain the optimal solution for the problem of transmit power minimization. For the case of multiple eavesdroppers, the problem of secrecy capacity maximization or transmit power minimization is in general intractable. Suboptimal system design is proposed by adding an additional constraint, i.e., the complete nulling of signals at all eavesdroppers, which yields simple closed-form solutions for the aforementioned two problems. Then, the impact of imperfect CSI of eavesdroppers on system design is studied, in which the ergodic secrecy capacity is of interest.
[ { "version": "v1", "created": "Sat, 27 Sep 2008 23:44:14 GMT" } ]
2008-09-30T00:00:00
[ [ "Dong", "Lun", "" ], [ "Han", "Zhu", "" ], [ "Petropulu", "Athina P.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.4812
Eric Feron
Eric Feron and Fernando Alegre
Control software analysis, Part I Open-loop properties
20 pages, 3 figures
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the digital world enters further into everyday life, questions are raised about the increasing challenges brought by the interaction of real-time software with physical devices. Many accidents and incidents encountered in areas as diverse as medical systems, transportation systems or weapon systems are ultimately attributed to "software failures". Since real-time software that interacts with physical systems might as well be called control software, the long litany of accidents due to real-time software failures might be taken as an equally long list of opportunities for control systems engineering. In this paper, we are interested only in run-time errors in those pieces of software that are a direct implementation of control system specifications: For well-defined and well-understood control architectures such as those present in standard textbooks on digital control systems, the current state of theoretical computer science is well-equipped enough to address and analyze control algorithms. It appears that a central element to these analyses is Lyapunov stability theory, which translate into invariant theory in computer implementations.
[ { "version": "v1", "created": "Sun, 28 Sep 2008 01:44:28 GMT" } ]
2008-09-30T00:00:00
[ [ "Feron", "Eric", "" ], [ "Alegre", "Fernando", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0809.4821
Jean-Marie Vanherpe
Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO)
On Fan Raspaud Conjecture
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A conjecture of Fan and Raspaud [3] asserts that every bridgeless cubic graph con-tains three perfect matchings with empty intersection. Kaiser and Raspaud [6] sug-gested a possible approach to this problem based on the concept of a balanced join in an embedded graph. We give here some new results concerning this conjecture and prove that a minimum counterexample must have at least 32 vertices.
[ { "version": "v1", "created": "Sun, 28 Sep 2008 05:56:06 GMT" } ]
2008-09-30T00:00:00
[ [ "Fouquet", "Jean-Luc", "", "LIFO" ], [ "Vanherpe", "Jean-Marie", "", "LIFO" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0809.4822
Jean-Marie Vanherpe
Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO)
On normal odd partitions in cubic graphs
null
Discussiones Mathematicae Graph Theory 29, 2 (2009) 293-312
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A normal partition of the edges of a cubic graph is a partition into trails (no repeated edge) such that each vertex is the end vertex of exactly one trail of the partition. We investigate this notion and give some results and problems.
[ { "version": "v1", "created": "Sun, 28 Sep 2008 05:57:36 GMT" } ]
2009-11-06T00:00:00
[ [ "Fouquet", "Jean-Luc", "", "LIFO" ], [ "Vanherpe", "Jean-Marie", "", "LIFO" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0809.4834
Luis Paulo Reis
Jose Torres, Luis Paulo Reis
Relevance Feedback in Conceptual Image Retrieval: A User Evaluation
15 Pages, 20 References
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Visual Object Information Retrieval (VOIR) system described in this paper implements an image retrieval approach that combines two layers, the conceptual and the visual layer. It uses terms from a textual thesaurus to represent the conceptual information and also works with image regions, the visual information. The terms are related with the image regions through a weighted association enabling the execution of concept-level queries. VOIR uses region-based relevance feedback to improve the quality of the results in each query session and to discover new associations between text and image. This paper describes a user-centred and task-oriented comparative evaluation of VOIR which was undertaken considering three distinct versions of VOIR: a full-fledge version; one supporting relevance feedback only at image level; and a third version not supporting relevance feedback at all. The evaluation performed showed the usefulness of region based relevance feedback in the context of VOIR prototype.
[ { "version": "v1", "created": "Sun, 28 Sep 2008 10:17:20 GMT" } ]
2008-09-30T00:00:00
[ [ "Torres", "Jose", "" ], [ "Reis", "Luis Paulo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0809.4839
Jean-Marie Vanherpe
Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO)
M\'acajov\'a and \v{S}koviera Conjecture on Cubic Graphs
null
Discussionnes Mathematicae on Graph Theory 30, 2 (2010) xxx-yyy
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A conjecture of M\'a\u{c}ajov\'a and \u{S}koviera asserts that every bridgeless cubic graph has two perfect matchings whose intersection does not contain any odd edge cut. We prove this conjecture for graphs with few vertices and we give a stronger result for traceable graphs.
[ { "version": "v1", "created": "Sun, 28 Sep 2008 11:31:20 GMT" }, { "version": "v2", "created": "Sat, 7 Nov 2009 18:41:37 GMT" } ]
2010-03-30T00:00:00
[ [ "Fouquet", "Jean-Luc", "", "LIFO" ], [ "Vanherpe", "Jean-Marie", "", "LIFO" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0809.4882
Aleksandrs Slivkins
Robert Kleinberg, Aleksandrs Slivkins and Eli Upfal
Multi-Armed Bandits in Metric Spaces
16 pages, 0 figures
null
null
null
cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a multi-armed bandit problem, an online algorithm chooses from a set of strategies in a sequence of trials so as to maximize the total payoff of the chosen strategies. While the performance of bandit algorithms with a small finite strategy set is quite well understood, bandit problems with large strategy sets are still a topic of very active investigation, motivated by practical applications such as online auctions and web advertisement. The goal of such research is to identify broad and natural classes of strategy sets and payoff functions which enable the design of efficient solutions. In this work we study a very general setting for the multi-armed bandit problem in which the strategies form a metric space, and the payoff function satisfies a Lipschitz condition with respect to the metric. We refer to this problem as the "Lipschitz MAB problem". We present a complete solution for the multi-armed problem in this setting. That is, for every metric space (L,X) we define an isometry invariant which bounds from below the performance of Lipschitz MAB algorithms for X, and we present an algorithm which comes arbitrarily close to meeting this bound. Furthermore, our technique gives even better results for benign payoff functions.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 01:58:13 GMT" } ]
2008-09-30T00:00:00
[ [ "Kleinberg", "Robert", "" ], [ "Slivkins", "Aleksandrs", "" ], [ "Upfal", "Eli", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0809.4883
Venkatesh Saligrama
V. Saligrama, M. Zhao
Thresholded Basis Pursuit: An LP Algorithm for Achieving Optimal Support Recovery for Sparse and Approximately Sparse Signals from Noisy Random Measurements
null
null
null
null
cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a linear programming solution for sign pattern recovery of a sparse signal from noisy random projections of the signal. We consider two types of noise models, input noise, where noise enters before the random projection; and output noise, where noise enters after the random projection. Sign pattern recovery involves the estimation of sign pattern of a sparse signal. Our idea is to pretend that no noise exists and solve the noiseless $\ell_1$ problem, namely, $\min \|\beta\|_1 ~ s.t. ~ y=G \beta$ and quantizing the resulting solution. We show that the quantized solution perfectly reconstructs the sign pattern of a sufficiently sparse signal. Specifically, we show that the sign pattern of an arbitrary k-sparse, n-dimensional signal $x$ can be recovered with $SNR=\Omega(\log n)$ and measurements scaling as $m= \Omega(k \log{n/k})$ for all sparsity levels $k$ satisfying $0< k \leq \alpha n$, where $\alpha$ is a sufficiently small positive constant. Surprisingly, this bound matches the optimal \emph{Max-Likelihood} performance bounds in terms of $SNR$, required number of measurements, and admissible sparsity level in an order-wise sense. In contrast to our results, previous results based on LASSO and Max-Correlation techniques either assume significantly larger $SNR$, sublinear sparsity levels or restrictive assumptions on signal sets. Our proof technique is based on noisy perturbation of the noiseless $\ell_1$ problem, in that, we estimate the maximum admissible noise level before sign pattern recovery fails.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 14:01:13 GMT" }, { "version": "v2", "created": "Sun, 22 Mar 2009 01:49:48 GMT" }, { "version": "v3", "created": "Sat, 8 May 2010 11:34:25 GMT" } ]
2015-03-13T00:00:00
[ [ "Saligrama", "V.", "" ], [ "Zhao", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.4916
Christoph Schommer
Christoph Schommer
16 Propositions to Reconsider the Organization of a Scientific Workshop
5 pages
null
null
null
cs.CY cs.GL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Participating a scientific workshop is nowadays often an adventure because the number of participants do seldom exceed the number of talks. A half-day workshop is mostly finished at lunchtime, speakers are sometimes not present and unexcused, and a strict progression of the workshop offers little air for discussion. And when talks are re-scheduled on short notice in case that a speech is dropped out, attaining guests definitely wonder why the presenter is talking about something that does not match the previously announced talk. In this respect, we believe that the organization of a workshop in the classical sense must be reconsidered. It is not enough of compelling the presenters to pay the registration fee only and to let the participants being impassive or taken away mentally. With this work, we address several propositions to become implemented in the future workshop organization. With that, we hope to contribute to the identification of scientific workshops as a place of interaction.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 09:42:23 GMT" } ]
2008-09-30T00:00:00
[ [ "Schommer", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
0809.4917
Feng Xia
Feng Xia, Longhua Ma, Wenhong Zhao, Youxian Sun, Jinxiang Dong
Enhanced Energy-Aware Feedback Scheduling of Embedded Control Systems
to appear in Journal of Computers
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic voltage scaling (DVS) is one of the most effective techniques for reducing energy consumption in embedded and real-time systems. However, traditional DVS algorithms have inherent limitations on their capability in energy saving since they rarely take into account the actual application requirements and often exploit fixed timing constraints of real-time tasks. Taking advantage of application adaptation, an enhanced energy-aware feedback scheduling (EEAFS) scheme is proposed, which integrates feedback scheduling with DVS. To achieve further reduction in energy consumption over pure DVS while not jeopardizing the quality of control, the sampling period of each control loop is adapted to its actual control performance, thus exploring flexible timing constraints on control tasks. Extensive simulation results are given to demonstrate the effectiveness of EEAFS under different scenarios. Compared with the optimal pure DVS scheme, EEAFS saves much more energy while yielding comparable control performance.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 09:44:36 GMT" } ]
2008-09-30T00:00:00
[ [ "Xia", "Feng", "" ], [ "Ma", "Longhua", "" ], [ "Zhao", "Wenhong", "" ], [ "Sun", "Youxian", "" ], [ "Dong", "Jinxiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0809.4920
Feng Xia
Longhua Ma, Feng Xia, Zhe Peng
Integrated Design and Implementation of Embedded Control Systems with Scilab
15 pages, 14 figures; Open Access at http://www.mdpi.org/sensors/papers/s8095501.pdf
Sensors, 8(9): 5501-5515, 2008
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Embedded systems are playing an increasingly important role in control engineering. Despite their popularity, embedded systems are generally subject to resource constraints and it is therefore difficult to build complex control systems on embedded platforms. Traditionally, the design and implementation of control systems are often separated, which causes the development of embedded control systems to be highly time-consuming and costly. To address these problems, this paper presents a low-cost, reusable, reconfigurable platform that enables integrated design and implementation of embedded control systems. To minimize the cost, free and open source software packages such as Linux and Scilab are used. Scilab is ported to the embedded ARM-Linux system. The drivers for interfacing Scilab with several communication protocols including serial, Ethernet, and Modbus are developed. Experiments are conducted to test the developed embedded platform. The use of Scilab enables implementation of complex control algorithms on embedded platforms. With the developed platform, it is possible to perform all phases of the development cycle of embedded control systems in a unified environment, thus facilitating the reduction of development time and cost.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 10:06:09 GMT" } ]
2008-09-30T00:00:00
[ [ "Ma", "Longhua", "" ], [ "Xia", "Feng", "" ], [ "Peng", "Zhe", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0809.4924
Feng Xia
Feng Xia, Longhua Ma, Chen Peng, Youxian Sun, Jinxiang Dong
Cross-Layer Adaptive Feedback Scheduling of Wireless Control Systems
17 pages, 12 figures; Open Access at http://www.mdpi.org/sensors/papers/s8074265.pdf
Sensors, 8(7): 4265-4281, 2008
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is a trend towards using wireless technologies in networked control systems. However, the adverse properties of the radio channels make it difficult to design and implement control systems in wireless environments. To attack the uncertainty in available communication resources in wireless control systems closed over WLAN, a cross-layer adaptive feedback scheduling (CLAFS) scheme is developed, which takes advantage of the co-design of control and wireless communications. By exploiting cross-layer design, CLAFS adjusts the sampling periods of control systems at the application layer based on information about deadline miss ratio and transmission rate from the physical layer. Within the framework of feedback scheduling, the control performance is maximized through controlling the deadline miss ratio. Key design parameters of the feedback scheduler are adapted to dynamic changes in the channel condition. An event-driven invocation mechanism for the feedback scheduler is also developed. Simulation results show that the proposed approach is efficient in dealing with channel capacity variations and noise interference, thus providing an enabling technology for control over WLAN.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 10:18:06 GMT" } ]
2008-09-30T00:00:00
[ [ "Xia", "Feng", "" ], [ "Ma", "Longhua", "" ], [ "Peng", "Chen", "" ], [ "Sun", "Youxian", "" ], [ "Dong", "Jinxiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.4929
Feng Xia
Feng Xia, Liping Liu, Longhua Ma, Youxian Sun, Jinxiang Dong
Performance-Aware Power Management in Embedded Controllers with Multiple-Voltage Processors
4 figures
Information Technology Journal, 7(6): 942-947, 2008
10.3923/itj.2008.942.947
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this work is to minimize the energy dissipation of embedded controllers without jeopardizing the quality of control (QoC). Taking advantage of the dynamic voltage scaling (DVS) technology, this paper develops a performance-aware power management scheme for embedded controllers with processors that allow multiple voltage levels. The periods of control tasks are adapted online with respect to the current QoC, thus facilitating additional energy reduction over standard DVS. To avoid the waste of CPU resources as a result of the discrete voltage levels, a resource reclaiming mechanism is employed to maximize the CPU utilization and also to improve the QoC. Simulations are conducted to evaluate the performance of the proposed scheme. Compared with the optimal standard DVS scheme, the proposed scheme is shown to be able to save remarkably more energy while maintaining comparable QoC.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 10:50:32 GMT" } ]
2008-09-30T00:00:00
[ [ "Xia", "Feng", "" ], [ "Liu", "Liping", "" ], [ "Ma", "Longhua", "" ], [ "Sun", "Youxian", "" ], [ "Dong", "Jinxiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0809.4983
Frederic Butin
Fr\'ed\'eric Butin (ICJ)
Poisson Homology in Degree 0 for some Rings of Symplectic Invariants
24 pages
null
null
null
math-ph cs.SC math.MP math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $\go{g}$ be a finite-dimensional semi-simple Lie algebra, $\go{h}$ a Cartan subalgebra of $\go{g}$, and $W$ its Weyl group. The group $W$ acts diagonally on $V:=\go{h}\oplus\go{h}^*$, as well as on $\mathbb{C}[V]$. The purpose of this article is to study the Poisson homology of the algebra of invariants $\mathbb{C}[V]^W$ endowed with the standard symplectic bracket. To begin with, we give general results about the Poisson homology space in degree 0, denoted by $HP_0(\mathbb{C}[V]^W)$, in the case where $\go{g}$ is of type $B_n-C_n$ or $D_n$, results which support Alev's conjecture. Then we are focusing the interest on the particular cases of ranks 2 and 3, by computing the Poisson homology space in degree 0 in the cases where $\go{g}$ is of type $B_2$ ($\go{so}_5$), $D_2$ ($\go{so}_4$), then $B_3$ ($\go{so}_7$), and $D_3=A_3$ ($\go{so}_6\simeq\go{sl}_4$). In order to do this, we make use of a functional equation introduced by Y. Berest, P. Etingof and V. Ginzburg. We recover, by a different method, the result established by J. Alev and L. Foissy, according to which the dimension of $HP_0(\mathbb{C}[V]^W)$ equals 2 for $B_2$. Then we calculate the dimension of this space and we show that it is equal to 1 for $D_2$. We also calculate it for the rank 3 cases, we show that it is equal to 3 for $B_3-C_3$ and 1 for $D_3=A_3$.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 15:16:33 GMT" } ]
2008-09-30T00:00:00
[ [ "Butin", "Frédéric", "", "ICJ" ] ]
[ { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0809.4985
Youssef, Joseph Nasser
Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu Crussi\`ere (IETR)
On the Influence of Carrier Frequency Offset and Sampling Frequency Offset in MIMO-OFDM Systems for Future Digital TV
null
International Symposium on Wireless and Pervasive Computing, Gr\`ece (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the impact of carrier frequency offset (CFO) and sampling frequency offset (SFO) on the performance of different MIMO-OFDM schemes with high spectral efficiency for next generation of terrestrial digital TV. We analyze particularly orthogonal Alamouti scheme, and non-orthogonal (NO) schemes like VBLAST, linear dispersion (LD) code and Golden code. This analysis gives a global view on the best suitable MIMO-OFDM scheme with respect to CFO and SFO. We show that for high spectral efficiency, Alamouti is more sensitive to CFO and SFO. Moreover, we show that all studied MIMO-OFDM schemes are sensitive to CFO when it is greater than 1% of inter-carrier spacing. Their sensitivity due to SFO is less than that due to CFO.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 15:17:31 GMT" } ]
2008-09-30T00:00:00
[ [ "Nasser", "Youssef", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ], [ "Crussière", "Matthieu", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.4986
Youssef, Joseph Nasser
Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu Crussi\`ere (IETR), Oudomsack Pasquero (IETR)
Efficient MIMO-OFDM Schemes for Future Terrestrial Digital TV with Unequal Received Powers
null
IEEE International Conference on Communications, Chine (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article investigates the effect of equal and unequal received powers on the performances of different MIMO-OFDM schemes for terrestrial digital TV. More precisely, we focus on three types of non-orthogonal schemes: the BLAST scheme, the Linear Dispersion (LD) code and the Golden code, and we compare their performances to that of Alamouti scheme. Using two receiving antennas, we show that for moderate attenuation on the second antenna and high spectral efficiency, Golden code outperforms other schemes. However, Alamouti scheme presents the best performance for low spectral efficiency and equal received powers or when one antenna is dramatically damaged. When three antennas are used, we show that Golden code offers the highest robustness to power unbalance at the receiving side
[ { "version": "v1", "created": "Mon, 29 Sep 2008 15:17:52 GMT" } ]
2008-09-30T00:00:00
[ [ "Nasser", "Youssef", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ], [ "Crussière", "Matthieu", "", "IETR" ], [ "Pasquero", "Oudomsack", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.4987
Youssef, Joseph Nasser
Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu Crussi\`ere (IETR), Oudomsack Pasquero (IETR)
Efficient 3D Space Time Space Block Code for Future Terrestrial Digital TV
null
Symposium on Signal Processing Advances in Wireless Communications, Recife : Br\'esil (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article introduces a 3D space-time-space block code for future terrestrial digital TV in single frequency networks. The proposed 3D code is based on a double layer structure designed for inter-cell and intra-cell space time coded transmissions. We show that this new structure is particularly efficient for SFN environments regardless of the location of the receiver. It is then suitable for fixed, portable and mobile receptions.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 15:18:09 GMT" } ]
2008-09-30T00:00:00
[ [ "Nasser", "Youssef", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ], [ "Crussière", "Matthieu", "", "IETR" ], [ "Pasquero", "Oudomsack", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.4989
Youssef, Joseph Nasser
Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu Crussi\`ere (IETR)
Bit Error Rate Prediction of Coded MIMO-OFDM Systems
null
IEEE Symposium on Signal Processing Advances in Wireless Communications, Recife : Br\'esil (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bit error rate (BER) prediction over channel realisations has emerged as an active research area. In this paper, we give analytical signal to interference and noise ratio (SINR) evaluation of MIMO-OFDM systems using an iterative receiver. Using this analytical SINR expression, we propose an accurate BER prediction method based on effective exponential SINR mapping (EESM) method. We show by simulations that our method is independent of the channel realisation and of the MIMO scheme. It is only dependent on the modulation and coding scheme.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 15:18:37 GMT" } ]
2008-09-30T00:00:00
[ [ "Nasser", "Youssef", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ], [ "Crussière", "Matthieu", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.5005
Martyn Amos
Yi-Chun Xu, Ren-Bin Xiao and Martyn Amos
Simulated annealing for weighted polygon packing
Submitted to Engineering Optimization. 13 pages, 7 figures, 5 tables
null
null
null
cs.CG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a new algorithm for a layout optimization problem: this concerns the placement of weighted polygons inside a circular container, the two objectives being to minimize imbalance of mass and to minimize the radius of the container. This problem carries real practical significance in industrial applications (such as the design of satellites), as well as being of significant theoretical interest. Previous work has dealt with circular or rectangular objects, but here we deal with the more realistic case where objects may be represented as polygons and the polygons are allowed to rotate. We present a solution based on simulated annealing and first test it on instances with known optima. Our results show that the algorithm obtains container radii that are close to optimal. We also compare our method with existing algorithms for the (special) rectangular case. Experimental results show that our approach out-performs these methods in terms of solution quality.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 16:22:28 GMT" } ]
2008-09-30T00:00:00
[ [ "Xu", "Yi-Chun", "" ], [ "Xiao", "Ren-Bin", "" ], [ "Amos", "Martyn", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0809.5008
Nihar Jindal
Nihar Jindal, Jeffrey G. Andrews, Steven Weber
Multi-Antenna Communication in Ad Hoc Networks: Achieving MIMO Gains with SIMO Transmission
Submitted to IEEE Trans. on Communications. (Extended version of earlier conference paper)
null
10.1109/TCOMM.2010.120710.090793
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The benefit of multi-antenna receivers is investigated in wireless ad hoc networks, and the main finding is that network throughput can be made to scale linearly with the number of receive antennas nR even if each transmitting node uses only a single antenna. This is in contrast to a large body of prior work in single-user, multiuser, and ad hoc wireless networks that have shown linear scaling is achievable when multiple receive and transmit antennas (i.e., MIMO transmission) are employed, but that throughput increases logarithmically or sublinearly with nR when only a single transmit antenna (i.e., SIMO transmission) is used. The linear gain is achieved by using the receive degrees of freedom to simultaneously suppress interference and increase the power of the desired signal, and exploiting the subsequent performance benefit to increase the density of simultaneous transmissions instead of the transmission rate. This result is proven in the transmission capacity framework, which presumes single-hop transmissions in the presence of randomly located interferers, but it is also illustrated that the result holds under several relaxations of the model, including imperfect channel knowledge, multihop transmission, and regular networks (i.e., interferers are deterministically located on grids).
[ { "version": "v1", "created": "Mon, 29 Sep 2008 16:21:38 GMT" }, { "version": "v2", "created": "Thu, 24 Dec 2009 01:31:18 GMT" } ]
2016-11-17T00:00:00
[ [ "Jindal", "Nihar", "" ], [ "Andrews", "Jeffrey G.", "" ], [ "Weber", "Steven", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.5009
Juyul Lee
Juyul Lee and Nihar Jindal
Delay Constrained Scheduling over Fading Channels: Optimal Policies for Monomial Energy-Cost Functions
submitted to the IEEE ICC 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A point-to-point discrete-time scheduling problem of transmitting $B$ information bits within $T$ hard delay deadline slots is considered assuming that the underlying energy-bit cost function is a convex monomial. The scheduling objective is to minimize the expected energy expenditure while satisfying the deadline constraint based on information about the unserved bits, channel state/statistics, and the remaining time slots to the deadline. At each time slot, the scheduling decision is made without knowledge of future channel state, and thus there is a tension between serving many bits when the current channel is good versus leaving too many bits for the deadline. Under the assumption that no other packet is scheduled concurrently and no outage is allowed, we derive the optimal scheduling policy. Furthermore, we also investigate the dual problem of maximizing the number of transmitted bits over $T$ time slots when subject to an energy constraint.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 16:27:27 GMT" } ]
2008-09-30T00:00:00
[ [ "Lee", "Juyul", "" ], [ "Jindal", "Nihar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.5016
Youssef, Joseph Nasser
Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu Crussi\`ere (IETR)
Robustness of MIMO-OFDM Schemes for Future Digital TV to Carrier Frequency Offset
null
IEEE Broadband Multimedia Symposium, \'Etats-Unis d'Am\'erique (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the impact of carrier frequency offset (CFO) on the performance of different MIMO-OFDM schemes with high spectral efficiency for next generation of terrestrial digital TV. We show that all studied MIMO-OFDM schemes are sensitive to CFO when it is greater than 1% of inter-carrier spacing. We show also that the Alamouti scheme is the most sensitive MIMO scheme to CFO
[ { "version": "v1", "created": "Mon, 29 Sep 2008 16:58:35 GMT" } ]
2008-09-30T00:00:00
[ [ "Nasser", "Youssef", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ], [ "Crussière", "Matthieu", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.5022
Jay Kumar Sundararajan
Jay Kumar Sundararajan, Devavrat Shah, Muriel Medard, Michael Mitzenmacher, Joao Barros
Network coding meets TCP
9 pages, 9 figures, submitted to IEEE INFOCOM 2009
null
10.1109/INFCOM.2009.5061931
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a mechanism that incorporates network coding into TCP with only minor changes to the protocol stack, thereby allowing incremental deployment. In our scheme, the source transmits random linear combinations of packets currently in the congestion window. At the heart of our scheme is a new interpretation of ACKs - the sink acknowledges every degree of freedom (i.e., a linear combination that reveals one unit of new information) even if it does not reveal an original packet immediately. Such ACKs enable a TCP-like sliding-window approach to network coding. Our scheme has the nice property that packet losses are essentially masked from the congestion control algorithm. Our algorithm therefore reacts to packet drops in a smooth manner, resulting in a novel and effective approach for congestion control over networks involving lossy links such as wireless links. Our experiments show that our algorithm achieves higher throughput compared to TCP in the presence of lossy wireless links. We also establish the soundness and fairness properties of our algorithm.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 19:51:21 GMT" } ]
2016-11-17T00:00:00
[ [ "Sundararajan", "Jay Kumar", "" ], [ "Shah", "Devavrat", "" ], [ "Medard", "Muriel", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Barros", "Joao", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.5023
Alexandre Proutiere A
Charles Bordenave, David McDonald, Alexandre Proutiere
Asymptotic stability region of slotted-Aloha
16 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze the stability of standard, buffered, slotted-Aloha systems. Specifically, we consider a set of $N$ users, each equipped with an infinite buffer. Packets arrive into user $i$'s buffer according to some stationary ergodic Markovian process of intensity $\lambda_i$. At the beginning of each slot, if user $i$ has packets in its buffer, it attempts to transmit a packet with fixed probability $p_i$ over a shared resource / channel. The transmission is successful only when no other user attempts to use the channel. The stability of such systems has been open since their very first analysis in 1979 by Tsybakov and Mikhailov. In this paper, we propose an approximate stability condition, that is provably exact when the number of users $N$ grows large. We provide theoretical evidence and numerical experiments to explain why the proposed approximate stability condition is extremely accurate even for systems with a restricted number of users (even two or three). We finally extend the results to the case of more efficient CSMA systems.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 18:34:47 GMT" } ]
2009-09-29T00:00:00
[ [ "Bordenave", "Charles", "" ], [ "McDonald", "David", "" ], [ "Proutiere", "Alexandre", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.5087
Yuhua Chen
Yuhua Chen, Subhash Kak, Lei Wang
Hybrid Neural Network Architecture for On-Line Learning
19 pages, 16 figures
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Approaches to machine intelligence based on brain models have stressed the use of neural networks for generalization. Here we propose the use of a hybrid neural network architecture that uses two kind of neural networks simultaneously: (i) a surface learning agent that quickly adapt to new modes of operation; and, (ii) a deep learning agent that is very accurate within a specific regime of operation. The two networks of the hybrid architecture perform complementary functions that improve the overall performance. The performance of the hybrid architecture has been compared with that of back-propagation perceptrons and the CC and FC networks for chaotic time-series prediction, the CATS benchmark test, and smooth function approximation. It has been shown that the hybrid architecture provides a superior performance based on the RMS error criterion.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 23:00:22 GMT" } ]
2008-10-01T00:00:00
[ [ "Chen", "Yuhua", "" ], [ "Kak", "Subhash", "" ], [ "Wang", "Lei", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0809.5096
Hong Ju Park
Hong Ju Park and Ender Ayanoglu
Diversity Analysis of Bit-Interleaved Coded Multiple Beamforming
The maximum achievable diversity order from given convolutional code with any interleaver is shown by using the Singleton bound
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, diversity analysis of bit-interleaved coded multiple beamforming (BICMB) is extended to the case of general spatial interleavers, removing a condition on their previously known design criteria and quantifying the resulting diversity order. The diversity order is determined by a parameter Qmax which is inherited from the convolutional code and the spatial de-multiplexer used in BICMB. We introduce a method to find this parameter by employing a transfer function approach as in finding the weight spectrum of a convolutional code. By using this method, several Qmax values are shown and verified to be identical with the results from a computer search. The diversity analysis and the method to find the parameter are supported by simulation results. By using the Singleton bound, we also show that Qmax is lower bounded by the product of the number of streams and the code rate of an encoder. The design rule of the spatial de-multiplexer for a given convolutional code is proposed to meet the condition on the maximum achievable diversity order.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 00:14:10 GMT" }, { "version": "v2", "created": "Wed, 29 Oct 2008 18:00:01 GMT" }, { "version": "v3", "created": "Tue, 3 Feb 2009 01:49:02 GMT" } ]
2009-09-29T00:00:00
[ [ "Park", "Hong Ju", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.5145
Youssef, Joseph Nasser
Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu Crussi\`ere (IETR)
3D MIMO Scheme for Broadcasting Future Digital TV in Single Frequency Networks
null
Electronics Letters / IEE Electronics Letters 44, 13 (2008) 829-830
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This letter introduces a 3D space-time-space block code for future digital TV systems. The code is based on a double layer structure for inter-cell and intra-cell transmission mode in single frequency networks. Without increasing the complexity of the receiver, the proposed code is very efficient for different transmission scenarios.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 09:23:19 GMT" } ]
2010-12-13T00:00:00
[ [ "Nasser", "Youssef", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ], [ "Crussière", "Matthieu", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.5153
Ognyan Kounchev
Ognyan Kounchev, Hermann Render
On a new multivariate sampling paradigm and a polyspline Shannon function
Submitted to the conference proceedings of SAMPTA07 held in Thessaloniki, Greece, 2007
null
null
null
math.NA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the monograph Kounchev, O. I., Multivariate Polysplines. Applications to Numerical and Wavelet Analysis, Academic Press, San Diego-London, 2001, and in the paper Kounchev O., Render, H., Cardinal interpolation with polysplines on annuli, Journal of Approximation Theory 137 (2005) 89--107, we have introduced and studied a new paradigm for cardinal interpolation which is related to the theory of multivariate polysplines. In the present paper we show that this is related to a new sampling paradigm in the multivariate case, whereas we obtain a Shannon type function $S(x) $ and the following Shannon type formula: $f(r\theta) =\sum_{j=-\infty}^{\infty}\int_{\QTR{Bbb}{S}^{n-1}}S(e^{-j}r\theta ) f(e^{j}\theta) d\theta .$ This formula relies upon infinitely many Shannon type formulas for the exponential splines arising from the radial part of the polyharmonic operator $\Delta ^{p}$ for fixed $p\geq 1$. Acknowledgement. The first and the second author have been partially supported by the Institutes partnership project with the Alexander von Humboldt Foundation. The first has been partially sponsored by the Greek-Bulgarian bilateral project BGr-17, and the second author by Grant MTM2006-13000-C03-03 of the D.G.I. of Spain.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 09:53:23 GMT" } ]
2008-10-01T00:00:00
[ [ "Kounchev", "Ognyan", "" ], [ "Render", "Hermann", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.5154
Cecile Roisin
Jan Mik\'ac (INRIA Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble), C\'ecile Roisin (INRIA Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble), Bao Le Duc (UPMC)
An Export Architecture for a Multimedia Authoring Environment
null
Dans DocEng'08 (2008) 28-31
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an export architecture that provides a clear separation of authoring services from publication services. We illustrate this architecture with the LimSee3 authoring tool and several standard publication formats: Timesheets, SMIL, and XHTML.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 09:56:35 GMT" } ]
2008-10-01T00:00:00
[ [ "Mikác", "Jan", "", "INRIA Rhône-Alpes / LIG Laboratoire d'Informatique de\n Grenoble" ], [ "Roisin", "Cécile", "", "INRIA Rhône-Alpes / LIG Laboratoire\n d'Informatique de Grenoble" ], [ "Duc", "Bao Le", "", "UPMC" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0809.5173
Nicolas Goze
Nicolas Goze, Elisabeth Remm
An algebraic approach to the set of intervals (a new approach of arithmetic of intervals)
null
null
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present the set of intervals as a normed vector space. We define also a four-dimensional associative algebra whose product gives the product of intervals in any cases. This approach allows to give a notion of divisibility and in some cases an euclidian division. We introduce differential calculus and give some applications.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 11:45:01 GMT" }, { "version": "v2", "created": "Thu, 22 Oct 2009 09:08:40 GMT" } ]
2009-10-22T00:00:00
[ [ "Goze", "Nicolas", "" ], [ "Remm", "Elisabeth", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0809.5182
Peter Fertl
Peter Fertl, Ari Hottinen, and Gerald Matz
Perturbation-based Distributed Beamforming for Wireless Relay Networks
5 pages, 5 figures; accepted at IEEE GLOBECOM 2008, New Orleans, LA, Nov 30 - Dec 4, 2008
null
10.1109/GLOCOM.2008.ECP.743
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with distributed beamforming techniques for wireless networks with half-duplex amplify-and-forward relays. Existing schemes optimize the beamforming weights based on the assumption that channel state information (CSI) is available at the relays. We propose to use adaptive beamforming based on deterministic perturbations and limited feedback (1-bit) from the destination to the relays in order to avoid CSI at the relays. Two scalable perturbation schemes are considered and practical implementation aspects are addressed. Simulation results confirm that the proposed techniques closely approach optimum performance and have satisfactory tracking properties in time-varying environments.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 12:19:18 GMT" } ]
2016-11-18T00:00:00
[ [ "Fertl", "Peter", "" ], [ "Hottinen", "Ari", "" ], [ "Matz", "Gerald", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.5188
Ming Liu
Ming Liu (IETR), Matthieu Crussi\`ere (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Oudomsack Pasquero (IETR)
Analysis and Performance Comparison of DVB-T and DTMB Systems for Terrestrial Digital TV
null
IEEE International Conference on Communications Systems (ICCS 2008), Guangzhou : Chine (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Orthogonal frequency-division multiplexing (OFDM) is the most popular transmission technology in digital terrestrial broadcasting (DTTB), adopted by many DTTB standards. In this paper, the bit error rate (BER) performance of two DTTB systems, namely cyclic prefix OFDM (CP-OFDM) based DVB-T and time domain synchronous OFDM (TDS-OFDM) based DTMB, is evaluated in different channel conditions. Spectrum utilization and power efficiency are also discussed to demonstrate the transmission overhead of both systems. Simulation results show that the performances of the two systems are much close. Given the same ratio of guard interval (GI), the DVB-T outperforms DTMB in terms of signal to noise ratio (SNR) in Gaussian and Ricean channels, while DTMB behaves better performance in Rayleigh channel in higher code rates and higher orders of constellation thanks to its efficient channel coding and interleaving scheme.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 12:57:12 GMT" } ]
2008-10-01T00:00:00
[ [ "Liu", "Ming", "", "IETR" ], [ "Crussière", "Matthieu", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ], [ "Pasquero", "Oudomsack", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.5189
Oudomsack Pierre Pasquero
Oudomsack Pierre Pasquero (IETR), Matthieu Crussi\`ere (IETR), Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR)
A novel channel estimation based on spread pilots for terrestrial digital video broadcasting
null
Broadband Multimedia Systems and Broadcasting, Las Vegas : \'Etats-Unis d'Am\'erique (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel channel estimation technique based on spread pilots for digital video broadcasting. This technique consists in adding a linear preceding function before the OFDM modulation and dedicating one of the preceding sequence to transmit the pilot symbols for the channel estimation. The merits of this technique are its simplicity, its flexibility, and the gains in terms of spectral efficiency and useful bit rate obtained compared to the classical pilot based estimation schemes used in DVB standards. The performance evaluated over realistic channel models, shows the efficiency of this technique which turns out to be a promising channel estimation technique for the future terrestrial video broadcasting systems.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 12:57:53 GMT" } ]
2008-10-01T00:00:00
[ [ "Pasquero", "Oudomsack Pierre", "", "IETR" ], [ "Crussière", "Matthieu", "", "IETR" ], [ "Nasser", "Youssef", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.5191
Fahad Syed Muhammad
Fahad Syed Muhammad (IETR), Jean-Yves Baudais (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu Crussi\`ere (IETR)
A Coded Bit-Loading Linear Precoded Discrete Multitone Solution for Power Line Communication
null
International Workshop on Signal Processing Advances in Wireless Communications, Recife, Pernambuco : Brazil (2008)
10.1109/SPAWC.2008.4641669
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear precoded discrete multitone modulation (LP-DMT) system has been already proved advantageous with adaptive resource allocation algorithm in a power line communication (PLC) context. In this paper, we investigate the bit and energy allocation algorithm of an adaptive LP-DMT system taking into account the channel coding scheme. A coded adaptive LP-DMT system is presented in the PLC context with a loading algorithm which ccommodates the channel coding gains in bit and energy calculations. The performance of a concatenated channel coding scheme, consisting of an inner Wei's 4-dimensional 16-states trellis code and an outer Reed-Solomon code, in combination with the roposed algorithm is analyzed. Simulation results are presented for a fixed target bit error rate in a multicarrier scenario under power spectral density constraint. Using a multipath model of PLC channel, it is shown that the proposed coded adaptive LP-DMT system performs better than classical coded discrete multitone.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 13:01:17 GMT" } ]
2010-01-19T00:00:00
[ [ "Muhammad", "Fahad Syed", "", "IETR" ], [ "Baudais", "Jean-Yves", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ], [ "Crussière", "Matthieu", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.5192
Oudomsack Pierre Pasquero
Oudomsack Pierre Pasquero (IETR), Matthieu Crussi\`ere (IETR), Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR)
2D Linear Precoded OFDM for future mobile Digital Video Broadcasting
null
Signal Processing Advances in Wireless Communications, Recife : Br\'esil (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel channel estimation technique based on 2D spread pilots. The merits of this technique are its simplicity, its flexibility regarding the transmission scenarios, and the spectral efficiency gain obtained compared to the classical pilot based estimation schemes used in DVB standards. We derive the analytical expression of the mean square error of the estimator and show it is a function of the autocorrelation of the channel in both time and frequency domains. The performance evaluated over a realistic channel model shows the efficiency of this technique which turns out to be a promising channel estimation for the future mobile video broadcasting systems.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 13:01:46 GMT" } ]
2008-10-01T00:00:00
[ [ "Pasquero", "Oudomsack Pierre", "", "IETR" ], [ "Crussière", "Matthieu", "", "IETR" ], [ "Nasser", "Youssef", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.5204
Georg B\"ocherer
Georg B\"ocherer and Alexandre de Baynast
A Distributed MAC Protocol for Cooperation in Random Access Networks
5 pages, improved presentation compared to previous version v1
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
WLAN is one of the most successful applications of wireless communications in daily life because of low cost and ease of deployment. The enabling technique for this success is the use of random access schemes for the wireless channel. Random access requires minimal coordination between the nodes, which considerably reduces the cost of the infrastructure. Recently, cooperative communication in wireless networks has been of increasing interest because it promises higher rates and reliability. An additional MAC overhead is necessary to coordinate the nodes to allow cooperation and this overhead can possibly cancel out the cooperative benefits. In this work, a completely distributed protocol is proposed that allows nodes in the network to cooperate via Two-Hop and Decode-and-Forward for transmitting their data to a common gateway node. It is shown that high throughput gains are obtained in terms of the individual throughput that can be guaranteed to any node in the network. These results are validated by Monte Carlo simulations.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 14:17:05 GMT" }, { "version": "v2", "created": "Tue, 3 Nov 2009 15:57:30 GMT" } ]
2009-11-03T00:00:00
[ [ "Böcherer", "Georg", "" ], [ "de Baynast", "Alexandre", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.5212
Hyoungsuk Jeon
Hyoungsuk Jeon, Namshik Kim, Minki Kim, Hyuckjae Lee, and Jeongseok Ha
Secrecy Capacity over Correlated Ergodic Fading Channel
18 pages, 5 figures, submitted to IEEE Transaction on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the secrecy capacity of an ergodic fading wiretap channel in which the main channel is correlated with the eavesdropper channel. In this study, the full Channel State Information (CSI) is assumed, and thus the transmitter knows the channel gains of the legitimate receiver and the eavesdropper. By analyzing the resulting secrecy capacity we quantify the loss of the secrecy capacity due to the correlation. In addition, we study the asymptotic behavior of the secrecy capacity as Signal-to-Noise Ratio (SNR) tends to infinity. The capacity of an ordinary fading channel logarithmically increases with SNR. On the contrary, the secrecy capacity converges into a limit which can be an upper bound on the secrecy capacity over the fading wiretap channel. We find a closed form of the upper bound for the correlated Rayleigh wiretap channel which also includes the independent case as a special one. Our work shows that the upper bound is determined by only two channel parameters; the correlation coefficient and the ratio of the main to the eavesdropper channel gains that will be called PCC and CGR respectively. The analysis of the upper bound tells how the two channel parameters affect the secrecy capacity and leads to the conclusion that the excessively large signal power does not provide any advantage in the secrecy capacity, and the loss due to the correlation is especially serious in low CGR regime.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 14:43:37 GMT" } ]
2008-10-01T00:00:00
[ [ "Jeon", "Hyoungsuk", "" ], [ "Kim", "Namshik", "" ], [ "Kim", "Minki", "" ], [ "Lee", "Hyuckjae", "" ], [ "Ha", "Jeongseok", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.5217
Emmanuel Abbe A
Emmanuel Abbe and Lizhong Zheng
Linear Universal Decoding for Compound Channels: a Local to Global Geometric Approach
null
null
null
null
cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over discrete memoryless channels (DMC), linear decoders (maximizing additive metrics) afford several nice properties. In particular, if suitable encoders are employed, the use of decoding algorithm with manageable complexities is permitted. Maximum likelihood is an example of linear decoder. For a compound DMC, decoders that perform well without the channel's knowledge are required in order to achieve capacity. Several such decoders have been studied in the literature. However, there is no such known decoder which is linear. Hence, the problem of finding linear decoders achieving capacity for compound DMC is addressed, and it is shown that under minor concessions, such decoders exist and can be constructed. This paper also develops a "local geometric analysis", which allows in particular, to solve the above problem. By considering very noisy channels, the original problem is reduced, in the limit, to an inner product space problem, for which insightful solutions can be found. The local setting can then provide counterexamples to disproof claims, but also, it is shown how in this problem, results proven locally can be "lifted" to results proven globally.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 14:57:49 GMT" } ]
2008-10-01T00:00:00
[ [ "Abbe", "Emmanuel", "" ], [ "Zheng", "Lizhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0809.5238
Vincent N\'elis
Vincent N\'elis and Jo\"el Goossens
Mode Change Protocol for Multi-Mode Real-Time Systems upon Identical Multiprocessors
4 pages, 2 figures
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a synchronous protocol without periodicity for scheduling multi-mode real-time systems upon identical multiprocessor platforms. Our proposal can be considered to be a multiprocessor extension of the uniprocessor protocol called "Minimal Single Offset protocol".
[ { "version": "v1", "created": "Tue, 30 Sep 2008 15:55:04 GMT" } ]
2008-10-01T00:00:00
[ [ "Nélis", "Vincent", "" ], [ "Goossens", "Joël", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0809.5250
Vincent Lariviere
Vincent Lariviere, Yves Gingras, Eric Archambault
The decline in the concentration of citations, 1900-2007
9 pages
null
null
null
physics.soc-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper challenges recent research (Evans, 2008) reporting that the concentration of cited scientific literature increases with the online availability of articles and journals. Using Thomson Reuters' Web of Science, the present paper analyses changes in the concentration of citations received (two- and five-year citation windows) by papers published between 1900 and 2005. Three measures of concentration are used: the percentage of papers that received at least one citation (cited papers); the percentage of papers needed to account for 20, 50 and 80 percent of the citations; and, the Herfindahl-Hirschman index. These measures are used for four broad disciplines: natural sciences and engineering, medical fields, social sciences, and the humanities. All these measures converge and show that, contrary to what was reported by Evans, the dispersion of citations is actually increasing.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 16:27:42 GMT" } ]
2008-10-01T00:00:00
[ [ "Lariviere", "Vincent", "" ], [ "Gingras", "Yves", "" ], [ "Archambault", "Eric", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0809.5266
Vaibhav Gowadia
Vaibhav Gowadia, Csilla Farkas, Michiharu Kudo
Checking Security Policy Compliance
23 pages; submitted to TKDE; original submission 15 mar 2007; revised 20 jan 2008
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 18:16:59 GMT" } ]
2008-10-01T00:00:00
[ [ "Gowadia", "Vaibhav", "" ], [ "Farkas", "Csilla", "" ], [ "Kudo", "Michiharu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0809.5275
Fahad Syed Muhammad
Fahad Syed Muhammad (IETR), Jean-Yves Baudais (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu Crussi\`ere (IETR)
Coded Adaptive Linear Precoded Discrete Multitone Over PLC Channel
null
International Symposium on Power-Line Communications and Its Applications, Jeju Island : Cor\'ee, R\'epublique de (2008)
10.1109/ISPLC.2008.4510410
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discrete multitone modulation (DMT) systems exploit the capabilities of orthogonal subcarriers to cope efficiently with narrowband interference, high frequency attenuations and multipath fadings with the help of simple equalization filters. Adaptive linear precoded discrete multitone (LP-DMT) system is based on classical DMT, combined with a linear precoding component. In this paper, we investigate the bit and energy allocation algorithm of an adaptive LP-DMT system taking into account the channel coding scheme. A coded adaptive LPDMT system is presented in the power line communication (PLC) context with a loading algorithm which accommodates the channel coding gains in bit and energy calculations. The performance of a concatenated channel coding scheme, consisting of an inner Wei's 4-dimensional 16-states trellis code and an outer Reed-Solomon code, in combination with the proposed algorithm is analyzed. Theoretical coding gains are derived and simulation results are presented for a fixed target bit error rate in a multicarrier scenario under power spectral density constraint. Using a multipath model of PLC channel, it is shown that the proposed coded adaptive LP-DMT system performs better than coded DMT and can achieve higher throughput for PLC applications.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 19:20:01 GMT" } ]
2010-01-19T00:00:00
[ [ "Muhammad", "Fahad Syed", "", "IETR" ], [ "Baudais", "Jean-Yves", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ], [ "Crussière", "Matthieu", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0033
Michael Freedman
M. Freedman
Complexity Classes as Mathematical Axioms
Some minor changes and one more reference. To appear in Ann. Math
null
null
null
cs.CC math.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Treating a conjecture, P^#P != NP, on the separation of complexity classes as an axiom, an implication is found in three manifold topology with little obvious connection to complexity theory. This is reminiscent of Harvey Friedman's work on finitistic interpretations of large cardinal axioms.
[ { "version": "v1", "created": "Tue, 30 Sep 2008 22:51:58 GMT" }, { "version": "v2", "created": "Tue, 4 Nov 2008 04:21:22 GMT" }, { "version": "v3", "created": "Tue, 10 Feb 2009 05:58:27 GMT" }, { "version": "v4", "created": "Tue, 16 Jun 2009 22:20:09 GMT" } ]
2009-06-17T00:00:00
[ [ "Freedman", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" } ]
0810.0052
Martin Ziegler
Matthias Fischer, Matthias Hilbig, Claudius J\"ahn, Friedhelm Meyer auf der Heide and Martin Ziegler
Planar Visibility Counting
added Section 4: Implementation and Empirical Evaluation
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a fixed virtual scene (=collection of simplices) S and given observer position p, how many elements of S are weakly visible (i.e. not fully occluded by others) from p? The present work explores the trade-off between query time and preprocessing space for these quantities in 2D: exactly, in the approximate deterministic, and in the probabilistic sense. We deduce the EXISTENCE of an O(m^2/n^2) space data structure for S that, given p and time O(log n), allows to approximate the ratio of occluded segments up to arbitrary constant absolute error; here m denotes the size of the Visibility Graph--which may be quadratic, but typically is just linear in the size n of the scene S. On the other hand, we present a data structure CONSTRUCTIBLE in O(n*log(n)+m^2*polylog(n)/k) preprocessing time and space with similar approximation properties and query time O(k*polylog n), where k<n is an arbitrary parameter. We describe an implementation of this approach and demonstrate the practical benefit of the parameter k to trade memory for query time in an empirical evaluation on three classes of benchmark scenes.
[ { "version": "v1", "created": "Wed, 1 Oct 2008 01:53:52 GMT" }, { "version": "v2", "created": "Thu, 9 Oct 2008 02:43:08 GMT" }, { "version": "v3", "created": "Thu, 5 Feb 2009 09:51:22 GMT" } ]
2009-02-05T00:00:00
[ [ "Fischer", "Matthias", "" ], [ "Hilbig", "Matthias", "" ], [ "Jähn", "Claudius", "" ], [ "der Heide", "Friedhelm Meyer auf", "" ], [ "Ziegler", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.0068
Salim El Rouayheb
Salim Y. El Rouayheb, Alex Sprintson, Costas N. Georghiades
On the Index Coding Problem and its Relation to Network Coding and Matroid Theory
submitted to transactions on information theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The \emph{index coding} problem has recently attracted a significant attention from the research community due to its theoretical significance and applications in wireless ad-hoc networks. An instance of the index coding problem includes a sender that holds a set of information messages $X=\{x_1,...,x_k\}$ and a set of receivers $R$. Each receiver $\rho=(x,H)\in R$ needs to obtain a message $x\in X$ and has prior \emph{side information} comprising a subset $H$ of $X$. The sender uses a noiseless communication channel to broadcast encoding of messages in $X$ to all clients. The objective is to find an encoding scheme that minimizes the number of transmissions required to satisfy the receivers' demands with \emph{zero error}. In this paper, we analyze the relation between the index coding problem, the more general network coding problem and the problem of finding a linear representation of a matroid. In particular, we show that any instance of the network coding and matroid representation problems can be efficiently reduced to an instance of the index coding problem. Our reduction implies that many important properties of the network coding and matroid representation problems carry over to the index coding problem. Specifically, we show that \emph{vector linear codes} outperform scalar linear codes and that vector linear codes are insufficient for achieving the optimum number of transmissions.
[ { "version": "v1", "created": "Wed, 1 Oct 2008 03:41:57 GMT" } ]
2008-10-02T00:00:00
[ [ "Rouayheb", "Salim Y. El", "" ], [ "Sprintson", "Alex", "" ], [ "Georghiades", "Costas N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0075
Alvaro Salas Humberto
Alvaro Salas (Universidad de Caldas, Universidad Nacional de Colombia, sede Manizales)
Acerca del Algoritmo de Dijkstra
In spanish, the paper contains illustrations
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we prove the correctness of Dijkstra's algorithm. We also discuss it and at the end we show an application.
[ { "version": "v1", "created": "Wed, 1 Oct 2008 04:55:11 GMT" } ]
2008-10-02T00:00:00
[ [ "Salas", "Alvaro", "", "Universidad de Caldas, Universidad Nacional de Colombia,\n sede Manizales" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.0135
Murat Alanyali
Murat Alanyali, Maxim Dashouk
Occupancy distributions of homogeneous queueing systems under opportunistic scheduling
Submitted for possible publication
null
null
null
cs.PF cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze opportunistic schemes for transmission scheduling from one of $n$ homogeneous queues whose channel states fluctuate independently. Considered schemes consist of the LCQ policy, which transmits from a longest connected queue in the entire system, and its low-complexity variants that transmit from a longest queue within a randomly chosen subset of connected queues. A Markovian model is studied where mean packet transmission time is $n^{-1}$ and packet arrival rate is $\lambda<1$ per queue. Transient and equilibrium distributions of queue occupancies are obtained in the limit as the system size $n$ tends to infinity.
[ { "version": "v1", "created": "Wed, 1 Oct 2008 15:02:16 GMT" } ]
2008-10-02T00:00:00
[ [ "Alanyali", "Murat", "" ], [ "Dashouk", "Maxim", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.0139
Wilson Wong
Wilson Wong, Wei Liu, Mohammed Bennamoun
Determining the Unithood of Word Sequences using a Probabilistic Approach
More information is available at http://explorer.csse.uwa.edu.au/reference/
3rd International Joint Conference on Natural Language Processing (IJCNLP), 2008, pages 103-110
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most research related to unithood were conducted as part of a larger effort for the determination of termhood. Consequently, novelties are rare in this small sub-field of term extraction. In addition, existing work were mostly empirically motivated and derived. We propose a new probabilistically-derived measure, independent of any influences of termhood, that provides dedicated measures to gather linguistic evidence from parsed text and statistical evidence from Google search engine for the measurement of unithood. Our comparative study using 1,825 test cases against an existing empirically-derived function revealed an improvement in terms of precision, recall and accuracy.
[ { "version": "v1", "created": "Wed, 1 Oct 2008 12:49:24 GMT" } ]
2008-10-02T00:00:00
[ [ "Wong", "Wilson", "" ], [ "Liu", "Wei", "" ], [ "Bennamoun", "Mohammed", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0810.0154
Koichiro Kitagawa
Koichiro Kitagawa and Toshiyuki Tanaka
Optimization of sequences in CDMA systems: a statistical-mechanics approach
17pages, submitted to Special Issue on Interdisciplinary Paradigms for Networking in International Journal of Computer and Telecommunications Networking
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Statistical mechanics approach is useful not only in analyzing macroscopic system performance of wireless communication systems, but also in discussing design problems of wireless communication systems. In this paper, we discuss a design problem of spreading sequences in code-division multiple-access (CDMA) systems, as an example demonstrating the usefulness of statistical mechanics approach. We analyze, via replica method, the average mutual information between inputs and outputs of a randomly-spread CDMA channel, and discuss the optimization problem with the average mutual information as a measure of optimization. It has been shown that the average mutual information is maximized by orthogonally-invariant random Welch bound equality (WBE) spreading sequences.
[ { "version": "v1", "created": "Wed, 1 Oct 2008 12:58:28 GMT" } ]
2008-10-02T00:00:00
[ [ "Kitagawa", "Koichiro", "" ], [ "Tanaka", "Toshiyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0156
Wilson Wong
Wilson Wong, Wei Liu, Mohammed Bennamoun
Determining the Unithood of Word Sequences using Mutual Information and Independence Measure
More information is available at http://explorer.csse.uwa.edu.au/reference/
10th Conference of the Pacific Association for Computational Linguistics (PACLING), 2007, pages 246-254
null
CSSE-WWONG-13
cs.AI
http://creativecommons.org/licenses/by/3.0/
Most works related to unithood were conducted as part of a larger effort for the determination of termhood. Consequently, the number of independent research that study the notion of unithood and produce dedicated techniques for measuring unithood is extremely small. We propose a new approach, independent of any influences of termhood, that provides dedicated measures to gather linguistic evidence from parsed text and statistical evidence from Google search engine for the measurement of unithood. Our evaluations revealed a precision and recall of 98.68% and 91.82% respectively with an accuracy at 95.42% in measuring the unithood of 1005 test cases.
[ { "version": "v1", "created": "Wed, 1 Oct 2008 13:00:19 GMT" } ]
2008-10-02T00:00:00
[ [ "Wong", "Wilson", "" ], [ "Liu", "Wei", "" ], [ "Bennamoun", "Mohammed", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0810.0200
Andrij Rovenchak
Andrij Rovenchak, J\'an Ma\v{c}utek, Charles Riley
Distribution of complexities in the Vai script
13 pages
Glottometrics 18, 1-12 (2009)
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the paper, we analyze the distribution of complexities in the Vai script, an indigenous syllabic writing system from Liberia. It is found that the uniformity hypothesis for complexities fails for this script. The models using Poisson distribution for the number of components and hyper-Poisson distribution for connections provide good fits in the case of the Vai script.
[ { "version": "v1", "created": "Wed, 1 Oct 2008 15:53:36 GMT" } ]
2009-02-10T00:00:00
[ [ "Rovenchak", "Andrij", "" ], [ "Mačutek", "Ján", "" ], [ "Riley", "Charles", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0810.0264
David Musser
David R. Musser, Gor V. Nishanov
A Fast Generic Sequence Matching Algorithm
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A string matching -- and more generally, sequence matching -- algorithm is presented that has a linear worst-case computing time bound, a low worst-case bound on the number of comparisons (2n), and sublinear average-case behavior that is better than that of the fastest versions of the Boyer-Moore algorithm. The algorithm retains its efficiency advantages in a wide variety of sequence matching problems of practical interest, including traditional string matching; large-alphabet problems (as in Unicode strings); and small-alphabet, long-pattern problems (as in DNA searches). Since it is expressed as a generic algorithm for searching in sequences over an arbitrary type T, it is well suited for use in generic software libraries such as the C++ Standard Template Library. The algorithm was obtained by adding to the Knuth-Morris-Pratt algorithm one of the pattern-shifting techniques from the Boyer-Moore algorithm, with provision for use of hashing in this technique. In situations in which a hash function or random access to the sequences is not available, the algorithm falls back to an optimized version of the Knuth-Morris-Pratt algorithm.
[ { "version": "v1", "created": "Wed, 1 Oct 2008 19:54:51 GMT" } ]
2008-10-02T00:00:00
[ [ "Musser", "David R.", "" ], [ "Nishanov", "Gor V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.0322
Kalyana Babu Nakshatrala
K.B. Nakshatrala and A.J.Valocchi
Non-negative mixed finite element formulations for a tensorial diffusion equation
40 pages using amsart style file, and 15 figures
null
10.1016/j.jcp.2009.05.039
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the tensorial diffusion equation, and address the discrete maximum-minimum principle of mixed finite element formulations. In particular, we address non-negative solutions (which is a special case of the maximum-minimum principle) of mixed finite element formulations. The discrete maximum-minimum principle is the discrete version of the maximum-minimum principle. In this paper we present two non-negative mixed finite element formulations for tensorial diffusion equations based on constrained optimization techniques (in particular, quadratic programming). These proposed mixed formulations produce non-negative numerical solutions on arbitrary meshes for low-order (i.e., linear, bilinear and trilinear) finite elements. The first formulation is based on the Raviart-Thomas spaces, and is obtained by adding a non-negative constraint to the variational statement of the Raviart-Thomas formulation. The second non-negative formulation based on the variational multiscale formulation. For the former formulation we comment on the affect of adding the non-negative constraint on the local mass balance property of the Raviart-Thomas formulation. We also study the performance of the active set strategy for solving the resulting constrained optimization problems. The overall performance of the proposed formulation is illustrated on three canonical test problems.
[ { "version": "v1", "created": "Thu, 2 Oct 2008 01:39:57 GMT" }, { "version": "v2", "created": "Fri, 20 Feb 2009 03:14:39 GMT" }, { "version": "v3", "created": "Sat, 16 May 2009 20:37:01 GMT" }, { "version": "v4", "created": "Thu, 18 Jun 2009 22:25:18 GMT" } ]
2015-05-13T00:00:00
[ [ "Nakshatrala", "K. B.", "" ], [ "Valocchi", "A. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0810.0326
Lu Lu
Lu Lu, Soung Chang Liew, Shengli Zhang
Collision Resolution by Exploiting Symbol Misalignment
conference
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents CRESM, a novel collision resolution method for decoding collided packets in random-access wireless networks. In a collision, overlapping signals from several sources are received simultaneously at a receiver. CRESM exploits symbol misalignment among the overlapping signals to recover the individual packets. CRESM can be adopted in 802.11 networks without modification of the transmitter design; only a simple DSP technique is needed at the receiver to decode the overlapping signals. Our simulations indicate that CRESM has better BER performance than the simplistic Successive Interference Cancellation (SIC) technique that treats interference as noise, for almost all SNR regimes. The implication of CRESM for random-access networking is significant: in general, using CRESM to resolve collisions of up to n packets, network throughput can be boosted by more than n times if the transmitters are allowed to transmit more aggressively in the MAC protocol.
[ { "version": "v1", "created": "Thu, 2 Oct 2008 02:15:07 GMT" }, { "version": "v2", "created": "Fri, 3 Oct 2008 06:08:05 GMT" } ]
2008-10-03T00:00:00
[ [ "Lu", "Lu", "" ], [ "Liew", "Soung Chang", "" ], [ "Zhang", "Shengli", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0328
Aldar C.-F. Chan
Aldar C-F. Chan
Efficient Defence against Misbehaving TCP Receiver DoS Attacks
null
Computer Networks, 2011
10.1016/j.comnet.2011.08.004
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The congestion control algorithm of TCP relies on correct feedback from the receiver to determine the rate at which packets should be sent into the network. Hence, correct receiver feedback (in the form of TCP acknowledgements) is essential to the goal of sharing the scarce bandwidth resources fairly and avoiding congestion collapse in the Internet. However, the assumption that a TCP receiver can always be trusted (to generate feedback correctly) no longer holds as there are plenty of incentives for a receiver to deviate from the protocol. In fact, it has been shown that a misbehaving receiver (whose aim is to bring about congestion collapse) can easily generate acknowledgements to conceal packet loss, so as to drive a number of honest, innocent senders arbitrarily fast to create a significant number of non-responsive packet flows, leading to denial of service to other Internet users. We give the first formal treatment to this problem. We also give an efficient, provably secure mechanism to force a receiver to generate feedback correctly; any incorrect acknowledgement will be detected at the sender and cheating TCP receivers would be identified. The idea is as follows: for each packet sent, the sender generates a tag using a secret key (known to himself only); the receiver could generate a proof using the packet and the tag alone, and send it to the sender; the sender can then verify the proof using the secret key; an incorrect proof would indicate a cheating receiver. The scheme is very efficient in the sense that the TCP sender does not need to store the packet or the tag, and the proofs for multiple packets can be aggregated at the receiver. The scheme is based on an aggregate authenticator. In addition, the proposed solution can be applied to network-layer rate-limiting architectures requiring correct feedback.
[ { "version": "v1", "created": "Thu, 2 Oct 2008 02:56:48 GMT" }, { "version": "v2", "created": "Wed, 14 Dec 2011 04:27:49 GMT" }, { "version": "v3", "created": "Tue, 27 Dec 2011 02:37:54 GMT" } ]
2021-09-21T00:00:00
[ [ "Chan", "Aldar C-F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.0332
Wilson Wong
Wilson Wong, Wei Liu, Mohammed Bennamoun
Enhanced Integrated Scoring for Cleaning Dirty Texts
More information is available at http://explorer.csse.uwa.edu.au/reference/
IJCAI Workshop on Analytics for Noisy Unstructured Text Data (AND), 2007, pages 55-62
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An increasing number of approaches for ontology engineering from text are gearing towards the use of online sources such as company intranet and the World Wide Web. Despite such rise, not much work can be found in aspects of preprocessing and cleaning dirty texts from online sources. This paper presents an enhancement of an Integrated Scoring for Spelling error correction, Abbreviation expansion and Case restoration (ISSAC). ISSAC is implemented as part of a text preprocessing phase in an ontology engineering system. New evaluations performed on the enhanced ISSAC using 700 chat records reveal an improved accuracy of 98% as compared to 96.5% and 71% based on the use of only basic ISSAC and of Aspell, respectively.
[ { "version": "v1", "created": "Thu, 2 Oct 2008 03:42:12 GMT" } ]
2008-10-03T00:00:00
[ [ "Wong", "Wilson", "" ], [ "Liu", "Wei", "" ], [ "Bennamoun", "Mohammed", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0810.0372
Luis Veiga
Filipe Cabecinhas and Nuno Lopes and Renato Crisostomo and Luis Veiga
Optimizing Binary Code Produced by Valgrind (Project Report on Virtual Execution Environments Course - AVExe)
Technical report from INESC-ID Lisboa describing optimizations to code generation of the Valgring execution environment. Work developed in the context of a Virtual Execution Environments course (AVExe) at IST/Technical university of Lisbon
null
null
null
cs.PL cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Valgrind is a widely used framework for dynamic binary instrumentation and its mostly known by its memcheck tool. Valgrind's code generation module is far from producing optimal code. In addition it has many backends for different CPU architectures, which difficults code optimization in an architecture independent way. Our work focused on identifying sub-optimal code produced by Valgrind and optimizing it.
[ { "version": "v1", "created": "Thu, 2 Oct 2008 09:41:52 GMT" } ]
2008-10-03T00:00:00
[ [ "Cabecinhas", "Filipe", "" ], [ "Lopes", "Nuno", "" ], [ "Crisostomo", "Renato", "" ], [ "Veiga", "Luis", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0810.0394
Benedek Kov\'acs
Peter Fulop, Benedek Kovacs, Sandor Imre
Mobility Management Framework
null
null
null
null
cs.PF cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates mobility management strategies from the point of view of their need of signalling and processing resources on the backbone network and load on the air interface. A method is proposed to model the serving network and mobile node mobility in order to be able to compare the different types of mobility management algorithms. To obtain a good description of the network we calculate descriptive parameters from given topologies. Most mobility approaches derived from existing protocols are analyzed and their performances are numerically compared in various network and mobility scenarios. We developed a mobility management framework that is able to give general designing guidelines for the next generation mobility managements on given network, technology and mobility properties. With our model an operator can design the network and tune the parameters to obtain the optimal implementation of course revising existing systems is also possible. We present a vertical handover decision method as a special application of our model framework.
[ { "version": "v1", "created": "Thu, 2 Oct 2008 11:44:47 GMT" } ]
2008-10-03T00:00:00
[ [ "Fulop", "Peter", "" ], [ "Kovacs", "Benedek", "" ], [ "Imre", "Sandor", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.0486
Pawel Sobkowicz
Pawel Sobkowicz
Peer-review in the Internet age
null
null
null
null
physics.soc-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The importance of peer-review in the scientific process can not be overestimated. Yet, due to increasing pressures of research and exponentially growing number of publications the task faced by the referees becomes ever more difficult. We discuss here a few possible improvements that would enable more efficient review of the scientific literature, using the growing Internet connectivity. In particular, a practical automated model for providing the referees with references to papers that might have strong relationship with the work under review, based on general network properties of citations is proposed.
[ { "version": "v1", "created": "Thu, 2 Oct 2008 17:02:18 GMT" } ]
2008-10-03T00:00:00
[ [ "Sobkowicz", "Pawel", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0810.0503
Amin Jafarian
Amin Jafarian, Sriram Vishwanath
On the Capacity of One-sided Two user Gaussian Fading Broadcast Channels
Accepted for publication at Globecom Communications Conference 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate upper and lower bounds on the capacity of two-user fading broadcast channels where one of the users has a constant (non-fading) channel. We use the Costa entropy power inequality (EPI) along with an optimization framework to derive upper bounds on the sum-capacity and superposition coding to obtain lower bounds on the sum-rate for this channel. For this fading broadcast channel where one channel is constant, we find that the upper and lower bounds meet under special cases, and in general, we show that the achievable sum-rate comes within a constant of the outer bound.
[ { "version": "v1", "created": "Thu, 2 Oct 2008 18:01:05 GMT" }, { "version": "v2", "created": "Thu, 1 Jan 2009 19:52:42 GMT" } ]
2009-01-01T00:00:00
[ [ "Jafarian", "Amin", "" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0532
Bart de Keijzer
Bart de Keijzer
Three New Complexity Results for Resource Allocation Problems
null
null
null
null
cs.MA cs.AI cs.CC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove the following results for task allocation of indivisible resources: - The problem of finding a leximin-maximal resource allocation is in P if the agents have max-utility functions and atomic demands. - Deciding whether a resource allocation is Pareto-optimal is coNP-complete for agents with (1-)additive utility functions. - Deciding whether there exists a Pareto-optimal and envy-free resource allocation is Sigma_2^p-complete for agents with (1-)additive utility functions.
[ { "version": "v1", "created": "Thu, 2 Oct 2008 20:32:52 GMT" }, { "version": "v2", "created": "Fri, 17 Oct 2008 14:02:54 GMT" } ]
2008-10-17T00:00:00
[ [ "de Keijzer", "Bart", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0810.0558
Ashish Goel
Ashish Goel, Sanjeev Khanna, Brad Null
The Ratio Index for Budgeted Learning, with Applications
This paper has a substantial bug that we are trying to fix. Many thanks to Joe Halpern for pointing this bug out. Please do not cite in the meantime. Please let us know if you would like to understand and/or try to fix the bug
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the budgeted learning problem, we are allowed to experiment on a set of alternatives (given a fixed experimentation budget) with the goal of picking a single alternative with the largest possible expected payoff. Approximation algorithms for this problem were developed by Guha and Munagala by rounding a linear program that couples the various alternatives together. In this paper we present an index for this problem, which we call the ratio index, which also guarantees a constant factor approximation. Index-based policies have the advantage that a single number (i.e. the index) can be computed for each alternative irrespective of all other alternatives, and the alternative with the highest index is experimented upon. This is analogous to the famous Gittins index for the discounted multi-armed bandit problem. The ratio index has several interesting structural properties. First, we show that it can be computed in strongly polynomial time. Second, we show that with the appropriate discount factor, the Gittins index and our ratio index are constant factor approximations of each other, and hence the Gittins index also gives a constant factor approximation to the budgeted learning problem. Finally, we show that the ratio index can be used to create an index-based policy that achieves an O(1)-approximation for the finite horizon version of the multi-armed bandit problem. Moreover, the policy does not require any knowledge of the horizon (whereas we compare its performance against an optimal strategy that is aware of the horizon). This yields the following surprising result: there is an index-based policy that achieves an O(1)-approximation for the multi-armed bandit problem, oblivious to the underlying discount factor.
[ { "version": "v1", "created": "Fri, 3 Oct 2008 01:37:45 GMT" }, { "version": "v2", "created": "Mon, 11 Apr 2016 18:47:16 GMT" } ]
2016-04-12T00:00:00
[ [ "Goel", "Ashish", "" ], [ "Khanna", "Sanjeev", "" ], [ "Null", "Brad", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.0567
Andrew Thangaraj
Andrew Thangaraj and Safitha J Raj
Reed-Solomon Subcodes with Nontrivial Traces: Distance Properties and Soft-Decision Decoding
submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reed-Solomon (RS) codes over GF$(2^m)$ have traditionally been the most popular non-binary codes in almost all practical applications. The distance properties of RS codes result in excellent performance under hard-decision bounded-distance decoding. However, efficient and implementable soft decoding for high-rate (about 0.9) RS codes over large fields (GF(256), say) continues to remain a subject of research with a promise of further coding gains. In this work, our objective is to propose and investigate $2^m$-ary codes with non-trivial binary trace codes as an alternative to RS codes. We derive bounds on the rate of a $2^m$-ary code with a non-trivial binary trace code. Then we construct certain subcodes of RS codes over GF($2^m$) that have a non-trivial binary trace with distances and rates meeting the derived bounds. The properties of these subcodes are studied and low-complexity hard-decision and soft-decision decoders are proposed. The decoders are analyzed, and their performance is compared with that of comparable RS codes. Our results suggest that these subcodes of RS codes could be viable alternatives for RS codes in applications.
[ { "version": "v1", "created": "Fri, 3 Oct 2008 04:38:17 GMT" } ]
2008-10-06T00:00:00
[ [ "Thangaraj", "Andrew", "" ], [ "Raj", "Safitha J", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0674
Shuchi Chawla
Siddharth Barman and Shuchi Chawla
Packing multiway cuts in capacitated graphs
The conference version of this paper is to appear at SODA 2009. This is the full version
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the following "multiway cut packing" problem in undirected graphs: we are given a graph G=(V,E) and k commodities, each corresponding to a set of terminals located at different vertices in the graph; our goal is to produce a collection of cuts {E_1,...,E_k} such that E_i is a multiway cut for commodity i and the maximum load on any edge is minimized. The load on an edge is defined to be the number of cuts in the solution crossing the edge. In the capacitated version of the problem the goal is to minimize the maximum relative load on any edge--the ratio of the edge's load to its capacity. Multiway cut packing arises in the context of graph labeling problems where we are given a partial labeling of a set of items and a neighborhood structure over them, and, informally, the goal is to complete the labeling in the most consistent way. This problem was introduced by Rabani, Schulman, and Swamy (SODA'08), who developed an O(log n/log log n) approximation for it in general graphs, as well as an improved O(log^2 k) approximation in trees. Here n is the number of nodes in the graph. We present the first constant factor approximation for this problem in arbitrary undirected graphs. Our approach is based on the observation that every instance of the problem admits a near-optimal laminar solution (that is, one in which no pair of cuts cross each other).
[ { "version": "v1", "created": "Fri, 3 Oct 2008 16:13:00 GMT" } ]
2008-10-06T00:00:00
[ [ "Barman", "Siddharth", "" ], [ "Chawla", "Shuchi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.0693
Tsuyoshi Ito
Tsuyoshi Ito, Hirotada Kobayashi, Keiji Matsumoto
Oracularization and Two-Prover One-Round Interactive Proofs against Nonlocal Strategies
26 pages
null
null
null
quant-ph cs.CC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A central problem in quantum computational complexity is how to prevent entanglement-assisted cheating in multi-prover interactive proof systems. It is well-known that the standard oracularization technique completely fails in some proof systems under the existence of prior entanglement. This paper studies two constructions of two-prover one-round interactive proof systems based on oracularization. First, it is proved that the two-prover one-round interactive proof system for PSPACE by Cai, Condon, and Lipton still achieves exponentially small soundness error in the existence of prior entanglement between dishonest provers (and more strongly, even if dishonest provers are allowed to use arbitrary no-signaling strategies). It follows that, unless the polynomial-time hierarchy collapses to the second level, two-prover systems are still advantageous to single-prover systems even when only malicious provers can use quantum information. Second, it is proved that the two-prover one-round interactive proof system obtained by oracularizing a three-query probabilistically checkable proof system becomes sound in a weak sense even against dishonest entangled provers with the help of a dummy question. As a consequence, every language in NEXP has a two-prover one-round interactive proof system of perfect completeness, albeit with exponentially small gap between completeness and soundness, in which each prover responds with only two bits. In other words, it is NP-hard to approximate within an inverse-polynomial the value of a classical two-prover one-round game, even when provers are entangled and each sends a two-bit answer to a verifier.
[ { "version": "v1", "created": "Fri, 3 Oct 2008 18:24:50 GMT" } ]
2008-10-06T00:00:00
[ [ "Ito", "Tsuyoshi", "" ], [ "Kobayashi", "Hirotada", "" ], [ "Matsumoto", "Keiji", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0810.0745
Jaeok Park
Jaeok Park and Mihaela van der Schaar
Stackelberg Contention Games in Multiuser Networks
30 pages, 5 figures
EURASIP Journal on Advances in Signal Processing, vol. 2009, Article ID 305978, 15 pages, 2009
10.1155/2009/305978
null
cs.GT cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interactions among selfish users sharing a common transmission channel can be modeled as a non-cooperative game using the game theory framework. When selfish users choose their transmission probabilities independently without any coordination mechanism, Nash equilibria usually result in a network collapse. We propose a methodology that transforms the non-cooperative game into a Stackelberg game. Stackelberg equilibria of the Stackelberg game can overcome the deficiency of the Nash equilibria of the original game. A particular type of Stackelberg intervention is constructed to show that any positive payoff profile feasible with independent transmission probabilities can be achieved as a Stackelberg equilibrium payoff profile. We discuss criteria to select an operating point of the network and informational requirements for the Stackelberg game. We relax the requirements and examine the effects of relaxation on performance.
[ { "version": "v1", "created": "Sat, 4 Oct 2008 04:41:38 GMT" }, { "version": "v2", "created": "Sat, 24 Jan 2009 03:04:40 GMT" }, { "version": "v3", "created": "Sat, 30 May 2009 22:39:29 GMT" } ]
2009-05-31T00:00:00
[ [ "Park", "Jaeok", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.0747
Ravi Tandon
Ravi Tandon, Sennur Ulukus
A New Upper Bound on the Capacity of a Class of Primitive Relay Channels
To appear in Proceedings of 46th Annual Allerton Conference on Communication, Control and Computing, Sept. 2008
null
null
null
cs.IT cs.AI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We obtain a new upper bound on the capacity of a class of discrete memoryless relay channels. For this class of relay channels, the relay observes an i.i.d. sequence $T$, which is independent of the channel input $X$. The channel is described by a set of probability transition functions $p(y|x,t)$ for all $(x,t,y)\in \mathcal{X}\times \mathcal{T}\times \mathcal{Y}$. Furthermore, a noiseless link of finite capacity $R_{0}$ exists from the relay to the receiver. Although the capacity for these channels is not known in general, the capacity of a subclass of these channels, namely when $T=g(X,Y)$, for some deterministic function $g$, was obtained in [1] and it was shown to be equal to the cut-set bound. Another instance where the capacity was obtained was in [2], where the channel output $Y$ can be written as $Y=X\oplus Z$, where $\oplus$ denotes modulo-$m$ addition, $Z$ is independent of $X$, $|\mathcal{X}|=|\mathcal{Y}|=m$, and $T$ is some stochastic function of $Z$. The compress-and-forward (CAF) achievability scheme [3] was shown to be capacity achieving in both cases. Using our upper bound we recover the capacity results of [1] and [2]. We also obtain the capacity of a class of channels which does not fall into either of the classes studied in [1] and [2]. For this class of channels, CAF scheme is shown to be optimal but capacity is strictly less than the cut-set bound for certain values of $R_{0}$. We also evaluate our outer bound for a particular relay channel with binary multiplicative states and binary additive noise for which the channel is given as $Y=TX+N$. We show that our upper bound is strictly better than the cut-set upper bound for certain values of $R_{0}$ but it lies strictly above the rates yielded by the CAF achievability scheme.
[ { "version": "v1", "created": "Sat, 4 Oct 2008 05:37:45 GMT" } ]
2008-10-07T00:00:00
[ [ "Tandon", "Ravi", "" ], [ "Ulukus", "Sennur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0753
Stefano Soffia
Stefano Soffia
Definition and Implementation of a Points-To Analysis for C-like Languages
135 pages
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The points-to problem is the problem of determining the possible run-time targets of pointer variables and is usually considered part of the more general aliasing problem, which consists in establishing whether and when different expressions can refer to the same memory address. Aliasing information is essential to every tool that needs to reason about the semantics of programs. However, due to well-known undecidability results, for all interesting languages that admit aliasing, the exact solution of nontrivial aliasing problems is not generally computable. This work focuses on approximated solutions to this problem by presenting a store-based, flow-sensitive points-to analysis, for applications in the field of automated software verification. In contrast to software testing procedures, which heuristically check the program against a finite set of executions, the methods considered in this work are static analyses, where the computed results are valid for all the possible executions of the analyzed program. We present a simplified programming language and its execution model; then an approximated execution model is developed using the ideas of abstract interpretation theory. Finally, the soundness of the approximation is formally proved. The aim of developing a realistic points-to analysis is pursued by presenting some extensions to the initial simplified model and discussing the correctness of their formulation. This work contains original contributions to the issue of points-to analysis, as it provides a formulation of a filter operation on the points-to abstract domain and a formal proof of the soundness of the defined abstract operations: these, as far as we now, are lacking from the previous literature.
[ { "version": "v1", "created": "Sat, 4 Oct 2008 10:34:09 GMT" } ]
2008-10-07T00:00:00
[ [ "Soffia", "Stefano", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0810.0763
Pedram Pad
Pedram Pad, Mahdi Soltanolkotabi, Saeed Hadikhanlou, Arash Enayati, and Farokh Marvasti
Errorless Codes for Over-loaded CDMA with Active User Detection
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a new class of codes for over-loaded synchronous wireless CDMA systems which increases the number of users for a fixed number of chips without introducing any errors. In addition these codes support active user detection. We derive an upper bound on the number of users with a fixed spreading factor. Also we propose an ML decoder for a subclass of these codes that is computationally implementable. Although for our simulations we consider a scenario that is worse than what occurs in practice, simulation results indicate that this coding/decoding scheme is robust against additive noise. As an example, for 64 chips and 88 users we propose a coding/decoding scheme that can obtain an arbitrary small probability of error which is computationally feasible and can detect active users. Furthermore, we prove that for this to be possible the number of users cannot be beyond 230.
[ { "version": "v1", "created": "Sat, 4 Oct 2008 12:24:39 GMT" } ]
2008-10-07T00:00:00
[ [ "Pad", "Pedram", "" ], [ "Soltanolkotabi", "Mahdi", "" ], [ "Hadikhanlou", "Saeed", "" ], [ "Enayati", "Arash", "" ], [ "Marvasti", "Farokh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0764
Pedram Pad
Mohammad Javad Faraji, Pedram Pad, and Farokh Marvasti
A New Method for Constructing Large Size WBE Codes with Low Complexity ML Decoder
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we wish to introduce a method to reconstruct large size Welch Bound Equality (WBE) codes from small size WBE codes. The advantage of these codes is that the implementation of ML decoder for the large size codes is reduced to implementation of ML decoder for the core codes. This leads to a drastic reduction of the computational cost of ML decoder. Our method can also be used for constructing large Binary WBE (BWBE) codes from smaller ones. Additionally, we explain that although WBE codes are maximizing the sum channel capacity when the inputs are real valued, they are not necessarily appropriate when the input alphabet is binary. The discussion shows that when the input alphabet is binary, the Total Squared Correlation (TSC) of codes is not a proper figure of merit.
[ { "version": "v1", "created": "Sat, 4 Oct 2008 12:36:30 GMT" }, { "version": "v2", "created": "Sat, 7 Mar 2009 10:13:02 GMT" } ]
2009-03-07T00:00:00
[ [ "Faraji", "Mohammad Javad", "" ], [ "Pad", "Pedram", "" ], [ "Marvasti", "Farokh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0785
Dario Fertonani
Dario Fertonani and Tolga M. Duman
Novel Bounds on the Capacity of the Binary Deletion Channel
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present novel bounds on the capacity of the independent and identically distributed binary deletion channel. Four upper bounds are obtained by providing the transmitter and the receiver with genie-aided information on suitably-defined random processes. Since some of the proposed bounds involve infinite series, we also introduce provable inequalities that lead to more manageable results. For most values of the deletion probability, these bounds improve the existing ones and significantly narrow the gap with the available lower bounds. Exploiting the same auxiliary processes, we also derive, as a by-product, a couple of very simple lower bounds on the channel capacity, which, for low values of the deletion probability, are almost as good as the best existing lower bounds.
[ { "version": "v1", "created": "Sat, 4 Oct 2008 19:14:50 GMT" } ]
2008-10-07T00:00:00
[ [ "Fertonani", "Dario", "" ], [ "Duman", "Tolga M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0800
Zizhong Chen
Zizhong Chen and Jack Dongarra
Condition Numbers of Gaussian Random Matrices
null
null
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $G_{m \times n}$ be an $m \times n$ real random matrix whose elements are independent and identically distributed standard normal random variables, and let $\kappa_2(G_{m \times n})$ be the 2-norm condition number of $G_{m \times n}$. We prove that, for any $m \geq 2$, $n \geq 2$ and $x \geq |n-m|+1$, $\kappa_2(G_{m \times n})$ satisfies $ \frac{1}{\sqrt{2\pi}} ({c}/{x})^{|n-m|+1} < P(\frac{\kappa_2(G_{m \times n})} {{n}/{(|n-m|+1)}}> x) < \frac{1}{\sqrt{2\pi}} ({C}/{x})^{|n-m|+1}, $ where $0.245 \leq c \leq 2.000$ and $ 5.013 \leq C \leq 6.414$ are universal positive constants independent of $m$, $n$ and $x$. Moreover, for any $m \geq 2$ and $n \geq 2$, $ E(\log\kappa_2(G_{m \times n})) < \log \frac{n}{|n-m|+1} + 2.258. $ A similar pair of results for complex Gaussian random matrices is also established.
[ { "version": "v1", "created": "Sun, 5 Oct 2008 04:18:54 GMT" } ]
2008-10-07T00:00:00
[ [ "Chen", "Zizhong", "" ], [ "Dongarra", "Jack", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0810.0830
Damien Chablat
Anatoly Pashkevich (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Stiffness Analysis Of Multi-Chain Parallel Robotic Systems
null
9th IFAC Workshop on Intelligent Manufacturing Systems, France (2008)
null
null
cs.RO physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a new stiffness modelling method for multi-chain parallel robotic manipulators with flexible links and compliant actuating joints. In contrast to other works, the method involves a FEA-based link stiffness evaluation and employs a new solution strategy of the kinetostatic equations, which allows computing the stiffness matrix for singular postures and to take into account influence of the internal forces. The advantages of the developed technique are confirmed by application examples, which deal with stiffness analysis of the Orthoglide manipulator.
[ { "version": "v1", "created": "Sun, 5 Oct 2008 15:03:22 GMT" } ]
2008-10-07T00:00:00
[ [ "Pashkevich", "Anatoly", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0810.0852
Joseph B. Keller Prof.
Joseph B. Keller
Evaluation of Authors and Journals
6 pages
null
null
null
math.HO cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A method is presented for evaluating authors on the basis of citations. It assigns to each author a citation score which depends upon the number of times he is cited, and upon the scores of the citers. The scores are found to be the components of an eigenvector of a normalized citation matrix. The same method can be applied to citation of journals by other journals, to evaluating teams in a league [1], etc.
[ { "version": "v1", "created": "Sun, 5 Oct 2008 20:36:19 GMT" } ]
2008-10-07T00:00:00
[ [ "Keller", "Joseph B.", "" ] ]
[ { "class": "Mathematics", "code": "math.HO", "description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics", "span": "(History and Overview)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0810.0870
Shih-Chun Lin
Pin-Hsun Lin, Shih-Chun Lin, Chung-Pi Lee, and Hsuan-Jung Su
Cognitive Radio with Partial Channel State Information at the Transmitter
resubmitted to IEEE Transaction on Wireless Communications, May 2009
IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3402-3413, Nov. 2010
10.1109/TWC.2010.092410.090725
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present the cognitive radio system design with partial channel state information known at the transmitter (CSIT).We replace the dirty paper coding (DPC) used in the cognitive radio with full CSIT by the linear assignment Gel'fand-Pinsker coding (LA-GPC), which can utilize the limited knowledge of the channel more efficiently. Based on the achievable rate derived from the LA-GPC, two optimization problems under the fast and slow fading channels are formulated. We derive semianalytical solutions to find the relaying ratios and precoding coefficients. The critical observation is that the complex rate functions in these problems are closely related to ratios of quadratic form. Simulation results show that the proposed semi-analytical solutions perform close to the optimal solutions found by brute-force search, and outperform the systems based on naive DPC. Asymptotic analysis also shows that these solutions converge to the optimal ones solved with full CSIT when the K-factor of Rician channel approaches infinity. Moreover, a new coding scheme is proposed to implement the LA-GPC in practice. Simulation results show that the proposed practical coding scheme can efficiently reach the theoretical rate performance.
[ { "version": "v1", "created": "Mon, 6 Oct 2008 03:41:49 GMT" }, { "version": "v2", "created": "Tue, 19 May 2009 05:14:19 GMT" } ]
2010-11-15T00:00:00
[ [ "Lin", "Pin-Hsun", "" ], [ "Lin", "Shih-Chun", "" ], [ "Lee", "Chung-Pi", "" ], [ "Su", "Hsuan-Jung", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0874
Kirill Sorudeykin Mr
Kirill A Sorudeykin
Software Engineering & Systems Design Nature
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main problems of Software Engineering appear as a result of incompatibilities. For example, the quality of organization of the production process depends on correspondence with existent resources and on a common understanding of project goals by all team members. Software design is another example. Its successfulness rides on the architecture's conformity with a project's concepts. This is a point of great nicety. All elements should create a single space of interaction. And if the laws of such a space are imperfect, missequencing comes and the concept of a software system fails. We must do our best for this not to happen. To that end, having a subtle perception of systems structures is essential. Such knowledge can be based only on a fresh approach to the logical law.
[ { "version": "v1", "created": "Mon, 6 Oct 2008 04:50:01 GMT" }, { "version": "v2", "created": "Fri, 13 Mar 2009 14:52:18 GMT" } ]
2009-03-13T00:00:00
[ [ "Sorudeykin", "Kirill A", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0810.0877
Dev Rajnarayan
Dev Rajnarayan and David Wolpert
Bias-Variance Techniques for Monte Carlo Optimization: Cross-validation for the CE Method
null
null
null
null
cs.NA cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we examine the CE method in the broad context of Monte Carlo Optimization (MCO) and Parametric Learning (PL), a type of machine learning. A well-known overarching principle used to improve the performance of many PL algorithms is the bias-variance tradeoff. This tradeoff has been used to improve PL algorithms ranging from Monte Carlo estimation of integrals, to linear estimation, to general statistical estimation. Moreover, as described by, MCO is very closely related to PL. Owing to this similarity, the bias-variance tradeoff affects MCO performance, just as it does PL performance. In this article, we exploit the bias-variance tradeoff to enhance the performance of MCO algorithms. We use the technique of cross-validation, a technique based on the bias-variance tradeoff, to significantly improve the performance of the Cross Entropy (CE) method, which is an MCO algorithm. In previous work we have confirmed that other PL techniques improve the perfomance of other MCO algorithms. We conclude that the many techniques pioneered in PL could be investigated as ways to improve MCO algorithms in general, and the CE method in particular.
[ { "version": "v1", "created": "Mon, 6 Oct 2008 04:58:44 GMT" } ]
2008-10-07T00:00:00
[ [ "Rajnarayan", "Dev", "" ], [ "Wolpert", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0810.0882
Chien-Hwa Hwang
Chien-Hwa Hwang
Asymptotic Eigenvalue Moments of Wishart-Type Random Matrix Without Ergodicity in One Channel Realization
36 pages, 6 figures, submitted to IEEE Transactions on Information Theory, Oct. 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a random matrix whose variance profile is random. This random matrix is ergodic in one channel realization if, for each column and row, the empirical distribution of the squared magnitudes of elements therein converges to a nonrandom distribution. In this paper, noncrossing partition theory is employed to derive expressions for several asymptotic eigenvalue moments (AEM) related quantities of a large Wishart-type random matrix $\bb H\bb H^\dag$ when $\bb H$ has a random variance profile and is nonergodic in one channel realization. It is known the empirical eigenvalue moments of $\bb H\bb H^\dag$ are dependent (or independent) on realizations of the variance profile of $\bb H$ when $\bb H$ is nonergodic (or ergodic) in one channel realization. For nonergodic $\bb H$, the AEM can be obtained by i) deriving the expression of AEM in terms of the variance profile of $\bb H$, and then ii) averaging the derived quantity over the ensemble of variance profiles. Since the AEM are independent of the variance profile if $\bb H$ is ergodic, the expression obtained in i) can also serve as the AEM formula for ergodic $\bb H$ when any realization of variance profile is available.
[ { "version": "v1", "created": "Mon, 6 Oct 2008 05:31:40 GMT" } ]
2008-10-07T00:00:00
[ [ "Hwang", "Chien-Hwa", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0883
K. Raj Kumar
K. Raj Kumar, G. Caire and A. L. Moustakas
Asymptotic Performance of Linear Receivers in MIMO Fading Channels
48 pages, Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2027493
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear receivers are an attractive low-complexity alternative to optimal processing for multi-antenna MIMO communications. In this paper we characterize the information-theoretic performance of MIMO linear receivers in two different asymptotic regimes. For fixed number of antennas, we investigate the limit of error probability in the high-SNR regime in terms of the Diversity-Multiplexing Tradeoff (DMT). Following this, we characterize the error probability for fixed SNR in the regime of large (but finite) number of antennas. As far as the DMT is concerned, we report a negative result: we show that both linear Zero-Forcing (ZF) and linear Minimum Mean-Square Error (MMSE) receivers achieve the same DMT, which is largely suboptimal even in the case where outer coding and decoding is performed across the antennas. We also provide an approximate quantitative analysis of the markedly different behavior of the MMSE and ZF receivers at finite rate and non-asymptotic SNR, and show that while the ZF receiver achieves poor diversity at any finite rate, the MMSE receiver error curve slope flattens out progressively, as the coding rate increases. When SNR is fixed and the number of antennas becomes large, we show that the mutual information at the output of a MMSE or ZF linear receiver has fluctuations that converge in distribution to a Gaussian random variable, whose mean and variance can be characterized in closed form. This analysis extends to the linear receiver case a well-known result previously obtained for the optimal receiver. Simulations reveal that the asymptotic analysis captures accurately the outage behavior of systems even with a moderate number of antennas.
[ { "version": "v1", "created": "Mon, 6 Oct 2008 05:32:20 GMT" }, { "version": "v2", "created": "Thu, 19 Feb 2009 04:34:27 GMT" } ]
2016-11-18T00:00:00
[ [ "Kumar", "K. Raj", "" ], [ "Caire", "G.", "" ], [ "Moustakas", "A. L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.0906
Hirotaka Ono
Toru Hasunuma, Toshimasa Ishii, Hirotaka Ono, Yushi Uno
A linear time algorithm for L(2,1)-labeling of trees
23 pages, 3 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An L(2,1)-labeling of a graph $G$ is an assignment $f$ from the vertex set $V(G)$ to the set of nonnegative integers such that $|f(x)-f(y)|\ge 2$ if $x$ and $y$ are adjacent and $|f(x)-f(y)|\ge 1$ if $x$ and $y$ are at distance 2, for all $x$ and $y$ in $V(G)$. A $k$-L(2,1)-labeling is an assignment $f:V(G)\to\{0,..., k\}$, and the L(2,1)-labeling problem asks the minimum $k$, which we denote by $\lambda(G)$, among all possible assignments. It is known that this problem is NP-hard even for graphs of treewidth 2, and tree is one of a very few classes for which the problem is polynomially solvable. The running time of the best known algorithm for trees had been $\mO(\Delta^{4.5} n)$ for more than a decade, however, an $\mO(n^{1.75})$-time algorithm has been proposed recently, which substantially improved the previous one, where $\Delta$ is the maximum degree of $T$ and $n=|V(T)|$. In this paper, we finally establish a linear time algorithm for L(2,1)-labeling of trees.
[ { "version": "v1", "created": "Mon, 6 Oct 2008 08:21:17 GMT" }, { "version": "v2", "created": "Wed, 24 Nov 2010 07:06:08 GMT" } ]
2010-11-25T00:00:00
[ [ "Hasunuma", "Toru", "" ], [ "Ishii", "Toshimasa", "" ], [ "Ono", "Hirotaka", "" ], [ "Uno", "Yushi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.1018
Alexander Russell
Cristopher Moore and Alexander Russell
A simple constant-probability RP reduction from NP to Parity P
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The proof of Toda's celebrated theorem that the polynomial hierarchy is contained in $\P^{# P}$ relies on the fact that, under mild technical conditions on the complexity class $C$, we have $\exists C \subset BP \cdot \oplus C$. More concretely, there is a randomized reduction which transforms nonempty sets and the empty set, respectively, into sets of odd or even size. The customary method is to invoke Valiant's and Vazirani's randomized reduction from NP to UP, followed by amplification of the resulting success probability from $1/\poly(n)$ to a constant by combining the parities of $\poly(n)$ trials. Here we give a direct algebraic reduction which achieves constant success probability without the need for amplification. Our reduction is very simple, and its analysis relies on well-known properties of the Legendre symbol in finite fields.
[ { "version": "v1", "created": "Mon, 6 Oct 2008 17:23:06 GMT" } ]
2008-10-07T00:00:00
[ [ "Moore", "Cristopher", "" ], [ "Russell", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0810.1103
Prasanna Chaporkar
Prasanna Chaporkar, Kimmo Kansanen, Ralf R. M\"uller
Channel and Multiuser Diversities in Wireless Systems: Delay-Energy Tradeoff
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a communication system with multi-access fading channel. Each user in the system requires certain rate guarantee. Our main contribution is to devise a scheduling scheme called "Opportunistic Super-position Coding" that satisfies the users' rate requirements. Using mean-field analysis, i.e., when the number of users go to infinity, we analytically show that the energy required to guarantee the required user rate can be made as small as required at the cost of a higher delay ("delay-energy tradeoff"). We explicitly compute the delay under the proposed scheduling policy and discuss how delay differentiation can be achieved. We extend the results to multi-band multi-access channel. Finally, all the results can be generalized in a straightforward fashion to broadcast channel due to the AWGN multiaccess-broadcast duality.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 06:00:35 GMT" } ]
2009-11-24T00:00:00
[ [ "Chaporkar", "Prasanna", "" ], [ "Kansanen", "Kimmo", "" ], [ "Müller", "Ralf R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1105
Anantha Raman Krishnan
Shashi Kiran Chilappagari, Anantha Raman Krishnan, Bane Vasic, Michael W. Marcellin
Low-Density Parity-Check Codes Which Can Correct Three Errors Under Iterative Decoding
25 pages. 11 Figures. Part of the work was presented at the Information Theory Workshop (ITW), May 5-9 2008, Porto, Portugal. submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we give necessary and sufficient conditions for low-density parity-check (LDPC) codes with column-weight three to correct three errors when decoded using hard-decision message-passing decoding. Additionally, we give necessary and sufficient conditions for column-weight-four codes to correct three errors in four iterations of hard-decision message-passing decoding. We then give a construction technique which results in codes satisfying these conditions. We also provide numerical assessment of code performance via simulation results.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 06:22:16 GMT" } ]
2009-09-29T00:00:00
[ [ "Chilappagari", "Shashi Kiran", "" ], [ "Krishnan", "Anantha Raman", "" ], [ "Vasic", "Bane", "" ], [ "Marcellin", "Michael W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1106
Kees Middelburg
J.A. Bergstra, C.A. Middelburg
On the expressiveness of single-pass instruction sequences
14 pages; error corrected, acknowledgement added; another error corrected, another acknowledgement added
Theory of Computing Systems, 50(2):313--328, 2012
10.1007/s00224-010-9301-8
PRG0813
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We perceive programs as single-pass instruction sequences. A single-pass instruction sequence under execution is considered to produce a behaviour to be controlled by some execution environment. Threads as considered in basic thread algebra model such behaviours. We show that all regular threads, i.e. threads that can only be in a finite number of states, can be produced by single-pass instruction sequences without jump instructions if use can be made of Boolean registers. We also show that, in the case where goto instructions are used instead of jump instructions, a bound to the number of labels restricts the expressiveness.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 06:51:53 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2008 08:28:59 GMT" }, { "version": "v3", "created": "Tue, 13 Jan 2009 08:14:05 GMT" } ]
2012-01-12T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0810.1119
Danny Bickson
Ori Shental, Danny Bickson, Paul H. Siegel, Jack K. Wolf and Danny Dolev
Gaussian Belief Propagation for Solving Systems of Linear Equations: Theory and Application
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The canonical problem of solving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. In this contribution, we develop a solution based upon Gaussian belief propagation (GaBP) that does not involve direct matrix inversion. The iterative nature of our approach allows for a distributed message-passing implementation of the solution algorithm. We address the properties of the GaBP solver, including convergence, exactness, computational complexity, message-passing efficiency and its relation to classical solution methods. We use numerical examples and applications, like linear detection, to illustrate these properties through the use of computer simulations. This empirical study demonstrates the attractiveness (e.g., faster convergence rate) of the proposed GaBP solver in comparison to conventional linear-algebraic iterative solution methods.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 08:06:42 GMT" } ]
2008-10-08T00:00:00
[ [ "Shental", "Ori", "" ], [ "Bickson", "Danny", "" ], [ "Siegel", "Paul H.", "" ], [ "Wolf", "Jack K.", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1132
Moufida Maimour
Moufida Maimour (CRAN)
Maximally Radio-Disjoint Multipath Routing for Wireless Multimedia Sensor Networks
null
Fourth ACM International Workshop on Wireless Multimedia Networking and erformance Modeling, Vancouver : Canada (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In wireless sensor networks, bandwidth is one of precious resources to multimedia applications. To get more bandwidth, multipath routing is one appropriate solution provided that inter-path interferences are minimized. In this paper, we address the problem of interfering paths in the context of wireless multimedia sensor networks and consider both intra-session as well as inter-session interferences. Our main objective is to provide necessary bandwidth to multimedia applications through non-interfering paths while increasing the network lifetime. To do so, we adopt an incremental approach where for a given session, only one path is built at once. Additional paths are built when required, typically in case of congestion or bandwidth shortage. Interference awareness and energy saving are achieved by switching a subset of sensor nodes in a {\em passive state} in which they do not take part in the routing process. Despite the routing overhead introduced by the incremental approach we adopt, our simulations show that this can be compensated by the overall achieved throughput and the amount of consumed energy per correctly received packet especially for relatively long sessions such as multimedia ones. This is mainly due to the fact that a small number of non-interfering paths allows for better performances than a large number of interfering ones.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 09:04:06 GMT" } ]
2008-10-08T00:00:00
[ [ "Maimour", "Moufida", "", "CRAN" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.1139
Moufida Maimour
Moufida Maimour (CRAN), Congduc Pham (LIUPPA), Julien Amelot (CRAN)
Load Repartition for Congestion Control in Multimedia Wireless Sensor Networks with Multipath Routing
null
3rd International Symposium on Wireless Pervasive Computing, ISWPC 2008, Santorini : Gr\`ece (2008)
10.1109/ISWPC.2008.4556156
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless sensor networks hold a great potential in the deployment of several applications of a paramount importance in our daily life. Video sensors are able to improve a number of these applications where new approaches adapted to both wireless sensor networks and video transport specific characteristics are required. The aim of this work is to provide the necessary bandwidth and to alleviate the congestion problem to video streaming. In this paper, we investigate various load repartition strategies for congestion control mechanism on top of a multipath routing feature. Simulations are performed in order to get insight into the performances of our proposals.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 09:32:40 GMT" } ]
2009-01-18T00:00:00
[ [ "Maimour", "Moufida", "", "CRAN" ], [ "Pham", "Congduc", "", "LIUPPA" ], [ "Amelot", "Julien", "", "CRAN" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.1151
Alban Ponse
Jan A. Bergstra and Alban Ponse
Periodic Single-Pass Instruction Sequences
16 pages, 3 tables, New title
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A program is a finite piece of data that produces a (possibly infinite) sequence of primitive instructions. From scratch we develop a linear notation for sequential, imperative programs, using a familiar class of primitive instructions and so-called repeat instructions, a particular type of control instructions. The resulting mathematical structure is a semigroup. We relate this set of programs to program algebra (PGA) and show that a particular subsemigroup is a carrier for PGA by providing axioms for single-pass congruence, structural congruence, and thread extraction. This subsemigroup characterizes periodic single-pass instruction sequences and provides a direct basis for PGA's toolset.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 13:55:21 GMT" }, { "version": "v2", "created": "Tue, 16 Apr 2013 12:11:12 GMT" } ]
2013-04-17T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Ponse", "Alban", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0810.1186
Hubie Chen
Hubie Chen, Omer Gimenez
On-the-fly Macros
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a domain-independent algorithm that computes macros in a novel way. Our algorithm computes macros "on-the-fly" for a given set of states and does not require previously learned or inferred information, nor prior domain knowledge. The algorithm is used to define new domain-independent tractable classes of classical planning that are proved to include \emph{Blocksworld-arm} and \emph{Towers of Hanoi}.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 13:10:26 GMT" }, { "version": "v2", "created": "Thu, 5 Jul 2012 14:54:51 GMT" } ]
2015-03-13T00:00:00
[ [ "Chen", "Hubie", "" ], [ "Gimenez", "Omer", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0810.1187
Onur Ozan Koyluoglu
Onur Ozan Koyluoglu, Hesham El Gamal, Lifeng Lai, and H. Vincent Poor
Interference Alignment for Secrecy
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2132430
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the frequency/time selective $K$-user Gaussian interference channel with secrecy constraints. Two distinct models, namely the interference channel with confidential messages and the one with an external eavesdropper, are analyzed. The key difference between the two models is the lack of channel state information (CSI) about the external eavesdropper. Using interference alignment along with secrecy pre-coding, it is shown that each user can achieve non-zero secure Degrees of Freedom (DoF) for both cases. More precisely, the proposed coding scheme achieves $\frac{K-2}{2K-2}$ secure DoF {\em with probability one} per user in the confidential messages model. For the external eavesdropper scenario, on the other hand, it is shown that each user can achieve $\frac{K-2}{2K}$ secure DoF {\em in the ergodic setting}. Remarkably, these results establish the {\em positive impact} of interference on the secrecy capacity region of wireless networks.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 13:13:25 GMT" } ]
2016-11-17T00:00:00
[ [ "Koyluoglu", "Onur Ozan", "" ], [ "Gamal", "Hesham El", "" ], [ "Lai", "Lifeng", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1197
Enrico Paolini
E. Paolini and M. Chiani
Construction of Near-Optimum Burst Erasure Correcting Low-Density Parity-Check Codes
15 pages, 4 figures. IEEE Trans. on Communications, accepted (submitted in Feb. 2007)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a simple, general-purpose and effective tool for the design of low-density parity-check (LDPC) codes for iterative correction of bursts of erasures is presented. The design method consists in starting from the parity-check matrix of an LDPC code and developing an optimized parity-check matrix, with the same performance on the memory-less erasure channel, and suitable also for the iterative correction of single bursts of erasures. The parity-check matrix optimization is performed by an algorithm called pivot searching and swapping (PSS) algorithm, which executes permutations of carefully chosen columns of the parity-check matrix, after a local analysis of particular variable nodes called stopping set pivots. This algorithm can be in principle applied to any LDPC code. If the input parity-check matrix is designed for achieving good performance on the memory-less erasure channel, then the code obtained after the application of the PSS algorithm provides good joint correction of independent erasures and single erasure bursts. Numerical results are provided in order to show the effectiveness of the PSS algorithm when applied to different categories of LDPC codes.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 14:08:35 GMT" } ]
2008-10-08T00:00:00
[ [ "Paolini", "E.", "" ], [ "Chiani", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1199
Pascal Vaillant
Pascal Vaillant
Une grammaire formelle du cr\'eole martiniquais pour la g\'en\'eration automatique
In French. 10 pages, 4 figures, LaTeX 2e using EPSF and custom package Taln2003.sty (JC/PZ, ATALA). Proceedings of the 10th annual French-speaking conference on Natural Language Processing: `Traitement Automatique des Langues Naturelles' (TALN 2003), Batz-sur-mer, France, 10-14 June 2003
Actes de la 10eme conference annuelle sur le Traitement Automatique des Langues Naturelles (TALN 2003), p. 255-264. Batz-sur-mer, France, 10-14 juin 2003
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, some first elements of a computational modelling of the grammar of the Martiniquese French Creole dialect are presented. The sources of inspiration for the modelling is the functional description given by Damoiseau (1984), and Pinalie's & Bernabe's (1999) grammar manual. Based on earlier works in text generation (Vaillant, 1997), a unification grammar formalism, namely Tree Adjoining Grammars (TAG), and a modelling of lexical functional categories based on syntactic and semantic properties, are used to implement a grammar of Martiniquese Creole which is used in a prototype of text generation system. One of the main applications of the system could be its use as a tool software supporting the task of learning Creole as a second language. -- Nous pr\'esenterons dans cette communication les premiers travaux de mod\'elisation informatique d'une grammaire de la langue cr\'eole martiniquaise, en nous inspirant des descriptions fonctionnelles de Damoiseau (1984) ainsi que du manuel de Pinalie & Bernab\'e (1999). Prenant appui sur des travaux ant\'erieurs en g\'en\'eration de texte (Vaillant, 1997), nous utilisons un formalisme de grammaires d'unification, les grammaires d'adjonction d'arbres (TAG d'apr\`es l'acronyme anglais), ainsi qu'une mod\'elisation de cat\'egories lexicales fonctionnelles \`a base syntaxico-s\'emantique, pour mettre en oeuvre une grammaire du cr\'eole martiniquais utilisable dans une maquette de syst\`eme de g\'en\'eration automatique. L'un des int\'er\^ets principaux de ce syst\`eme pourrait \^etre son utilisation comme logiciel outil pour l'aide \`a l'apprentissage du cr\'eole en tant que langue seconde.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 14:40:19 GMT" } ]
2008-10-08T00:00:00
[ [ "Vaillant", "Pascal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0810.1207
Pascal Vaillant
Pascal Vaillant
A Layered Grammar Model: Using Tree-Adjoining Grammars to Build a Common Syntactic Kernel for Related Dialects
8 pages, 3 figures, 2 tables. LaTeX 2e using the coling08 style (and standard packages like epsf, amssymb, multirow, url...). Proceedings of the 9th International Workshop on Tree Adjoining Grammars and Related Formalisms. Tuebingen, Baden-Wurttemberg, Germany, 6-8 June 2008
Proceedings of the Ninth International Workshop on Tree Adjoining Grammars and Related Formalisms (TAG+9 2008), p. 157-164. Tuebingen, Baden-Wurttemberg, Germany, 6-8 June 2008
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article describes the design of a common syntactic description for the core grammar of a group of related dialects. The common description does not rely on an abstract sub-linguistic structure like a metagrammar: it consists in a single FS-LTAG where the actual specific language is included as one of the attributes in the set of attribute types defined for the features. When the lang attribute is instantiated, the selected subset of the grammar is equivalent to the grammar of one dialect. When it is not, we have a model of a hybrid multidialectal linguistic system. This principle is used for a group of creole languages of the West-Atlantic area, namely the French-based Creoles of Haiti, Guadeloupe, Martinique and French Guiana.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 14:50:59 GMT" } ]
2008-10-08T00:00:00
[ [ "Vaillant", "Pascal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0810.1212
Pascal Vaillant
Pascal Vaillant, Richard Nock and Claudia Henry
Analyse spectrale des textes: d\'etection automatique des fronti\`eres de langue et de discours
In French. 10 pages, 5 figures, LaTeX 2e using EPSF and custom package taln2006.sty (designed by Pierre Zweigenbaum, ATALA). Proceedings of the 13th annual French-speaking conference on Natural Language Processing: `Traitement Automatique des Langues Naturelles' (TALN 2006), Louvain (Leuven), Belgium, 10-13 April 2003
Verbum ex machina: Actes de la 13eme conference annuelle sur le Traitement Automatique des Langues Naturelles (TALN 2006), p. 619-629. Louvain (Leuven), Belgique, 10-13 avril 2006
null
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a theoretical framework within which information on the vocabulary of a given corpus can be inferred on the basis of statistical information gathered on that corpus. Inferences can be made on the categories of the words in the vocabulary, and on their syntactical properties within particular languages. Based on the same statistical data, it is possible to build matrices of syntagmatic similarity (bigram transition matrices) or paradigmatic similarity (probability for any pair of words to share common contexts). When clustered with respect to their syntagmatic similarity, words tend to group into sublanguage vocabularies, and when clustered with respect to their paradigmatic similarity, into syntactic or semantic classes. Experiments have explored the first of these two possibilities. Their results are interpreted in the frame of a Markov chain modelling of the corpus' generative processe(s): we show that the results of a spectral analysis of the transition matrix can be interpreted as probability distributions of words within clusters. This method yields a soft clustering of the vocabulary into sublanguages which contribute to the generation of heterogeneous corpora. As an application, we show how multilingual texts can be visually segmented into linguistically homogeneous segments. Our method is specifically useful in the case of related languages which happened to be mixed in corpora.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 15:25:31 GMT" } ]
2008-10-08T00:00:00
[ [ "Vaillant", "Pascal", "" ], [ "Nock", "Richard", "" ], [ "Henry", "Claudia", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0810.1226
Attila Fekete
Attila Fekete
Traffic Dynamics of Computer Networks
phd thesis (135 pages, 62 figures)
null
null
null
cs.NI cond-mat.stat-mech
http://creativecommons.org/licenses/publicdomain/
Two important aspects of the Internet, namely the properties of its topology and the characteristics of its data traffic, have attracted growing attention of the physics community. My thesis has considered problems of both aspects. First I studied the stochastic behavior of TCP, the primary algorithm governing traffic in the current Internet, in an elementary network scenario consisting of a standalone infinite-sized buffer and an access link. The effect of the fast recovery and fast retransmission (FR/FR) algorithms is also considered. I showed that my model can be extended further to involve the effect of link propagation delay, characteristic of WAN. I continued my thesis with the investigation of finite-sized semi-bottleneck buffers, where packets can be dropped not only at the link, but also at the buffer. I demonstrated that the behavior of the system depends only on a certain combination of the parameters. Moreover, an analytic formula was derived that gives the ratio of packet loss rate at the buffer to the total packet loss rate. This formula makes it possible to treat buffer-losses as if they were link-losses. Finally, I studied computer networks from a structural perspective. I demonstrated through fluid simulations that the distribution of resources, specifically the link bandwidth, has a serious impact on the global performance of the network. Then I analyzed the distribution of edge betweenness in a growing scale-free tree under the condition that a local property, the in-degree of the "younger" node of an arbitrary edge, is known in order to find an optimum distribution of link capacity. The derived formula is exact even for finite-sized networks. I also calculated the conditional expectation of edge betweenness, rescaled for infinite networks.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 15:54:06 GMT" } ]
2008-10-08T00:00:00
[ [ "Fekete", "Attila", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" } ]
0810.1234
Ali Parandehgheibi
Ali ParandehGheibi, Atilla Eryilmaz, Asuman Ozdaglar, Muriel Medard
On Resource Allocation in Fading Multiple Access Channels - An Efficient Approximate Projection Approach
32 pages, Submitted to IEEE Trans. on Information Theory
null
10.1109/TIT.2010.2053902
LIDS report 2787
cs.IT cs.NI math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of rate and power allocation in a multiple-access channel. Our objective is to obtain rate and power allocation policies that maximize a general concave utility function of average transmission rates on the information theoretic capacity region of the multiple-access channel. Our policies does not require queue-length information. We consider several different scenarios. First, we address the utility maximization problem in a nonfading channel to obtain the optimal operating rates, and present an iterative gradient projection algorithm that uses approximate projection. By exploiting the polymatroid structure of the capacity region, we show that the approximate projection can be implemented in time polynomial in the number of users. Second, we consider resource allocation in a fading channel. Optimal rate and power allocation policies are presented for the case that power control is possible and channel statistics are available. For the case that transmission power is fixed and channel statistics are unknown, we propose a greedy rate allocation policy and provide bounds on the performance difference of this policy and the optimal policy in terms of channel variations and structure of the utility function. We present numerical results that demonstrate superior convergence rate performance for the greedy policy compared to queue-length based policies. In order to reduce the computational complexity of the greedy policy, we present approximate rate allocation policies which track the greedy policy within a certain neighborhood that is characterized in terms of the speed of fading.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 16:29:10 GMT" } ]
2016-11-15T00:00:00
[ [ "ParandehGheibi", "Ali", "" ], [ "Eryilmaz", "Atilla", "" ], [ "Ozdaglar", "Asuman", "" ], [ "Medard", "Muriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0810.1248
Ali Parandehgheibi
Ali ParandehGheibi, Atilla Eryilmaz, Asuman Ozdaglar, Muriel Medard
Resource Allocation in Multiple Access Channels
5 pages, In proc. of ACSSC 2007
null
null
null
cs.IT cs.NI math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of rate allocation in a Gaussian multiple-access channel, with the goal of maximizing a utility function over transmission rates. In contrast to the literature which focuses on linear utility functions, we study general concave utility functions. We present a gradient projection algorithm for this problem. Since the constraint set of the problem is described by exponentially many constraints, methods that use exact projections are computationally intractable. Therefore, we develop a new method that uses approximate projections. We use the polymatroid structure of the capacity region to show that the approximate projection can be implemented by a recursive algorithm in time polynomial in the number of users. We further propose another algorithm for implementing the approximate projections using rate-splitting and show improved bounds on its convergence time.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 17:29:52 GMT" } ]
2008-10-08T00:00:00
[ [ "ParandehGheibi", "Ali", "" ], [ "Eryilmaz", "Atilla", "" ], [ "Ozdaglar", "Asuman", "" ], [ "Medard", "Muriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0810.1253
Ali Parandehgheibi
Ali ParandehGheibi, Atilla Eryilmaz, Asuman Ozdaglar, Muriel Medard
Dynamic Rate Allocation in Fading Multiple-access Channels
9 pages, In proc. of ITA 2008
null
null
null
cs.IT cs.NI math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of rate allocation in a fading Gaussian multiple-access channel (MAC) with fixed transmission powers. Our goal is to maximize a general concave utility function of transmission rates over the throughput capacity region. In contrast to earlier works in this context that propose solutions where a potentially complex optimization problem must be solved in every decision instant, we propose a low-complexity approximate rate allocation policy and analyze the effect of temporal channel variations on its utility performance. To the best of our knowledge, this is the first work that studies the tracking capabilities of an approximate rate allocation scheme under fading channel conditions. We build on an earlier work to present a new rate allocation policy for a fading MAC that implements a low-complexity approximate gradient projection iteration for each channel measurement, and explicitly characterize the effect of the speed of temporal channel variations on the tracking neighborhood of our policy. We further improve our results by proposing an alternative rate allocation policy for which tighter bounds on the size of the tracking neighborhood are derived. These proposed rate allocation policies are computationally efficient in our setting since they implement a single gradient projection iteration per channel measurement and each such iteration relies on approximate projections which has polynomial-complexity in the number of users.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 17:55:19 GMT" } ]
2008-10-08T00:00:00
[ [ "ParandehGheibi", "Ali", "" ], [ "Eryilmaz", "Atilla", "" ], [ "Ozdaglar", "Asuman", "" ], [ "Medard", "Muriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0810.1260
Ali Parandehgheibi
Ali ParandehGheibi, Atilla Eryilmaz, Asuman Ozdaglar, Muriel Medard
Rate and Power Allocation in Fading Multiple Access Channels
6 pages, In proc. of WiOpt 2008
null
null
null
cs.IT cs.NI math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of rate and power allocation in a fading multiple-access channel. Our objective is to obtain rate and power allocation policies that maximize a utility function defined over average transmission rates. In contrast with the literature, which focuses on the linear case, we present results for general concave utility functions. We consider two cases. In the first case, we assume that power control is possible and channel statistics are known. In this case, we show that the optimal policies can be obtained greedily by maximizing a linear utility function at each channel state. In the second case, we assume that power control is not possible and channel statistics are not available. In this case, we define a greedy rate allocation policy and provide upper bounds on the performance difference between the optimal and the greedy policy. Our bounds highlight the dependence of the performance difference on the channel variations and the structure of the utility function.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 18:08:10 GMT" } ]
2008-10-08T00:00:00
[ [ "ParandehGheibi", "Ali", "" ], [ "Eryilmaz", "Atilla", "" ], [ "Ozdaglar", "Asuman", "" ], [ "Medard", "Muriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0810.1261
Pascal Vaillant
Richard Nock, Pascal Vaillant, Frank Nielsen and Claudia Henry
Soft Uncoupling of Markov Chains for Permeable Language Distinction: A New Algorithm
6 pages, 7 embedded figures, LaTeX 2e using the ecai2006.cls document class and the algorithm2e.sty style file (+ standard packages like epsfig, amsmath, amssymb, amsfonts...). Extends the short version contained in the ECAI 2006 proceedings
ECAI 2006: 17th European Conference on Artificial Intelligence. Riva del Garda, Italy, 29 August - 1st September 2006
null
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Without prior knowledge, distinguishing different languages may be a hard task, especially when their borders are permeable. We develop an extension of spectral clustering -- a powerful unsupervised classification toolbox -- that is shown to resolve accurately the task of soft language distinction. At the heart of our approach, we replace the usual hard membership assignment of spectral clustering by a soft, probabilistic assignment, which also presents the advantage to bypass a well-known complexity bottleneck of the method. Furthermore, our approach relies on a novel, convenient construction of a Markov chain out of a corpus. Extensive experiments with a readily available system clearly display the potential of the method, which brings a visually appealing soft distinction of languages that may define altogether a whole corpus.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 18:09:07 GMT" } ]
2008-10-08T00:00:00
[ [ "Nock", "Richard", "" ], [ "Vaillant", "Pascal", "" ], [ "Nielsen", "Frank", "" ], [ "Henry", "Claudia", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]