id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0809.4807 | Lun Dong | Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent Poor | Secure Wireless Communications via Cooperation | 7 pages, 5 figures, appeared in 2008 Allerton Conference on
Communication, Control, and Computing | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The feasibility of physical-layer-based security approaches for wireless
communications in the presence of one or more eavesdroppers is hampered by
channel conditions. In this paper, cooperation is investigated as an approach
to overcome this problem and improve the performance of secure communications.
In particular, a decode-and-forward (DF) based cooperative protocol is
considered, and the objective is to design the system for secrecy capacity
maximization or transmit power minimization. System design for the DF-based
cooperative protocol is first studied by assuming the availability of global
channel state information (CSI). For the case of one eavesdropper, an iterative
scheme is proposed to obtain the optimal solution for the problem of transmit
power minimization. For the case of multiple eavesdroppers, the problem of
secrecy capacity maximization or transmit power minimization is in general
intractable. Suboptimal system design is proposed by adding an additional
constraint, i.e., the complete nulling of signals at all eavesdroppers, which
yields simple closed-form solutions for the aforementioned two problems. Then,
the impact of imperfect CSI of eavesdroppers on system design is studied, in
which the ergodic secrecy capacity is of interest.
| [
{
"version": "v1",
"created": "Sat, 27 Sep 2008 23:44:14 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Dong",
"Lun",
""
],
[
"Han",
"Zhu",
""
],
[
"Petropulu",
"Athina P.",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.4812 | Eric Feron | Eric Feron and Fernando Alegre | Control software analysis, Part I Open-loop properties | 20 pages, 3 figures | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As the digital world enters further into everyday life, questions are raised
about the increasing challenges brought by the interaction of real-time
software with physical devices. Many accidents and incidents encountered in
areas as diverse as medical systems, transportation systems or weapon systems
are ultimately attributed to "software failures". Since real-time software that
interacts with physical systems might as well be called control software, the
long litany of accidents due to real-time software failures might be taken as
an equally long list of opportunities for control systems engineering. In this
paper, we are interested only in run-time errors in those pieces of software
that are a direct implementation of control system specifications: For
well-defined and well-understood control architectures such as those present in
standard textbooks on digital control systems, the current state of theoretical
computer science is well-equipped enough to address and analyze control
algorithms. It appears that a central element to these analyses is Lyapunov
stability theory, which translate into invariant theory in computer
implementations.
| [
{
"version": "v1",
"created": "Sun, 28 Sep 2008 01:44:28 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Feron",
"Eric",
""
],
[
"Alegre",
"Fernando",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0809.4821 | Jean-Marie Vanherpe | Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO) | On Fan Raspaud Conjecture | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A conjecture of Fan and Raspaud [3] asserts that every bridgeless cubic graph
con-tains three perfect matchings with empty intersection. Kaiser and Raspaud
[6] sug-gested a possible approach to this problem based on the concept of a
balanced join in an embedded graph. We give here some new results concerning
this conjecture and prove that a minimum counterexample must have at least 32
vertices.
| [
{
"version": "v1",
"created": "Sun, 28 Sep 2008 05:56:06 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Fouquet",
"Jean-Luc",
"",
"LIFO"
],
[
"Vanherpe",
"Jean-Marie",
"",
"LIFO"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0809.4822 | Jean-Marie Vanherpe | Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO) | On normal odd partitions in cubic graphs | null | Discussiones Mathematicae Graph Theory 29, 2 (2009) 293-312 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A normal partition of the edges of a cubic graph is a partition into trails
(no repeated edge) such that each vertex is the end vertex of exactly one trail
of the partition. We investigate this notion and give some results and
problems.
| [
{
"version": "v1",
"created": "Sun, 28 Sep 2008 05:57:36 GMT"
}
]
| 2009-11-06T00:00:00 | [
[
"Fouquet",
"Jean-Luc",
"",
"LIFO"
],
[
"Vanherpe",
"Jean-Marie",
"",
"LIFO"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0809.4834 | Luis Paulo Reis | Jose Torres, Luis Paulo Reis | Relevance Feedback in Conceptual Image Retrieval: A User Evaluation | 15 Pages, 20 References | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Visual Object Information Retrieval (VOIR) system described in this paper
implements an image retrieval approach that combines two layers, the conceptual
and the visual layer. It uses terms from a textual thesaurus to represent the
conceptual information and also works with image regions, the visual
information. The terms are related with the image regions through a weighted
association enabling the execution of concept-level queries. VOIR uses
region-based relevance feedback to improve the quality of the results in each
query session and to discover new associations between text and image. This
paper describes a user-centred and task-oriented comparative evaluation of VOIR
which was undertaken considering three distinct versions of VOIR: a full-fledge
version; one supporting relevance feedback only at image level; and a third
version not supporting relevance feedback at all. The evaluation performed
showed the usefulness of region based relevance feedback in the context of VOIR
prototype.
| [
{
"version": "v1",
"created": "Sun, 28 Sep 2008 10:17:20 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Torres",
"Jose",
""
],
[
"Reis",
"Luis Paulo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0809.4839 | Jean-Marie Vanherpe | Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO) | M\'acajov\'a and \v{S}koviera Conjecture on Cubic Graphs | null | Discussionnes Mathematicae on Graph Theory 30, 2 (2010) xxx-yyy | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A conjecture of M\'a\u{c}ajov\'a and \u{S}koviera asserts that every
bridgeless cubic graph has two perfect matchings whose intersection does not
contain any odd edge cut. We prove this conjecture for graphs with few vertices
and we give a stronger result for traceable graphs.
| [
{
"version": "v1",
"created": "Sun, 28 Sep 2008 11:31:20 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Nov 2009 18:41:37 GMT"
}
]
| 2010-03-30T00:00:00 | [
[
"Fouquet",
"Jean-Luc",
"",
"LIFO"
],
[
"Vanherpe",
"Jean-Marie",
"",
"LIFO"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0809.4882 | Aleksandrs Slivkins | Robert Kleinberg, Aleksandrs Slivkins and Eli Upfal | Multi-Armed Bandits in Metric Spaces | 16 pages, 0 figures | null | null | null | cs.DS cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a multi-armed bandit problem, an online algorithm chooses from a set of
strategies in a sequence of trials so as to maximize the total payoff of the
chosen strategies. While the performance of bandit algorithms with a small
finite strategy set is quite well understood, bandit problems with large
strategy sets are still a topic of very active investigation, motivated by
practical applications such as online auctions and web advertisement. The goal
of such research is to identify broad and natural classes of strategy sets and
payoff functions which enable the design of efficient solutions. In this work
we study a very general setting for the multi-armed bandit problem in which the
strategies form a metric space, and the payoff function satisfies a Lipschitz
condition with respect to the metric. We refer to this problem as the
"Lipschitz MAB problem". We present a complete solution for the multi-armed
problem in this setting. That is, for every metric space (L,X) we define an
isometry invariant which bounds from below the performance of Lipschitz MAB
algorithms for X, and we present an algorithm which comes arbitrarily close to
meeting this bound. Furthermore, our technique gives even better results for
benign payoff functions.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 01:58:13 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Kleinberg",
"Robert",
""
],
[
"Slivkins",
"Aleksandrs",
""
],
[
"Upfal",
"Eli",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0809.4883 | Venkatesh Saligrama | V. Saligrama, M. Zhao | Thresholded Basis Pursuit: An LP Algorithm for Achieving Optimal Support
Recovery for Sparse and Approximately Sparse Signals from Noisy Random
Measurements | null | null | null | null | cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a linear programming solution for sign pattern
recovery of a sparse signal from noisy random projections of the signal. We
consider two types of noise models, input noise, where noise enters before the
random projection; and output noise, where noise enters after the random
projection. Sign pattern recovery involves the estimation of sign pattern of a
sparse signal. Our idea is to pretend that no noise exists and solve the
noiseless $\ell_1$ problem, namely, $\min \|\beta\|_1 ~ s.t. ~ y=G \beta$ and
quantizing the resulting solution. We show that the quantized solution
perfectly reconstructs the sign pattern of a sufficiently sparse signal.
Specifically, we show that the sign pattern of an arbitrary k-sparse,
n-dimensional signal $x$ can be recovered with $SNR=\Omega(\log n)$ and
measurements scaling as $m= \Omega(k \log{n/k})$ for all sparsity levels $k$
satisfying $0< k \leq \alpha n$, where $\alpha$ is a sufficiently small
positive constant. Surprisingly, this bound matches the optimal
\emph{Max-Likelihood} performance bounds in terms of $SNR$, required number of
measurements, and admissible sparsity level in an order-wise sense. In contrast
to our results, previous results based on LASSO and Max-Correlation techniques
either assume significantly larger $SNR$, sublinear sparsity levels or
restrictive assumptions on signal sets. Our proof technique is based on noisy
perturbation of the noiseless $\ell_1$ problem, in that, we estimate the
maximum admissible noise level before sign pattern recovery fails.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 14:01:13 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Mar 2009 01:49:48 GMT"
},
{
"version": "v3",
"created": "Sat, 8 May 2010 11:34:25 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Saligrama",
"V.",
""
],
[
"Zhao",
"M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.4916 | Christoph Schommer | Christoph Schommer | 16 Propositions to Reconsider the Organization of a Scientific Workshop | 5 pages | null | null | null | cs.CY cs.GL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Participating a scientific workshop is nowadays often an adventure because
the number of participants do seldom exceed the number of talks. A half-day
workshop is mostly finished at lunchtime, speakers are sometimes not present
and unexcused, and a strict progression of the workshop offers little air for
discussion. And when talks are re-scheduled on short notice in case that a
speech is dropped out, attaining guests definitely wonder why the presenter is
talking about something that does not match the previously announced talk. In
this respect, we believe that the organization of a workshop in the classical
sense must be reconsidered. It is not enough of compelling the presenters to
pay the registration fee only and to let the participants being impassive or
taken away mentally. With this work, we address several propositions to become
implemented in the future workshop organization. With that, we hope to
contribute to the identification of scientific workshops as a place of
interaction.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 09:42:23 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Schommer",
"Christoph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
]
|
0809.4917 | Feng Xia | Feng Xia, Longhua Ma, Wenhong Zhao, Youxian Sun, Jinxiang Dong | Enhanced Energy-Aware Feedback Scheduling of Embedded Control Systems | to appear in Journal of Computers | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamic voltage scaling (DVS) is one of the most effective techniques for
reducing energy consumption in embedded and real-time systems. However,
traditional DVS algorithms have inherent limitations on their capability in
energy saving since they rarely take into account the actual application
requirements and often exploit fixed timing constraints of real-time tasks.
Taking advantage of application adaptation, an enhanced energy-aware feedback
scheduling (EEAFS) scheme is proposed, which integrates feedback scheduling
with DVS. To achieve further reduction in energy consumption over pure DVS
while not jeopardizing the quality of control, the sampling period of each
control loop is adapted to its actual control performance, thus exploring
flexible timing constraints on control tasks. Extensive simulation results are
given to demonstrate the effectiveness of EEAFS under different scenarios.
Compared with the optimal pure DVS scheme, EEAFS saves much more energy while
yielding comparable control performance.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 09:44:36 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Ma",
"Longhua",
""
],
[
"Zhao",
"Wenhong",
""
],
[
"Sun",
"Youxian",
""
],
[
"Dong",
"Jinxiang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0809.4920 | Feng Xia | Longhua Ma, Feng Xia, Zhe Peng | Integrated Design and Implementation of Embedded Control Systems with
Scilab | 15 pages, 14 figures; Open Access at
http://www.mdpi.org/sensors/papers/s8095501.pdf | Sensors, 8(9): 5501-5515, 2008 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Embedded systems are playing an increasingly important role in control
engineering. Despite their popularity, embedded systems are generally subject
to resource constraints and it is therefore difficult to build complex control
systems on embedded platforms. Traditionally, the design and implementation of
control systems are often separated, which causes the development of embedded
control systems to be highly time-consuming and costly. To address these
problems, this paper presents a low-cost, reusable, reconfigurable platform
that enables integrated design and implementation of embedded control systems.
To minimize the cost, free and open source software packages such as Linux and
Scilab are used. Scilab is ported to the embedded ARM-Linux system. The drivers
for interfacing Scilab with several communication protocols including serial,
Ethernet, and Modbus are developed. Experiments are conducted to test the
developed embedded platform. The use of Scilab enables implementation of
complex control algorithms on embedded platforms. With the developed platform,
it is possible to perform all phases of the development cycle of embedded
control systems in a unified environment, thus facilitating the reduction of
development time and cost.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 10:06:09 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Ma",
"Longhua",
""
],
[
"Xia",
"Feng",
""
],
[
"Peng",
"Zhe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0809.4924 | Feng Xia | Feng Xia, Longhua Ma, Chen Peng, Youxian Sun, Jinxiang Dong | Cross-Layer Adaptive Feedback Scheduling of Wireless Control Systems | 17 pages, 12 figures; Open Access at
http://www.mdpi.org/sensors/papers/s8074265.pdf | Sensors, 8(7): 4265-4281, 2008 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is a trend towards using wireless technologies in networked control
systems. However, the adverse properties of the radio channels make it
difficult to design and implement control systems in wireless environments. To
attack the uncertainty in available communication resources in wireless control
systems closed over WLAN, a cross-layer adaptive feedback scheduling (CLAFS)
scheme is developed, which takes advantage of the co-design of control and
wireless communications. By exploiting cross-layer design, CLAFS adjusts the
sampling periods of control systems at the application layer based on
information about deadline miss ratio and transmission rate from the physical
layer. Within the framework of feedback scheduling, the control performance is
maximized through controlling the deadline miss ratio. Key design parameters of
the feedback scheduler are adapted to dynamic changes in the channel condition.
An event-driven invocation mechanism for the feedback scheduler is also
developed. Simulation results show that the proposed approach is efficient in
dealing with channel capacity variations and noise interference, thus providing
an enabling technology for control over WLAN.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 10:18:06 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Ma",
"Longhua",
""
],
[
"Peng",
"Chen",
""
],
[
"Sun",
"Youxian",
""
],
[
"Dong",
"Jinxiang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0809.4929 | Feng Xia | Feng Xia, Liping Liu, Longhua Ma, Youxian Sun, Jinxiang Dong | Performance-Aware Power Management in Embedded Controllers with
Multiple-Voltage Processors | 4 figures | Information Technology Journal, 7(6): 942-947, 2008 | 10.3923/itj.2008.942.947 | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of this work is to minimize the energy dissipation of embedded
controllers without jeopardizing the quality of control (QoC). Taking advantage
of the dynamic voltage scaling (DVS) technology, this paper develops a
performance-aware power management scheme for embedded controllers with
processors that allow multiple voltage levels. The periods of control tasks are
adapted online with respect to the current QoC, thus facilitating additional
energy reduction over standard DVS. To avoid the waste of CPU resources as a
result of the discrete voltage levels, a resource reclaiming mechanism is
employed to maximize the CPU utilization and also to improve the QoC.
Simulations are conducted to evaluate the performance of the proposed scheme.
Compared with the optimal standard DVS scheme, the proposed scheme is shown to
be able to save remarkably more energy while maintaining comparable QoC.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 10:50:32 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Liu",
"Liping",
""
],
[
"Ma",
"Longhua",
""
],
[
"Sun",
"Youxian",
""
],
[
"Dong",
"Jinxiang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0809.4983 | Frederic Butin | Fr\'ed\'eric Butin (ICJ) | Poisson Homology in Degree 0 for some Rings of Symplectic Invariants | 24 pages | null | null | null | math-ph cs.SC math.MP math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $\go{g}$ be a finite-dimensional semi-simple Lie algebra, $\go{h}$ a
Cartan subalgebra of $\go{g}$, and $W$ its Weyl group. The group $W$ acts
diagonally on $V:=\go{h}\oplus\go{h}^*$, as well as on $\mathbb{C}[V]$. The
purpose of this article is to study the Poisson homology of the algebra of
invariants $\mathbb{C}[V]^W$ endowed with the standard symplectic bracket. To
begin with, we give general results about the Poisson homology space in degree
0, denoted by $HP_0(\mathbb{C}[V]^W)$, in the case where $\go{g}$ is of type
$B_n-C_n$ or $D_n$, results which support Alev's conjecture. Then we are
focusing the interest on the particular cases of ranks 2 and 3, by computing
the Poisson homology space in degree 0 in the cases where $\go{g}$ is of type
$B_2$ ($\go{so}_5$), $D_2$ ($\go{so}_4$), then $B_3$ ($\go{so}_7$), and
$D_3=A_3$ ($\go{so}_6\simeq\go{sl}_4$). In order to do this, we make use of a
functional equation introduced by Y. Berest, P. Etingof and V. Ginzburg. We
recover, by a different method, the result established by J. Alev and L.
Foissy, according to which the dimension of $HP_0(\mathbb{C}[V]^W)$ equals 2
for $B_2$. Then we calculate the dimension of this space and we show that it is
equal to 1 for $D_2$. We also calculate it for the rank 3 cases, we show that
it is equal to 3 for $B_3-C_3$ and 1 for $D_3=A_3$.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 15:16:33 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Butin",
"Frédéric",
"",
"ICJ"
]
]
| [
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
]
|
0809.4985 | Youssef, Joseph Nasser | Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu
Crussi\`ere (IETR) | On the Influence of Carrier Frequency Offset and Sampling Frequency
Offset in MIMO-OFDM Systems for Future Digital TV | null | International Symposium on Wireless and Pervasive Computing,
Gr\`ece (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the impact of carrier frequency offset (CFO) and
sampling frequency offset (SFO) on the performance of different MIMO-OFDM
schemes with high spectral efficiency for next generation of terrestrial
digital TV. We analyze particularly orthogonal Alamouti scheme, and
non-orthogonal (NO) schemes like VBLAST, linear dispersion (LD) code and Golden
code. This analysis gives a global view on the best suitable MIMO-OFDM scheme
with respect to CFO and SFO. We show that for high spectral efficiency,
Alamouti is more sensitive to CFO and SFO. Moreover, we show that all studied
MIMO-OFDM schemes are sensitive to CFO when it is greater than 1% of
inter-carrier spacing. Their sensitivity due to SFO is less than that due to
CFO.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 15:17:31 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Nasser",
"Youssef",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0809.4986 | Youssef, Joseph Nasser | Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu
Crussi\`ere (IETR), Oudomsack Pasquero (IETR) | Efficient MIMO-OFDM Schemes for Future Terrestrial Digital TV with
Unequal Received Powers | null | IEEE International Conference on Communications, Chine (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article investigates the effect of equal and unequal received powers on
the performances of different MIMO-OFDM schemes for terrestrial digital TV.
More precisely, we focus on three types of non-orthogonal schemes: the BLAST
scheme, the Linear Dispersion (LD) code and the Golden code, and we compare
their performances to that of Alamouti scheme. Using two receiving antennas, we
show that for moderate attenuation on the second antenna and high spectral
efficiency, Golden code outperforms other schemes. However, Alamouti scheme
presents the best performance for low spectral efficiency and equal received
powers or when one antenna is dramatically damaged. When three antennas are
used, we show that Golden code offers the highest robustness to power unbalance
at the receiving side
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 15:17:52 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Nasser",
"Youssef",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
],
[
"Pasquero",
"Oudomsack",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0809.4987 | Youssef, Joseph Nasser | Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu
Crussi\`ere (IETR), Oudomsack Pasquero (IETR) | Efficient 3D Space Time Space Block Code for Future Terrestrial Digital
TV | null | Symposium on Signal Processing Advances in Wireless
Communications, Recife : Br\'esil (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article introduces a 3D space-time-space block code for future
terrestrial digital TV in single frequency networks. The proposed 3D code is
based on a double layer structure designed for inter-cell and intra-cell space
time coded transmissions. We show that this new structure is particularly
efficient for SFN environments regardless of the location of the receiver. It
is then suitable for fixed, portable and mobile receptions.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 15:18:09 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Nasser",
"Youssef",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
],
[
"Pasquero",
"Oudomsack",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0809.4989 | Youssef, Joseph Nasser | Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu
Crussi\`ere (IETR) | Bit Error Rate Prediction of Coded MIMO-OFDM Systems | null | IEEE Symposium on Signal Processing Advances in Wireless
Communications, Recife : Br\'esil (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bit error rate (BER) prediction over channel realisations has emerged as an
active research area. In this paper, we give analytical signal to interference
and noise ratio (SINR) evaluation of MIMO-OFDM systems using an iterative
receiver. Using this analytical SINR expression, we propose an accurate BER
prediction method based on effective exponential SINR mapping (EESM) method. We
show by simulations that our method is independent of the channel realisation
and of the MIMO scheme. It is only dependent on the modulation and coding
scheme.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 15:18:37 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Nasser",
"Youssef",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0809.5005 | Martyn Amos | Yi-Chun Xu, Ren-Bin Xiao and Martyn Amos | Simulated annealing for weighted polygon packing | Submitted to Engineering Optimization. 13 pages, 7 figures, 5 tables | null | null | null | cs.CG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a new algorithm for a layout optimization problem:
this concerns the placement of weighted polygons inside a circular container,
the two objectives being to minimize imbalance of mass and to minimize the
radius of the container. This problem carries real practical significance in
industrial applications (such as the design of satellites), as well as being of
significant theoretical interest. Previous work has dealt with circular or
rectangular objects, but here we deal with the more realistic case where
objects may be represented as polygons and the polygons are allowed to rotate.
We present a solution based on simulated annealing and first test it on
instances with known optima. Our results show that the algorithm obtains
container radii that are close to optimal. We also compare our method with
existing algorithms for the (special) rectangular case. Experimental results
show that our approach out-performs these methods in terms of solution quality.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 16:22:28 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Xu",
"Yi-Chun",
""
],
[
"Xiao",
"Ren-Bin",
""
],
[
"Amos",
"Martyn",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0809.5008 | Nihar Jindal | Nihar Jindal, Jeffrey G. Andrews, Steven Weber | Multi-Antenna Communication in Ad Hoc Networks: Achieving MIMO Gains
with SIMO Transmission | Submitted to IEEE Trans. on Communications. (Extended version of
earlier conference paper) | null | 10.1109/TCOMM.2010.120710.090793 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The benefit of multi-antenna receivers is investigated in wireless ad hoc
networks, and the main finding is that network throughput can be made to scale
linearly with the number of receive antennas nR even if each transmitting node
uses only a single antenna. This is in contrast to a large body of prior work
in single-user, multiuser, and ad hoc wireless networks that have shown linear
scaling is achievable when multiple receive and transmit antennas (i.e., MIMO
transmission) are employed, but that throughput increases logarithmically or
sublinearly with nR when only a single transmit antenna (i.e., SIMO
transmission) is used. The linear gain is achieved by using the receive degrees
of freedom to simultaneously suppress interference and increase the power of
the desired signal, and exploiting the subsequent performance benefit to
increase the density of simultaneous transmissions instead of the transmission
rate. This result is proven in the transmission capacity framework, which
presumes single-hop transmissions in the presence of randomly located
interferers, but it is also illustrated that the result holds under several
relaxations of the model, including imperfect channel knowledge, multihop
transmission, and regular networks (i.e., interferers are deterministically
located on grids).
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 16:21:38 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Dec 2009 01:31:18 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Jindal",
"Nihar",
""
],
[
"Andrews",
"Jeffrey G.",
""
],
[
"Weber",
"Steven",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.5009 | Juyul Lee | Juyul Lee and Nihar Jindal | Delay Constrained Scheduling over Fading Channels: Optimal Policies for
Monomial Energy-Cost Functions | submitted to the IEEE ICC 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A point-to-point discrete-time scheduling problem of transmitting $B$
information bits within $T$ hard delay deadline slots is considered assuming
that the underlying energy-bit cost function is a convex monomial. The
scheduling objective is to minimize the expected energy expenditure while
satisfying the deadline constraint based on information about the unserved
bits, channel state/statistics, and the remaining time slots to the deadline.
At each time slot, the scheduling decision is made without knowledge of future
channel state, and thus there is a tension between serving many bits when the
current channel is good versus leaving too many bits for the deadline. Under
the assumption that no other packet is scheduled concurrently and no outage is
allowed, we derive the optimal scheduling policy. Furthermore, we also
investigate the dual problem of maximizing the number of transmitted bits over
$T$ time slots when subject to an energy constraint.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 16:27:27 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Lee",
"Juyul",
""
],
[
"Jindal",
"Nihar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.5016 | Youssef, Joseph Nasser | Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu
Crussi\`ere (IETR) | Robustness of MIMO-OFDM Schemes for Future Digital TV to Carrier
Frequency Offset | null | IEEE Broadband Multimedia Symposium, \'Etats-Unis d'Am\'erique
(2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the impact of carrier frequency offset (CFO) on the
performance of different MIMO-OFDM schemes with high spectral efficiency for
next generation of terrestrial digital TV. We show that all studied MIMO-OFDM
schemes are sensitive to CFO when it is greater than 1% of inter-carrier
spacing. We show also that the Alamouti scheme is the most sensitive MIMO
scheme to CFO
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 16:58:35 GMT"
}
]
| 2008-09-30T00:00:00 | [
[
"Nasser",
"Youssef",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0809.5022 | Jay Kumar Sundararajan | Jay Kumar Sundararajan, Devavrat Shah, Muriel Medard, Michael
Mitzenmacher, Joao Barros | Network coding meets TCP | 9 pages, 9 figures, submitted to IEEE INFOCOM 2009 | null | 10.1109/INFCOM.2009.5061931 | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a mechanism that incorporates network coding into TCP with only
minor changes to the protocol stack, thereby allowing incremental deployment.
In our scheme, the source transmits random linear combinations of packets
currently in the congestion window. At the heart of our scheme is a new
interpretation of ACKs - the sink acknowledges every degree of freedom (i.e., a
linear combination that reveals one unit of new information) even if it does
not reveal an original packet immediately. Such ACKs enable a TCP-like
sliding-window approach to network coding. Our scheme has the nice property
that packet losses are essentially masked from the congestion control
algorithm. Our algorithm therefore reacts to packet drops in a smooth manner,
resulting in a novel and effective approach for congestion control over
networks involving lossy links such as wireless links. Our experiments show
that our algorithm achieves higher throughput compared to TCP in the presence
of lossy wireless links. We also establish the soundness and fairness
properties of our algorithm.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 19:51:21 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Sundararajan",
"Jay Kumar",
""
],
[
"Shah",
"Devavrat",
""
],
[
"Medard",
"Muriel",
""
],
[
"Mitzenmacher",
"Michael",
""
],
[
"Barros",
"Joao",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.5023 | Alexandre Proutiere A | Charles Bordenave, David McDonald, Alexandre Proutiere | Asymptotic stability region of slotted-Aloha | 16 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the stability of standard, buffered, slotted-Aloha systems.
Specifically, we consider a set of $N$ users, each equipped with an infinite
buffer. Packets arrive into user $i$'s buffer according to some stationary
ergodic Markovian process of intensity $\lambda_i$. At the beginning of each
slot, if user $i$ has packets in its buffer, it attempts to transmit a packet
with fixed probability $p_i$ over a shared resource / channel. The transmission
is successful only when no other user attempts to use the channel. The
stability of such systems has been open since their very first analysis in 1979
by Tsybakov and Mikhailov. In this paper, we propose an approximate stability
condition, that is provably exact when the number of users $N$ grows large. We
provide theoretical evidence and numerical experiments to explain why the
proposed approximate stability condition is extremely accurate even for systems
with a restricted number of users (even two or three). We finally extend the
results to the case of more efficient CSMA systems.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 18:34:47 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Bordenave",
"Charles",
""
],
[
"McDonald",
"David",
""
],
[
"Proutiere",
"Alexandre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.5087 | Yuhua Chen | Yuhua Chen, Subhash Kak, Lei Wang | Hybrid Neural Network Architecture for On-Line Learning | 19 pages, 16 figures | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Approaches to machine intelligence based on brain models have stressed the
use of neural networks for generalization. Here we propose the use of a hybrid
neural network architecture that uses two kind of neural networks
simultaneously: (i) a surface learning agent that quickly adapt to new modes of
operation; and, (ii) a deep learning agent that is very accurate within a
specific regime of operation. The two networks of the hybrid architecture
perform complementary functions that improve the overall performance. The
performance of the hybrid architecture has been compared with that of
back-propagation perceptrons and the CC and FC networks for chaotic time-series
prediction, the CATS benchmark test, and smooth function approximation. It has
been shown that the hybrid architecture provides a superior performance based
on the RMS error criterion.
| [
{
"version": "v1",
"created": "Mon, 29 Sep 2008 23:00:22 GMT"
}
]
| 2008-10-01T00:00:00 | [
[
"Chen",
"Yuhua",
""
],
[
"Kak",
"Subhash",
""
],
[
"Wang",
"Lei",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0809.5096 | Hong Ju Park | Hong Ju Park and Ender Ayanoglu | Diversity Analysis of Bit-Interleaved Coded Multiple Beamforming | The maximum achievable diversity order from given convolutional code
with any interleaver is shown by using the Singleton bound | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, diversity analysis of bit-interleaved coded multiple
beamforming (BICMB) is extended to the case of general spatial interleavers,
removing a condition on their previously known design criteria and quantifying
the resulting diversity order. The diversity order is determined by a parameter
Qmax which is inherited from the convolutional code and the spatial
de-multiplexer used in BICMB. We introduce a method to find this parameter by
employing a transfer function approach as in finding the weight spectrum of a
convolutional code. By using this method, several Qmax values are shown and
verified to be identical with the results from a computer search. The diversity
analysis and the method to find the parameter are supported by simulation
results. By using the Singleton bound, we also show that Qmax is lower bounded
by the product of the number of streams and the code rate of an encoder. The
design rule of the spatial de-multiplexer for a given convolutional code is
proposed to meet the condition on the maximum achievable diversity order.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 00:14:10 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Oct 2008 18:00:01 GMT"
},
{
"version": "v3",
"created": "Tue, 3 Feb 2009 01:49:02 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Park",
"Hong Ju",
""
],
[
"Ayanoglu",
"Ender",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.5145 | Youssef, Joseph Nasser | Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu
Crussi\`ere (IETR) | 3D MIMO Scheme for Broadcasting Future Digital TV in Single Frequency
Networks | null | Electronics Letters / IEE Electronics Letters 44, 13 (2008)
829-830 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This letter introduces a 3D space-time-space block code for future digital TV
systems. The code is based on a double layer structure for inter-cell and
intra-cell transmission mode in single frequency networks. Without increasing
the complexity of the receiver, the proposed code is very efficient for
different transmission scenarios.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 09:23:19 GMT"
}
]
| 2010-12-13T00:00:00 | [
[
"Nasser",
"Youssef",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0809.5153 | Ognyan Kounchev | Ognyan Kounchev, Hermann Render | On a new multivariate sampling paradigm and a polyspline Shannon
function | Submitted to the conference proceedings of SAMPTA07 held in
Thessaloniki, Greece, 2007 | null | null | null | math.NA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the monograph Kounchev, O. I., Multivariate Polysplines. Applications to
Numerical and Wavelet Analysis, Academic Press, San Diego-London, 2001, and in
the paper Kounchev O., Render, H., Cardinal interpolation with polysplines on
annuli, Journal of Approximation Theory 137 (2005) 89--107, we have introduced
and studied a new paradigm for cardinal interpolation which is related to the
theory of multivariate polysplines. In the present paper we show that this is
related to a new sampling paradigm in the multivariate case, whereas we obtain
a Shannon type function $S(x) $ and the following Shannon type formula:
$f(r\theta) =\sum_{j=-\infty}^{\infty}\int_{\QTR{Bbb}{S}^{n-1}}S(e^{-j}r\theta
) f(e^{j}\theta) d\theta .$ This formula relies upon infinitely many Shannon
type formulas for the exponential splines arising from the radial part of the
polyharmonic operator $\Delta ^{p}$ for fixed $p\geq 1$. Acknowledgement. The
first and the second author have been partially supported by the Institutes
partnership project with the Alexander von Humboldt Foundation. The first has
been partially sponsored by the Greek-Bulgarian bilateral project BGr-17, and
the second author by Grant MTM2006-13000-C03-03 of the D.G.I. of Spain.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 09:53:23 GMT"
}
]
| 2008-10-01T00:00:00 | [
[
"Kounchev",
"Ognyan",
""
],
[
"Render",
"Hermann",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.5154 | Cecile Roisin | Jan Mik\'ac (INRIA Rh\^one-Alpes / LIG Laboratoire d'Informatique de
Grenoble), C\'ecile Roisin (INRIA Rh\^one-Alpes / LIG Laboratoire
d'Informatique de Grenoble), Bao Le Duc (UPMC) | An Export Architecture for a Multimedia Authoring Environment | null | Dans DocEng'08 (2008) 28-31 | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose an export architecture that provides a clear
separation of authoring services from publication services. We illustrate this
architecture with the LimSee3 authoring tool and several standard publication
formats: Timesheets, SMIL, and XHTML.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 09:56:35 GMT"
}
]
| 2008-10-01T00:00:00 | [
[
"Mikác",
"Jan",
"",
"INRIA Rhône-Alpes / LIG Laboratoire d'Informatique de\n Grenoble"
],
[
"Roisin",
"Cécile",
"",
"INRIA Rhône-Alpes / LIG Laboratoire\n d'Informatique de Grenoble"
],
[
"Duc",
"Bao Le",
"",
"UPMC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0809.5173 | Nicolas Goze | Nicolas Goze, Elisabeth Remm | An algebraic approach to the set of intervals (a new approach of
arithmetic of intervals) | null | null | null | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present the set of intervals as a normed vector space. We
define also a four-dimensional associative algebra whose product gives the
product of intervals in any cases. This approach allows to give a notion of
divisibility and in some cases an euclidian division. We introduce differential
calculus and give some applications.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 11:45:01 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Oct 2009 09:08:40 GMT"
}
]
| 2009-10-22T00:00:00 | [
[
"Goze",
"Nicolas",
""
],
[
"Remm",
"Elisabeth",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0809.5182 | Peter Fertl | Peter Fertl, Ari Hottinen, and Gerald Matz | Perturbation-based Distributed Beamforming for Wireless Relay Networks | 5 pages, 5 figures; accepted at IEEE GLOBECOM 2008, New Orleans, LA,
Nov 30 - Dec 4, 2008 | null | 10.1109/GLOCOM.2008.ECP.743 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with distributed beamforming techniques for wireless
networks with half-duplex amplify-and-forward relays. Existing schemes optimize
the beamforming weights based on the assumption that channel state information
(CSI) is available at the relays. We propose to use adaptive beamforming based
on deterministic perturbations and limited feedback (1-bit) from the
destination to the relays in order to avoid CSI at the relays. Two scalable
perturbation schemes are considered and practical implementation aspects are
addressed. Simulation results confirm that the proposed techniques closely
approach optimum performance and have satisfactory tracking properties in
time-varying environments.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 12:19:18 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Fertl",
"Peter",
""
],
[
"Hottinen",
"Ari",
""
],
[
"Matz",
"Gerald",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.5188 | Ming Liu | Ming Liu (IETR), Matthieu Crussi\`ere (IETR), Jean-Fran\c{c}ois
H\'elard (IETR), Oudomsack Pasquero (IETR) | Analysis and Performance Comparison of DVB-T and DTMB Systems for
Terrestrial Digital TV | null | IEEE International Conference on Communications Systems (ICCS
2008), Guangzhou : Chine (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Orthogonal frequency-division multiplexing (OFDM) is the most popular
transmission technology in digital terrestrial broadcasting (DTTB), adopted by
many DTTB standards. In this paper, the bit error rate (BER) performance of two
DTTB systems, namely cyclic prefix OFDM (CP-OFDM) based DVB-T and time domain
synchronous OFDM (TDS-OFDM) based DTMB, is evaluated in different channel
conditions. Spectrum utilization and power efficiency are also discussed to
demonstrate the transmission overhead of both systems. Simulation results show
that the performances of the two systems are much close. Given the same ratio
of guard interval (GI), the DVB-T outperforms DTMB in terms of signal to noise
ratio (SNR) in Gaussian and Ricean channels, while DTMB behaves better
performance in Rayleigh channel in higher code rates and higher orders of
constellation thanks to its efficient channel coding and interleaving scheme.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 12:57:12 GMT"
}
]
| 2008-10-01T00:00:00 | [
[
"Liu",
"Ming",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
],
[
"Pasquero",
"Oudomsack",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0809.5189 | Oudomsack Pierre Pasquero | Oudomsack Pierre Pasquero (IETR), Matthieu Crussi\`ere (IETR), Youssef
Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR) | A novel channel estimation based on spread pilots for terrestrial
digital video broadcasting | null | Broadband Multimedia Systems and Broadcasting, Las Vegas :
\'Etats-Unis d'Am\'erique (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a novel channel estimation technique based on
spread pilots for digital video broadcasting. This technique consists in adding
a linear preceding function before the OFDM modulation and dedicating one of
the preceding sequence to transmit the pilot symbols for the channel
estimation. The merits of this technique are its simplicity, its flexibility,
and the gains in terms of spectral efficiency and useful bit rate obtained
compared to the classical pilot based estimation schemes used in DVB standards.
The performance evaluated over realistic channel models, shows the efficiency
of this technique which turns out to be a promising channel estimation
technique for the future terrestrial video broadcasting systems.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 12:57:53 GMT"
}
]
| 2008-10-01T00:00:00 | [
[
"Pasquero",
"Oudomsack Pierre",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
],
[
"Nasser",
"Youssef",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0809.5191 | Fahad Syed Muhammad | Fahad Syed Muhammad (IETR), Jean-Yves Baudais (IETR),
Jean-Fran\c{c}ois H\'elard (IETR), Matthieu Crussi\`ere (IETR) | A Coded Bit-Loading Linear Precoded Discrete Multitone Solution for
Power Line Communication | null | International Workshop on Signal Processing Advances in Wireless
Communications, Recife, Pernambuco : Brazil (2008) | 10.1109/SPAWC.2008.4641669 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Linear precoded discrete multitone modulation (LP-DMT) system has been
already proved advantageous with adaptive resource allocation algorithm in a
power line communication (PLC) context. In this paper, we investigate the bit
and energy allocation algorithm of an adaptive LP-DMT system taking into
account the channel coding scheme. A coded adaptive LP-DMT system is presented
in the PLC context with a loading algorithm which ccommodates the channel
coding gains in bit and energy calculations. The performance of a concatenated
channel coding scheme, consisting of an inner Wei's 4-dimensional 16-states
trellis code and an outer Reed-Solomon code, in combination with the roposed
algorithm is analyzed. Simulation results are presented for a fixed target bit
error rate in a multicarrier scenario under power spectral density constraint.
Using a multipath model of PLC channel, it is shown that the proposed coded
adaptive LP-DMT system performs better than classical coded discrete multitone.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 13:01:17 GMT"
}
]
| 2010-01-19T00:00:00 | [
[
"Muhammad",
"Fahad Syed",
"",
"IETR"
],
[
"Baudais",
"Jean-Yves",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.5192 | Oudomsack Pierre Pasquero | Oudomsack Pierre Pasquero (IETR), Matthieu Crussi\`ere (IETR), Youssef
Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR) | 2D Linear Precoded OFDM for future mobile Digital Video Broadcasting | null | Signal Processing Advances in Wireless Communications, Recife :
Br\'esil (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a novel channel estimation technique based on 2D
spread pilots. The merits of this technique are its simplicity, its flexibility
regarding the transmission scenarios, and the spectral efficiency gain obtained
compared to the classical pilot based estimation schemes used in DVB standards.
We derive the analytical expression of the mean square error of the estimator
and show it is a function of the autocorrelation of the channel in both time
and frequency domains. The performance evaluated over a realistic channel model
shows the efficiency of this technique which turns out to be a promising
channel estimation for the future mobile video broadcasting systems.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 13:01:46 GMT"
}
]
| 2008-10-01T00:00:00 | [
[
"Pasquero",
"Oudomsack Pierre",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
],
[
"Nasser",
"Youssef",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0809.5204 | Georg B\"ocherer | Georg B\"ocherer and Alexandre de Baynast | A Distributed MAC Protocol for Cooperation in Random Access Networks | 5 pages, improved presentation compared to previous version v1 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | WLAN is one of the most successful applications of wireless communications in
daily life because of low cost and ease of deployment. The enabling technique
for this success is the use of random access schemes for the wireless channel.
Random access requires minimal coordination between the nodes, which
considerably reduces the cost of the infrastructure. Recently, cooperative
communication in wireless networks has been of increasing interest because it
promises higher rates and reliability. An additional MAC overhead is necessary
to coordinate the nodes to allow cooperation and this overhead can possibly
cancel out the cooperative benefits. In this work, a completely distributed
protocol is proposed that allows nodes in the network to cooperate via Two-Hop
and Decode-and-Forward for transmitting their data to a common gateway node. It
is shown that high throughput gains are obtained in terms of the individual
throughput that can be guaranteed to any node in the network. These results are
validated by Monte Carlo simulations.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 14:17:05 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Nov 2009 15:57:30 GMT"
}
]
| 2009-11-03T00:00:00 | [
[
"Böcherer",
"Georg",
""
],
[
"de Baynast",
"Alexandre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.5212 | Hyoungsuk Jeon | Hyoungsuk Jeon, Namshik Kim, Minki Kim, Hyuckjae Lee, and Jeongseok Ha | Secrecy Capacity over Correlated Ergodic Fading Channel | 18 pages, 5 figures, submitted to IEEE Transaction on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the secrecy capacity of an ergodic fading wiretap channel in
which the main channel is correlated with the eavesdropper channel. In this
study, the full Channel State Information (CSI) is assumed, and thus the
transmitter knows the channel gains of the legitimate receiver and the
eavesdropper. By analyzing the resulting secrecy capacity we quantify the loss
of the secrecy capacity due to the correlation. In addition, we study the
asymptotic behavior of the secrecy capacity as Signal-to-Noise Ratio (SNR)
tends to infinity. The capacity of an ordinary fading channel logarithmically
increases with SNR. On the contrary, the secrecy capacity converges into a
limit which can be an upper bound on the secrecy capacity over the fading
wiretap channel. We find a closed form of the upper bound for the correlated
Rayleigh wiretap channel which also includes the independent case as a special
one. Our work shows that the upper bound is determined by only two channel
parameters; the correlation coefficient and the ratio of the main to the
eavesdropper channel gains that will be called PCC and CGR respectively. The
analysis of the upper bound tells how the two channel parameters affect the
secrecy capacity and leads to the conclusion that the excessively large signal
power does not provide any advantage in the secrecy capacity, and the loss due
to the correlation is especially serious in low CGR regime.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 14:43:37 GMT"
}
]
| 2008-10-01T00:00:00 | [
[
"Jeon",
"Hyoungsuk",
""
],
[
"Kim",
"Namshik",
""
],
[
"Kim",
"Minki",
""
],
[
"Lee",
"Hyuckjae",
""
],
[
"Ha",
"Jeongseok",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0809.5217 | Emmanuel Abbe A | Emmanuel Abbe and Lizhong Zheng | Linear Universal Decoding for Compound Channels: a Local to Global
Geometric Approach | null | null | null | null | cs.IT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Over discrete memoryless channels (DMC), linear decoders (maximizing additive
metrics) afford several nice properties. In particular, if suitable encoders
are employed, the use of decoding algorithm with manageable complexities is
permitted. Maximum likelihood is an example of linear decoder. For a compound
DMC, decoders that perform well without the channel's knowledge are required in
order to achieve capacity. Several such decoders have been studied in the
literature. However, there is no such known decoder which is linear. Hence, the
problem of finding linear decoders achieving capacity for compound DMC is
addressed, and it is shown that under minor concessions, such decoders exist
and can be constructed. This paper also develops a "local geometric analysis",
which allows in particular, to solve the above problem. By considering very
noisy channels, the original problem is reduced, in the limit, to an inner
product space problem, for which insightful solutions can be found. The local
setting can then provide counterexamples to disproof claims, but also, it is
shown how in this problem, results proven locally can be "lifted" to results
proven globally.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 14:57:49 GMT"
}
]
| 2008-10-01T00:00:00 | [
[
"Abbe",
"Emmanuel",
""
],
[
"Zheng",
"Lizhong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0809.5238 | Vincent N\'elis | Vincent N\'elis and Jo\"el Goossens | Mode Change Protocol for Multi-Mode Real-Time Systems upon Identical
Multiprocessors | 4 pages, 2 figures | null | null | null | cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a synchronous protocol without periodicity for
scheduling multi-mode real-time systems upon identical multiprocessor
platforms. Our proposal can be considered to be a multiprocessor extension of
the uniprocessor protocol called "Minimal Single Offset protocol".
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 15:55:04 GMT"
}
]
| 2008-10-01T00:00:00 | [
[
"Nélis",
"Vincent",
""
],
[
"Goossens",
"Joël",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
]
|
0809.5250 | Vincent Lariviere | Vincent Lariviere, Yves Gingras, Eric Archambault | The decline in the concentration of citations, 1900-2007 | 9 pages | null | null | null | physics.soc-ph cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper challenges recent research (Evans, 2008) reporting that the
concentration of cited scientific literature increases with the online
availability of articles and journals. Using Thomson Reuters' Web of Science,
the present paper analyses changes in the concentration of citations received
(two- and five-year citation windows) by papers published between 1900 and
2005. Three measures of concentration are used: the percentage of papers that
received at least one citation (cited papers); the percentage of papers needed
to account for 20, 50 and 80 percent of the citations; and, the
Herfindahl-Hirschman index. These measures are used for four broad disciplines:
natural sciences and engineering, medical fields, social sciences, and the
humanities. All these measures converge and show that, contrary to what was
reported by Evans, the dispersion of citations is actually increasing.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 16:27:42 GMT"
}
]
| 2008-10-01T00:00:00 | [
[
"Lariviere",
"Vincent",
""
],
[
"Gingras",
"Yves",
""
],
[
"Archambault",
"Eric",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0809.5266 | Vaibhav Gowadia | Vaibhav Gowadia, Csilla Farkas, Michiharu Kudo | Checking Security Policy Compliance | 23 pages; submitted to TKDE; original submission 15 mar 2007; revised
20 jan 2008 | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ensuring compliance of organizations to federal regulations is a growing
concern. This paper presents a framework and methods to verify whether an
implemented low-level security policy is compliant to a high-level security
policy. Our compliance checking framework is based on organizational and
security metadata to support refinement of high-level concepts to
implementation specific instances. Our work uses the results of refinement
calculus to express valid refinement patterns and their properties.
Intuitively, a low-level security policy is compliant to a high-level security
policy if there is a valid refinement path from the high-level security policy
to the low-level security policy. Our model is capable of detecting violations
of security policies, failures to meet obligations, and capability and modal
conflicts.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 18:16:59 GMT"
}
]
| 2008-10-01T00:00:00 | [
[
"Gowadia",
"Vaibhav",
""
],
[
"Farkas",
"Csilla",
""
],
[
"Kudo",
"Michiharu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0809.5275 | Fahad Syed Muhammad | Fahad Syed Muhammad (IETR), Jean-Yves Baudais (IETR),
Jean-Fran\c{c}ois H\'elard (IETR), Matthieu Crussi\`ere (IETR) | Coded Adaptive Linear Precoded Discrete Multitone Over PLC Channel | null | International Symposium on Power-Line Communications and Its
Applications, Jeju Island : Cor\'ee, R\'epublique de (2008) | 10.1109/ISPLC.2008.4510410 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Discrete multitone modulation (DMT) systems exploit the capabilities of
orthogonal subcarriers to cope efficiently with narrowband interference, high
frequency attenuations and multipath fadings with the help of simple
equalization filters. Adaptive linear precoded discrete multitone (LP-DMT)
system is based on classical DMT, combined with a linear precoding component.
In this paper, we investigate the bit and energy allocation algorithm of an
adaptive LP-DMT system taking into account the channel coding scheme. A coded
adaptive LPDMT system is presented in the power line communication (PLC)
context with a loading algorithm which accommodates the channel coding gains in
bit and energy calculations. The performance of a concatenated channel coding
scheme, consisting of an inner Wei's 4-dimensional 16-states trellis code and
an outer Reed-Solomon code, in combination with the proposed algorithm is
analyzed. Theoretical coding gains are derived and simulation results are
presented for a fixed target bit error rate in a multicarrier scenario under
power spectral density constraint. Using a multipath model of PLC channel, it
is shown that the proposed coded adaptive LP-DMT system performs better than
coded DMT and can achieve higher throughput for PLC applications.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 19:20:01 GMT"
}
]
| 2010-01-19T00:00:00 | [
[
"Muhammad",
"Fahad Syed",
"",
"IETR"
],
[
"Baudais",
"Jean-Yves",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0033 | Michael Freedman | M. Freedman | Complexity Classes as Mathematical Axioms | Some minor changes and one more reference. To appear in Ann. Math | null | null | null | cs.CC math.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Treating a conjecture, P^#P != NP, on the separation of complexity classes as
an axiom, an implication is found in three manifold topology with little
obvious connection to complexity theory. This is reminiscent of Harvey
Friedman's work on finitistic interpretations of large cardinal axioms.
| [
{
"version": "v1",
"created": "Tue, 30 Sep 2008 22:51:58 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Nov 2008 04:21:22 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Feb 2009 05:58:27 GMT"
},
{
"version": "v4",
"created": "Tue, 16 Jun 2009 22:20:09 GMT"
}
]
| 2009-06-17T00:00:00 | [
[
"Freedman",
"M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
}
]
|
0810.0052 | Martin Ziegler | Matthias Fischer, Matthias Hilbig, Claudius J\"ahn, Friedhelm Meyer
auf der Heide and Martin Ziegler | Planar Visibility Counting | added Section 4: Implementation and Empirical Evaluation | null | null | null | cs.CG cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a fixed virtual scene (=collection of simplices) S and given observer
position p, how many elements of S are weakly visible (i.e. not fully occluded
by others) from p? The present work explores the trade-off between query time
and preprocessing space for these quantities in 2D: exactly, in the approximate
deterministic, and in the probabilistic sense. We deduce the EXISTENCE of an
O(m^2/n^2) space data structure for S that, given p and time O(log n), allows
to approximate the ratio of occluded segments up to arbitrary constant absolute
error; here m denotes the size of the Visibility Graph--which may be quadratic,
but typically is just linear in the size n of the scene S. On the other hand,
we present a data structure CONSTRUCTIBLE in O(n*log(n)+m^2*polylog(n)/k)
preprocessing time and space with similar approximation properties and query
time O(k*polylog n), where k<n is an arbitrary parameter. We describe an
implementation of this approach and demonstrate the practical benefit of the
parameter k to trade memory for query time in an empirical evaluation on three
classes of benchmark scenes.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2008 01:53:52 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Oct 2008 02:43:08 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Feb 2009 09:51:22 GMT"
}
]
| 2009-02-05T00:00:00 | [
[
"Fischer",
"Matthias",
""
],
[
"Hilbig",
"Matthias",
""
],
[
"Jähn",
"Claudius",
""
],
[
"der Heide",
"Friedhelm Meyer auf",
""
],
[
"Ziegler",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.0068 | Salim El Rouayheb | Salim Y. El Rouayheb, Alex Sprintson, Costas N. Georghiades | On the Index Coding Problem and its Relation to Network Coding and
Matroid Theory | submitted to transactions on information theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The \emph{index coding} problem has recently attracted a significant
attention from the research community due to its theoretical significance and
applications in wireless ad-hoc networks. An instance of the index coding
problem includes a sender that holds a set of information messages
$X=\{x_1,...,x_k\}$ and a set of receivers $R$. Each receiver $\rho=(x,H)\in R$
needs to obtain a message $x\in X$ and has prior \emph{side information}
comprising a subset $H$ of $X$. The sender uses a noiseless communication
channel to broadcast encoding of messages in $X$ to all clients. The objective
is to find an encoding scheme that minimizes the number of transmissions
required to satisfy the receivers' demands with \emph{zero error}.
In this paper, we analyze the relation between the index coding problem, the
more general network coding problem and the problem of finding a linear
representation of a matroid. In particular, we show that any instance of the
network coding and matroid representation problems can be efficiently reduced
to an instance of the index coding problem. Our reduction implies that many
important properties of the network coding and matroid representation problems
carry over to the index coding problem. Specifically, we show that \emph{vector
linear codes} outperform scalar linear codes and that vector linear codes are
insufficient for achieving the optimum number of transmissions.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2008 03:41:57 GMT"
}
]
| 2008-10-02T00:00:00 | [
[
"Rouayheb",
"Salim Y. El",
""
],
[
"Sprintson",
"Alex",
""
],
[
"Georghiades",
"Costas N.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0075 | Alvaro Salas Humberto | Alvaro Salas (Universidad de Caldas, Universidad Nacional de Colombia,
sede Manizales) | Acerca del Algoritmo de Dijkstra | In spanish, the paper contains illustrations | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we prove the correctness of Dijkstra's algorithm. We also
discuss it and at the end we show an application.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2008 04:55:11 GMT"
}
]
| 2008-10-02T00:00:00 | [
[
"Salas",
"Alvaro",
"",
"Universidad de Caldas, Universidad Nacional de Colombia,\n sede Manizales"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.0135 | Murat Alanyali | Murat Alanyali, Maxim Dashouk | Occupancy distributions of homogeneous queueing systems under
opportunistic scheduling | Submitted for possible publication | null | null | null | cs.PF cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze opportunistic schemes for transmission scheduling from one of $n$
homogeneous queues whose channel states fluctuate independently. Considered
schemes consist of the LCQ policy, which transmits from a longest connected
queue in the entire system, and its low-complexity variants that transmit from
a longest queue within a randomly chosen subset of connected queues. A
Markovian model is studied where mean packet transmission time is $n^{-1}$ and
packet arrival rate is $\lambda<1$ per queue. Transient and equilibrium
distributions of queue occupancies are obtained in the limit as the system size
$n$ tends to infinity.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2008 15:02:16 GMT"
}
]
| 2008-10-02T00:00:00 | [
[
"Alanyali",
"Murat",
""
],
[
"Dashouk",
"Maxim",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.0139 | Wilson Wong | Wilson Wong, Wei Liu, Mohammed Bennamoun | Determining the Unithood of Word Sequences using a Probabilistic
Approach | More information is available at
http://explorer.csse.uwa.edu.au/reference/ | 3rd International Joint Conference on Natural Language Processing
(IJCNLP), 2008, pages 103-110 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most research related to unithood were conducted as part of a larger effort
for the determination of termhood. Consequently, novelties are rare in this
small sub-field of term extraction. In addition, existing work were mostly
empirically motivated and derived. We propose a new probabilistically-derived
measure, independent of any influences of termhood, that provides dedicated
measures to gather linguistic evidence from parsed text and statistical
evidence from Google search engine for the measurement of unithood. Our
comparative study using 1,825 test cases against an existing
empirically-derived function revealed an improvement in terms of precision,
recall and accuracy.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2008 12:49:24 GMT"
}
]
| 2008-10-02T00:00:00 | [
[
"Wong",
"Wilson",
""
],
[
"Liu",
"Wei",
""
],
[
"Bennamoun",
"Mohammed",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0810.0154 | Koichiro Kitagawa | Koichiro Kitagawa and Toshiyuki Tanaka | Optimization of sequences in CDMA systems: a statistical-mechanics
approach | 17pages, submitted to Special Issue on Interdisciplinary Paradigms
for Networking in International Journal of Computer and Telecommunications
Networking | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Statistical mechanics approach is useful not only in analyzing macroscopic
system performance of wireless communication systems, but also in discussing
design problems of wireless communication systems. In this paper, we discuss a
design problem of spreading sequences in code-division multiple-access (CDMA)
systems, as an example demonstrating the usefulness of statistical mechanics
approach. We analyze, via replica method, the average mutual information
between inputs and outputs of a randomly-spread CDMA channel, and discuss the
optimization problem with the average mutual information as a measure of
optimization. It has been shown that the average mutual information is
maximized by orthogonally-invariant random Welch bound equality (WBE) spreading
sequences.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2008 12:58:28 GMT"
}
]
| 2008-10-02T00:00:00 | [
[
"Kitagawa",
"Koichiro",
""
],
[
"Tanaka",
"Toshiyuki",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0156 | Wilson Wong | Wilson Wong, Wei Liu, Mohammed Bennamoun | Determining the Unithood of Word Sequences using Mutual Information and
Independence Measure | More information is available at
http://explorer.csse.uwa.edu.au/reference/ | 10th Conference of the Pacific Association for Computational
Linguistics (PACLING), 2007, pages 246-254 | null | CSSE-WWONG-13 | cs.AI | http://creativecommons.org/licenses/by/3.0/ | Most works related to unithood were conducted as part of a larger effort for
the determination of termhood. Consequently, the number of independent research
that study the notion of unithood and produce dedicated techniques for
measuring unithood is extremely small. We propose a new approach, independent
of any influences of termhood, that provides dedicated measures to gather
linguistic evidence from parsed text and statistical evidence from Google
search engine for the measurement of unithood. Our evaluations revealed a
precision and recall of 98.68% and 91.82% respectively with an accuracy at
95.42% in measuring the unithood of 1005 test cases.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2008 13:00:19 GMT"
}
]
| 2008-10-02T00:00:00 | [
[
"Wong",
"Wilson",
""
],
[
"Liu",
"Wei",
""
],
[
"Bennamoun",
"Mohammed",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0810.0200 | Andrij Rovenchak | Andrij Rovenchak, J\'an Ma\v{c}utek, Charles Riley | Distribution of complexities in the Vai script | 13 pages | Glottometrics 18, 1-12 (2009) | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the paper, we analyze the distribution of complexities in the Vai script,
an indigenous syllabic writing system from Liberia. It is found that the
uniformity hypothesis for complexities fails for this script. The models using
Poisson distribution for the number of components and hyper-Poisson
distribution for connections provide good fits in the case of the Vai script.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2008 15:53:36 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Rovenchak",
"Andrij",
""
],
[
"Mačutek",
"Ján",
""
],
[
"Riley",
"Charles",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0810.0264 | David Musser | David R. Musser, Gor V. Nishanov | A Fast Generic Sequence Matching Algorithm | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A string matching -- and more generally, sequence matching -- algorithm is
presented that has a linear worst-case computing time bound, a low worst-case
bound on the number of comparisons (2n), and sublinear average-case behavior
that is better than that of the fastest versions of the Boyer-Moore algorithm.
The algorithm retains its efficiency advantages in a wide variety of sequence
matching problems of practical interest, including traditional string matching;
large-alphabet problems (as in Unicode strings); and small-alphabet,
long-pattern problems (as in DNA searches). Since it is expressed as a generic
algorithm for searching in sequences over an arbitrary type T, it is well
suited for use in generic software libraries such as the C++ Standard Template
Library. The algorithm was obtained by adding to the Knuth-Morris-Pratt
algorithm one of the pattern-shifting techniques from the Boyer-Moore
algorithm, with provision for use of hashing in this technique. In situations
in which a hash function or random access to the sequences is not available,
the algorithm falls back to an optimized version of the Knuth-Morris-Pratt
algorithm.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2008 19:54:51 GMT"
}
]
| 2008-10-02T00:00:00 | [
[
"Musser",
"David R.",
""
],
[
"Nishanov",
"Gor V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.0322 | Kalyana Babu Nakshatrala | K.B. Nakshatrala and A.J.Valocchi | Non-negative mixed finite element formulations for a tensorial diffusion
equation | 40 pages using amsart style file, and 15 figures | null | 10.1016/j.jcp.2009.05.039 | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the tensorial diffusion equation, and address the discrete
maximum-minimum principle of mixed finite element formulations. In particular,
we address non-negative solutions (which is a special case of the
maximum-minimum principle) of mixed finite element formulations. The discrete
maximum-minimum principle is the discrete version of the maximum-minimum
principle.
In this paper we present two non-negative mixed finite element formulations
for tensorial diffusion equations based on constrained optimization techniques
(in particular, quadratic programming). These proposed mixed formulations
produce non-negative numerical solutions on arbitrary meshes for low-order
(i.e., linear, bilinear and trilinear) finite elements. The first formulation
is based on the Raviart-Thomas spaces, and is obtained by adding a non-negative
constraint to the variational statement of the Raviart-Thomas formulation. The
second non-negative formulation based on the variational multiscale
formulation.
For the former formulation we comment on the affect of adding the
non-negative constraint on the local mass balance property of the
Raviart-Thomas formulation. We also study the performance of the active set
strategy for solving the resulting constrained optimization problems. The
overall performance of the proposed formulation is illustrated on three
canonical test problems.
| [
{
"version": "v1",
"created": "Thu, 2 Oct 2008 01:39:57 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Feb 2009 03:14:39 GMT"
},
{
"version": "v3",
"created": "Sat, 16 May 2009 20:37:01 GMT"
},
{
"version": "v4",
"created": "Thu, 18 Jun 2009 22:25:18 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Nakshatrala",
"K. B.",
""
],
[
"Valocchi",
"A. J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0810.0326 | Lu Lu | Lu Lu, Soung Chang Liew, Shengli Zhang | Collision Resolution by Exploiting Symbol Misalignment | conference | null | null | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents CRESM, a novel collision resolution method for decoding
collided packets in random-access wireless networks. In a collision,
overlapping signals from several sources are received simultaneously at a
receiver. CRESM exploits symbol misalignment among the overlapping signals to
recover the individual packets. CRESM can be adopted in 802.11 networks without
modification of the transmitter design; only a simple DSP technique is needed
at the receiver to decode the overlapping signals. Our simulations indicate
that CRESM has better BER performance than the simplistic Successive
Interference Cancellation (SIC) technique that treats interference as noise,
for almost all SNR regimes. The implication of CRESM for random-access
networking is significant: in general, using CRESM to resolve collisions of up
to n packets, network throughput can be boosted by more than n times if the
transmitters are allowed to transmit more aggressively in the MAC protocol.
| [
{
"version": "v1",
"created": "Thu, 2 Oct 2008 02:15:07 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Oct 2008 06:08:05 GMT"
}
]
| 2008-10-03T00:00:00 | [
[
"Lu",
"Lu",
""
],
[
"Liew",
"Soung Chang",
""
],
[
"Zhang",
"Shengli",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0328 | Aldar C.-F. Chan | Aldar C-F. Chan | Efficient Defence against Misbehaving TCP Receiver DoS Attacks | null | Computer Networks, 2011 | 10.1016/j.comnet.2011.08.004 | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The congestion control algorithm of TCP relies on correct feedback from the
receiver to determine the rate at which packets should be sent into the
network. Hence, correct receiver feedback (in the form of TCP acknowledgements)
is essential to the goal of sharing the scarce bandwidth resources fairly and
avoiding congestion collapse in the Internet. However, the assumption that a
TCP receiver can always be trusted (to generate feedback correctly) no longer
holds as there are plenty of incentives for a receiver to deviate from the
protocol. In fact, it has been shown that a misbehaving receiver (whose aim is
to bring about congestion collapse) can easily generate acknowledgements to
conceal packet loss, so as to drive a number of honest, innocent senders
arbitrarily fast to create a significant number of non-responsive packet flows,
leading to denial of service to other Internet users. We give the first formal
treatment to this problem. We also give an efficient, provably secure mechanism
to force a receiver to generate feedback correctly; any incorrect
acknowledgement will be detected at the sender and cheating TCP receivers would
be identified. The idea is as follows: for each packet sent, the sender
generates a tag using a secret key (known to himself only); the receiver could
generate a proof using the packet and the tag alone, and send it to the sender;
the sender can then verify the proof using the secret key; an incorrect proof
would indicate a cheating receiver. The scheme is very efficient in the sense
that the TCP sender does not need to store the packet or the tag, and the
proofs for multiple packets can be aggregated at the receiver. The scheme is
based on an aggregate authenticator. In addition, the proposed solution can be
applied to network-layer rate-limiting architectures requiring correct
feedback.
| [
{
"version": "v1",
"created": "Thu, 2 Oct 2008 02:56:48 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Dec 2011 04:27:49 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Dec 2011 02:37:54 GMT"
}
]
| 2021-09-21T00:00:00 | [
[
"Chan",
"Aldar C-F.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.0332 | Wilson Wong | Wilson Wong, Wei Liu, Mohammed Bennamoun | Enhanced Integrated Scoring for Cleaning Dirty Texts | More information is available at
http://explorer.csse.uwa.edu.au/reference/ | IJCAI Workshop on Analytics for Noisy Unstructured Text Data
(AND), 2007, pages 55-62 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An increasing number of approaches for ontology engineering from text are
gearing towards the use of online sources such as company intranet and the
World Wide Web. Despite such rise, not much work can be found in aspects of
preprocessing and cleaning dirty texts from online sources. This paper presents
an enhancement of an Integrated Scoring for Spelling error correction,
Abbreviation expansion and Case restoration (ISSAC). ISSAC is implemented as
part of a text preprocessing phase in an ontology engineering system. New
evaluations performed on the enhanced ISSAC using 700 chat records reveal an
improved accuracy of 98% as compared to 96.5% and 71% based on the use of only
basic ISSAC and of Aspell, respectively.
| [
{
"version": "v1",
"created": "Thu, 2 Oct 2008 03:42:12 GMT"
}
]
| 2008-10-03T00:00:00 | [
[
"Wong",
"Wilson",
""
],
[
"Liu",
"Wei",
""
],
[
"Bennamoun",
"Mohammed",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0810.0372 | Luis Veiga | Filipe Cabecinhas and Nuno Lopes and Renato Crisostomo and Luis Veiga | Optimizing Binary Code Produced by Valgrind (Project Report on Virtual
Execution Environments Course - AVExe) | Technical report from INESC-ID Lisboa describing optimizations to
code generation of the Valgring execution environment. Work developed in the
context of a Virtual Execution Environments course (AVExe) at IST/Technical
university of Lisbon | null | null | null | cs.PL cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Valgrind is a widely used framework for dynamic binary instrumentation and
its mostly known by its memcheck tool. Valgrind's code generation module is far
from producing optimal code. In addition it has many backends for different CPU
architectures, which difficults code optimization in an architecture
independent way. Our work focused on identifying sub-optimal code produced by
Valgrind and optimizing it.
| [
{
"version": "v1",
"created": "Thu, 2 Oct 2008 09:41:52 GMT"
}
]
| 2008-10-03T00:00:00 | [
[
"Cabecinhas",
"Filipe",
""
],
[
"Lopes",
"Nuno",
""
],
[
"Crisostomo",
"Renato",
""
],
[
"Veiga",
"Luis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
]
|
0810.0394 | Benedek Kov\'acs | Peter Fulop, Benedek Kovacs, Sandor Imre | Mobility Management Framework | null | null | null | null | cs.PF cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates mobility management strategies from the point of view
of their need of signalling and processing resources on the backbone network
and load on the air interface. A method is proposed to model the serving
network and mobile node mobility in order to be able to compare the different
types of mobility management algorithms. To obtain a good description of the
network we calculate descriptive parameters from given topologies. Most
mobility approaches derived from existing protocols are analyzed and their
performances are numerically compared in various network and mobility
scenarios. We developed a mobility management framework that is able to give
general designing guidelines for the next generation mobility managements on
given network, technology and mobility properties. With our model an operator
can design the network and tune the parameters to obtain the optimal
implementation of course revising existing systems is also possible. We present
a vertical handover decision method as a special application of our model
framework.
| [
{
"version": "v1",
"created": "Thu, 2 Oct 2008 11:44:47 GMT"
}
]
| 2008-10-03T00:00:00 | [
[
"Fulop",
"Peter",
""
],
[
"Kovacs",
"Benedek",
""
],
[
"Imre",
"Sandor",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.0486 | Pawel Sobkowicz | Pawel Sobkowicz | Peer-review in the Internet age | null | null | null | null | physics.soc-ph cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The importance of peer-review in the scientific process can not be
overestimated. Yet, due to increasing pressures of research and exponentially
growing number of publications the task faced by the referees becomes ever more
difficult. We discuss here a few possible improvements that would enable more
efficient review of the scientific literature, using the growing Internet
connectivity. In particular, a practical automated model for providing the
referees with references to papers that might have strong relationship with the
work under review, based on general network properties of citations is
proposed.
| [
{
"version": "v1",
"created": "Thu, 2 Oct 2008 17:02:18 GMT"
}
]
| 2008-10-03T00:00:00 | [
[
"Sobkowicz",
"Pawel",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0810.0503 | Amin Jafarian | Amin Jafarian, Sriram Vishwanath | On the Capacity of One-sided Two user Gaussian Fading Broadcast Channels | Accepted for publication at Globecom Communications Conference 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate upper and lower bounds on the capacity of
two-user fading broadcast channels where one of the users has a constant
(non-fading) channel. We use the Costa entropy power inequality (EPI) along
with an optimization framework to derive upper bounds on the sum-capacity and
superposition coding to obtain lower bounds on the sum-rate for this channel.
For this fading broadcast channel where one channel is constant, we find that
the upper and lower bounds meet under special cases, and in general, we show
that the achievable sum-rate comes within a constant of the outer bound.
| [
{
"version": "v1",
"created": "Thu, 2 Oct 2008 18:01:05 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Jan 2009 19:52:42 GMT"
}
]
| 2009-01-01T00:00:00 | [
[
"Jafarian",
"Amin",
""
],
[
"Vishwanath",
"Sriram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0532 | Bart de Keijzer | Bart de Keijzer | Three New Complexity Results for Resource Allocation Problems | null | null | null | null | cs.MA cs.AI cs.CC cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove the following results for task allocation of indivisible resources:
- The problem of finding a leximin-maximal resource allocation is in P if the
agents have max-utility functions and atomic demands.
- Deciding whether a resource allocation is Pareto-optimal is coNP-complete
for agents with (1-)additive utility functions.
- Deciding whether there exists a Pareto-optimal and envy-free resource
allocation is Sigma_2^p-complete for agents with (1-)additive utility
functions.
| [
{
"version": "v1",
"created": "Thu, 2 Oct 2008 20:32:52 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Oct 2008 14:02:54 GMT"
}
]
| 2008-10-17T00:00:00 | [
[
"de Keijzer",
"Bart",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0810.0558 | Ashish Goel | Ashish Goel, Sanjeev Khanna, Brad Null | The Ratio Index for Budgeted Learning, with Applications | This paper has a substantial bug that we are trying to fix. Many
thanks to Joe Halpern for pointing this bug out. Please do not cite in the
meantime. Please let us know if you would like to understand and/or try to
fix the bug | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the budgeted learning problem, we are allowed to experiment on a set of
alternatives (given a fixed experimentation budget) with the goal of picking a
single alternative with the largest possible expected payoff. Approximation
algorithms for this problem were developed by Guha and Munagala by rounding a
linear program that couples the various alternatives together. In this paper we
present an index for this problem, which we call the ratio index, which also
guarantees a constant factor approximation. Index-based policies have the
advantage that a single number (i.e. the index) can be computed for each
alternative irrespective of all other alternatives, and the alternative with
the highest index is experimented upon. This is analogous to the famous Gittins
index for the discounted multi-armed bandit problem.
The ratio index has several interesting structural properties. First, we show
that it can be computed in strongly polynomial time. Second, we show that with
the appropriate discount factor, the Gittins index and our ratio index are
constant factor approximations of each other, and hence the Gittins index also
gives a constant factor approximation to the budgeted learning problem.
Finally, we show that the ratio index can be used to create an index-based
policy that achieves an O(1)-approximation for the finite horizon version of
the multi-armed bandit problem. Moreover, the policy does not require any
knowledge of the horizon (whereas we compare its performance against an optimal
strategy that is aware of the horizon). This yields the following surprising
result: there is an index-based policy that achieves an O(1)-approximation for
the multi-armed bandit problem, oblivious to the underlying discount factor.
| [
{
"version": "v1",
"created": "Fri, 3 Oct 2008 01:37:45 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Apr 2016 18:47:16 GMT"
}
]
| 2016-04-12T00:00:00 | [
[
"Goel",
"Ashish",
""
],
[
"Khanna",
"Sanjeev",
""
],
[
"Null",
"Brad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.0567 | Andrew Thangaraj | Andrew Thangaraj and Safitha J Raj | Reed-Solomon Subcodes with Nontrivial Traces: Distance Properties and
Soft-Decision Decoding | submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reed-Solomon (RS) codes over GF$(2^m)$ have traditionally been the most
popular non-binary codes in almost all practical applications. The distance
properties of RS codes result in excellent performance under hard-decision
bounded-distance decoding. However, efficient and implementable soft decoding
for high-rate (about 0.9) RS codes over large fields (GF(256), say) continues
to remain a subject of research with a promise of further coding gains. In this
work, our objective is to propose and investigate $2^m$-ary codes with
non-trivial binary trace codes as an alternative to RS codes. We derive bounds
on the rate of a $2^m$-ary code with a non-trivial binary trace code. Then we
construct certain subcodes of RS codes over GF($2^m$) that have a non-trivial
binary trace with distances and rates meeting the derived bounds. The
properties of these subcodes are studied and low-complexity hard-decision and
soft-decision decoders are proposed. The decoders are analyzed, and their
performance is compared with that of comparable RS codes. Our results suggest
that these subcodes of RS codes could be viable alternatives for RS codes in
applications.
| [
{
"version": "v1",
"created": "Fri, 3 Oct 2008 04:38:17 GMT"
}
]
| 2008-10-06T00:00:00 | [
[
"Thangaraj",
"Andrew",
""
],
[
"Raj",
"Safitha J",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0674 | Shuchi Chawla | Siddharth Barman and Shuchi Chawla | Packing multiway cuts in capacitated graphs | The conference version of this paper is to appear at SODA 2009. This
is the full version | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the following "multiway cut packing" problem in undirected
graphs: we are given a graph G=(V,E) and k commodities, each corresponding to a
set of terminals located at different vertices in the graph; our goal is to
produce a collection of cuts {E_1,...,E_k} such that E_i is a multiway cut for
commodity i and the maximum load on any edge is minimized. The load on an edge
is defined to be the number of cuts in the solution crossing the edge. In the
capacitated version of the problem the goal is to minimize the maximum relative
load on any edge--the ratio of the edge's load to its capacity. Multiway cut
packing arises in the context of graph labeling problems where we are given a
partial labeling of a set of items and a neighborhood structure over them, and,
informally, the goal is to complete the labeling in the most consistent way.
This problem was introduced by Rabani, Schulman, and Swamy (SODA'08), who
developed an O(log n/log log n) approximation for it in general graphs, as well
as an improved O(log^2 k) approximation in trees. Here n is the number of nodes
in the graph. We present the first constant factor approximation for this
problem in arbitrary undirected graphs. Our approach is based on the
observation that every instance of the problem admits a near-optimal laminar
solution (that is, one in which no pair of cuts cross each other).
| [
{
"version": "v1",
"created": "Fri, 3 Oct 2008 16:13:00 GMT"
}
]
| 2008-10-06T00:00:00 | [
[
"Barman",
"Siddharth",
""
],
[
"Chawla",
"Shuchi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.0693 | Tsuyoshi Ito | Tsuyoshi Ito, Hirotada Kobayashi, Keiji Matsumoto | Oracularization and Two-Prover One-Round Interactive Proofs against
Nonlocal Strategies | 26 pages | null | null | null | quant-ph cs.CC cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A central problem in quantum computational complexity is how to prevent
entanglement-assisted cheating in multi-prover interactive proof systems. It is
well-known that the standard oracularization technique completely fails in some
proof systems under the existence of prior entanglement. This paper studies two
constructions of two-prover one-round interactive proof systems based on
oracularization. First, it is proved that the two-prover one-round interactive
proof system for PSPACE by Cai, Condon, and Lipton still achieves exponentially
small soundness error in the existence of prior entanglement between dishonest
provers (and more strongly, even if dishonest provers are allowed to use
arbitrary no-signaling strategies). It follows that, unless the polynomial-time
hierarchy collapses to the second level, two-prover systems are still
advantageous to single-prover systems even when only malicious provers can use
quantum information. Second, it is proved that the two-prover one-round
interactive proof system obtained by oracularizing a three-query
probabilistically checkable proof system becomes sound in a weak sense even
against dishonest entangled provers with the help of a dummy question. As a
consequence, every language in NEXP has a two-prover one-round interactive
proof system of perfect completeness, albeit with exponentially small gap
between completeness and soundness, in which each prover responds with only two
bits. In other words, it is NP-hard to approximate within an inverse-polynomial
the value of a classical two-prover one-round game, even when provers are
entangled and each sends a two-bit answer to a verifier.
| [
{
"version": "v1",
"created": "Fri, 3 Oct 2008 18:24:50 GMT"
}
]
| 2008-10-06T00:00:00 | [
[
"Ito",
"Tsuyoshi",
""
],
[
"Kobayashi",
"Hirotada",
""
],
[
"Matsumoto",
"Keiji",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0810.0745 | Jaeok Park | Jaeok Park and Mihaela van der Schaar | Stackelberg Contention Games in Multiuser Networks | 30 pages, 5 figures | EURASIP Journal on Advances in Signal Processing, vol. 2009,
Article ID 305978, 15 pages, 2009 | 10.1155/2009/305978 | null | cs.GT cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interactions among selfish users sharing a common transmission channel can be
modeled as a non-cooperative game using the game theory framework. When selfish
users choose their transmission probabilities independently without any
coordination mechanism, Nash equilibria usually result in a network collapse.
We propose a methodology that transforms the non-cooperative game into a
Stackelberg game. Stackelberg equilibria of the Stackelberg game can overcome
the deficiency of the Nash equilibria of the original game. A particular type
of Stackelberg intervention is constructed to show that any positive payoff
profile feasible with independent transmission probabilities can be achieved as
a Stackelberg equilibrium payoff profile. We discuss criteria to select an
operating point of the network and informational requirements for the
Stackelberg game. We relax the requirements and examine the effects of
relaxation on performance.
| [
{
"version": "v1",
"created": "Sat, 4 Oct 2008 04:41:38 GMT"
},
{
"version": "v2",
"created": "Sat, 24 Jan 2009 03:04:40 GMT"
},
{
"version": "v3",
"created": "Sat, 30 May 2009 22:39:29 GMT"
}
]
| 2009-05-31T00:00:00 | [
[
"Park",
"Jaeok",
""
],
[
"van der Schaar",
"Mihaela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.0747 | Ravi Tandon | Ravi Tandon, Sennur Ulukus | A New Upper Bound on the Capacity of a Class of Primitive Relay Channels | To appear in Proceedings of 46th Annual Allerton Conference on
Communication, Control and Computing, Sept. 2008 | null | null | null | cs.IT cs.AI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We obtain a new upper bound on the capacity of a class of discrete memoryless
relay channels. For this class of relay channels, the relay observes an i.i.d.
sequence $T$, which is independent of the channel input $X$. The channel is
described by a set of probability transition functions $p(y|x,t)$ for all
$(x,t,y)\in \mathcal{X}\times \mathcal{T}\times \mathcal{Y}$. Furthermore, a
noiseless link of finite capacity $R_{0}$ exists from the relay to the
receiver. Although the capacity for these channels is not known in general, the
capacity of a subclass of these channels, namely when $T=g(X,Y)$, for some
deterministic function $g$, was obtained in [1] and it was shown to be equal to
the cut-set bound. Another instance where the capacity was obtained was in [2],
where the channel output $Y$ can be written as $Y=X\oplus Z$, where $\oplus$
denotes modulo-$m$ addition, $Z$ is independent of $X$,
$|\mathcal{X}|=|\mathcal{Y}|=m$, and $T$ is some stochastic function of $Z$.
The compress-and-forward (CAF) achievability scheme [3] was shown to be
capacity achieving in both cases.
Using our upper bound we recover the capacity results of [1] and [2]. We also
obtain the capacity of a class of channels which does not fall into either of
the classes studied in [1] and [2]. For this class of channels, CAF scheme is
shown to be optimal but capacity is strictly less than the cut-set bound for
certain values of $R_{0}$. We also evaluate our outer bound for a particular
relay channel with binary multiplicative states and binary additive noise for
which the channel is given as $Y=TX+N$. We show that our upper bound is
strictly better than the cut-set upper bound for certain values of $R_{0}$ but
it lies strictly above the rates yielded by the CAF achievability scheme.
| [
{
"version": "v1",
"created": "Sat, 4 Oct 2008 05:37:45 GMT"
}
]
| 2008-10-07T00:00:00 | [
[
"Tandon",
"Ravi",
""
],
[
"Ulukus",
"Sennur",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0753 | Stefano Soffia | Stefano Soffia | Definition and Implementation of a Points-To Analysis for C-like
Languages | 135 pages | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The points-to problem is the problem of determining the possible run-time
targets of pointer variables and is usually considered part of the more general
aliasing problem, which consists in establishing whether and when different
expressions can refer to the same memory address. Aliasing information is
essential to every tool that needs to reason about the semantics of programs.
However, due to well-known undecidability results, for all interesting
languages that admit aliasing, the exact solution of nontrivial aliasing
problems is not generally computable. This work focuses on approximated
solutions to this problem by presenting a store-based, flow-sensitive points-to
analysis, for applications in the field of automated software verification. In
contrast to software testing procedures, which heuristically check the program
against a finite set of executions, the methods considered in this work are
static analyses, where the computed results are valid for all the possible
executions of the analyzed program. We present a simplified programming
language and its execution model; then an approximated execution model is
developed using the ideas of abstract interpretation theory. Finally, the
soundness of the approximation is formally proved. The aim of developing a
realistic points-to analysis is pursued by presenting some extensions to the
initial simplified model and discussing the correctness of their formulation.
This work contains original contributions to the issue of points-to analysis,
as it provides a formulation of a filter operation on the points-to abstract
domain and a formal proof of the soundness of the defined abstract operations:
these, as far as we now, are lacking from the previous literature.
| [
{
"version": "v1",
"created": "Sat, 4 Oct 2008 10:34:09 GMT"
}
]
| 2008-10-07T00:00:00 | [
[
"Soffia",
"Stefano",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0810.0763 | Pedram Pad | Pedram Pad, Mahdi Soltanolkotabi, Saeed Hadikhanlou, Arash Enayati,
and Farokh Marvasti | Errorless Codes for Over-loaded CDMA with Active User Detection | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce a new class of codes for over-loaded synchronous
wireless CDMA systems which increases the number of users for a fixed number of
chips without introducing any errors. In addition these codes support active
user detection. We derive an upper bound on the number of users with a fixed
spreading factor. Also we propose an ML decoder for a subclass of these codes
that is computationally implementable. Although for our simulations we consider
a scenario that is worse than what occurs in practice, simulation results
indicate that this coding/decoding scheme is robust against additive noise. As
an example, for 64 chips and 88 users we propose a coding/decoding scheme that
can obtain an arbitrary small probability of error which is computationally
feasible and can detect active users. Furthermore, we prove that for this to be
possible the number of users cannot be beyond 230.
| [
{
"version": "v1",
"created": "Sat, 4 Oct 2008 12:24:39 GMT"
}
]
| 2008-10-07T00:00:00 | [
[
"Pad",
"Pedram",
""
],
[
"Soltanolkotabi",
"Mahdi",
""
],
[
"Hadikhanlou",
"Saeed",
""
],
[
"Enayati",
"Arash",
""
],
[
"Marvasti",
"Farokh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0764 | Pedram Pad | Mohammad Javad Faraji, Pedram Pad, and Farokh Marvasti | A New Method for Constructing Large Size WBE Codes with Low Complexity
ML Decoder | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we wish to introduce a method to reconstruct large size Welch
Bound Equality (WBE) codes from small size WBE codes. The advantage of these
codes is that the implementation of ML decoder for the large size codes is
reduced to implementation of ML decoder for the core codes. This leads to a
drastic reduction of the computational cost of ML decoder. Our method can also
be used for constructing large Binary WBE (BWBE) codes from smaller ones.
Additionally, we explain that although WBE codes are maximizing the sum channel
capacity when the inputs are real valued, they are not necessarily appropriate
when the input alphabet is binary. The discussion shows that when the input
alphabet is binary, the Total Squared Correlation (TSC) of codes is not a
proper figure of merit.
| [
{
"version": "v1",
"created": "Sat, 4 Oct 2008 12:36:30 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Mar 2009 10:13:02 GMT"
}
]
| 2009-03-07T00:00:00 | [
[
"Faraji",
"Mohammad Javad",
""
],
[
"Pad",
"Pedram",
""
],
[
"Marvasti",
"Farokh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0785 | Dario Fertonani | Dario Fertonani and Tolga M. Duman | Novel Bounds on the Capacity of the Binary Deletion Channel | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present novel bounds on the capacity of the independent and identically
distributed binary deletion channel. Four upper bounds are obtained by
providing the transmitter and the receiver with genie-aided information on
suitably-defined random processes. Since some of the proposed bounds involve
infinite series, we also introduce provable inequalities that lead to more
manageable results. For most values of the deletion probability, these bounds
improve the existing ones and significantly narrow the gap with the available
lower bounds. Exploiting the same auxiliary processes, we also derive, as a
by-product, a couple of very simple lower bounds on the channel capacity,
which, for low values of the deletion probability, are almost as good as the
best existing lower bounds.
| [
{
"version": "v1",
"created": "Sat, 4 Oct 2008 19:14:50 GMT"
}
]
| 2008-10-07T00:00:00 | [
[
"Fertonani",
"Dario",
""
],
[
"Duman",
"Tolga M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0800 | Zizhong Chen | Zizhong Chen and Jack Dongarra | Condition Numbers of Gaussian Random Matrices | null | null | null | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $G_{m \times n}$ be an $m \times n$ real random matrix whose elements are
independent and identically distributed standard normal random variables, and
let $\kappa_2(G_{m \times n})$ be the 2-norm condition number of $G_{m \times
n}$. We prove that, for any $m \geq 2$, $n \geq 2$ and $x \geq |n-m|+1$,
$\kappa_2(G_{m \times n})$ satisfies $
\frac{1}{\sqrt{2\pi}} ({c}/{x})^{|n-m|+1} < P(\frac{\kappa_2(G_{m \times n})}
{{n}/{(|n-m|+1)}}> x) <
\frac{1}{\sqrt{2\pi}} ({C}/{x})^{|n-m|+1}, $ where $0.245 \leq c \leq 2.000$
and $ 5.013 \leq C \leq 6.414$ are universal positive constants independent of
$m$, $n$ and $x$. Moreover, for any $m \geq 2$ and $n \geq 2$, $
E(\log\kappa_2(G_{m \times n})) < \log \frac{n}{|n-m|+1} + 2.258. $ A similar
pair of results for complex Gaussian random matrices is also established.
| [
{
"version": "v1",
"created": "Sun, 5 Oct 2008 04:18:54 GMT"
}
]
| 2008-10-07T00:00:00 | [
[
"Chen",
"Zizhong",
""
],
[
"Dongarra",
"Jack",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0810.0830 | Damien Chablat | Anatoly Pashkevich (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger
(IRCCyN) | Stiffness Analysis Of Multi-Chain Parallel Robotic Systems | null | 9th IFAC Workshop on Intelligent Manufacturing Systems, France
(2008) | null | null | cs.RO physics.class-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents a new stiffness modelling method for multi-chain parallel
robotic manipulators with flexible links and compliant actuating joints. In
contrast to other works, the method involves a FEA-based link stiffness
evaluation and employs a new solution strategy of the kinetostatic equations,
which allows computing the stiffness matrix for singular postures and to take
into account influence of the internal forces. The advantages of the developed
technique are confirmed by application examples, which deal with stiffness
analysis of the Orthoglide manipulator.
| [
{
"version": "v1",
"created": "Sun, 5 Oct 2008 15:03:22 GMT"
}
]
| 2008-10-07T00:00:00 | [
[
"Pashkevich",
"Anatoly",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
]
|
0810.0852 | Joseph B. Keller Prof. | Joseph B. Keller | Evaluation of Authors and Journals | 6 pages | null | null | null | math.HO cs.IR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A method is presented for evaluating authors on the basis of citations. It
assigns to each author a citation score which depends upon the number of times
he is cited, and upon the scores of the citers. The scores are found to be the
components of an eigenvector of a normalized citation matrix. The same method
can be applied to citation of journals by other journals, to evaluating teams
in a league [1], etc.
| [
{
"version": "v1",
"created": "Sun, 5 Oct 2008 20:36:19 GMT"
}
]
| 2008-10-07T00:00:00 | [
[
"Keller",
"Joseph B.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0810.0870 | Shih-Chun Lin | Pin-Hsun Lin, Shih-Chun Lin, Chung-Pi Lee, and Hsuan-Jung Su | Cognitive Radio with Partial Channel State Information at the
Transmitter | resubmitted to IEEE Transaction on Wireless Communications, May 2009 | IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp.
3402-3413, Nov. 2010 | 10.1109/TWC.2010.092410.090725 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present the cognitive radio system design with partial
channel state information known at the transmitter (CSIT).We replace the dirty
paper coding (DPC) used in the cognitive radio with full CSIT by the linear
assignment Gel'fand-Pinsker coding (LA-GPC), which can utilize the limited
knowledge of the channel more efficiently. Based on the achievable rate derived
from the LA-GPC, two optimization problems under the fast and slow fading
channels are formulated. We derive semianalytical solutions to find the
relaying ratios and precoding coefficients. The critical observation is that
the complex rate functions in these problems are closely related to ratios of
quadratic form. Simulation results show that the proposed semi-analytical
solutions perform close to the optimal solutions found by brute-force search,
and outperform the systems based on naive DPC. Asymptotic analysis also shows
that these solutions converge to the optimal ones solved with full CSIT when
the K-factor of Rician channel approaches infinity. Moreover, a new coding
scheme is proposed to implement the LA-GPC in practice. Simulation results show
that the proposed practical coding scheme can efficiently reach the theoretical
rate performance.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2008 03:41:49 GMT"
},
{
"version": "v2",
"created": "Tue, 19 May 2009 05:14:19 GMT"
}
]
| 2010-11-15T00:00:00 | [
[
"Lin",
"Pin-Hsun",
""
],
[
"Lin",
"Shih-Chun",
""
],
[
"Lee",
"Chung-Pi",
""
],
[
"Su",
"Hsuan-Jung",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0874 | Kirill Sorudeykin Mr | Kirill A Sorudeykin | Software Engineering & Systems Design Nature | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main problems of Software Engineering appear as a result of
incompatibilities. For example, the quality of organization of the production
process depends on correspondence with existent resources and on a common
understanding of project goals by all team members. Software design is another
example. Its successfulness rides on the architecture's conformity with a
project's concepts. This is a point of great nicety. All elements should create
a single space of interaction. And if the laws of such a space are imperfect,
missequencing comes and the concept of a software system fails. We must do our
best for this not to happen. To that end, having a subtle perception of systems
structures is essential. Such knowledge can be based only on a fresh approach
to the logical law.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2008 04:50:01 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Mar 2009 14:52:18 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Sorudeykin",
"Kirill A",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0810.0877 | Dev Rajnarayan | Dev Rajnarayan and David Wolpert | Bias-Variance Techniques for Monte Carlo Optimization: Cross-validation
for the CE Method | null | null | null | null | cs.NA cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we examine the CE method in the broad context of Monte Carlo
Optimization (MCO) and Parametric Learning (PL), a type of machine learning. A
well-known overarching principle used to improve the performance of many PL
algorithms is the bias-variance tradeoff. This tradeoff has been used to
improve PL algorithms ranging from Monte Carlo estimation of integrals, to
linear estimation, to general statistical estimation. Moreover, as described
by, MCO is very closely related to PL. Owing to this similarity, the
bias-variance tradeoff affects MCO performance, just as it does PL performance.
In this article, we exploit the bias-variance tradeoff to enhance the
performance of MCO algorithms. We use the technique of cross-validation, a
technique based on the bias-variance tradeoff, to significantly improve the
performance of the Cross Entropy (CE) method, which is an MCO algorithm. In
previous work we have confirmed that other PL techniques improve the perfomance
of other MCO algorithms. We conclude that the many techniques pioneered in PL
could be investigated as ways to improve MCO algorithms in general, and the CE
method in particular.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2008 04:58:44 GMT"
}
]
| 2008-10-07T00:00:00 | [
[
"Rajnarayan",
"Dev",
""
],
[
"Wolpert",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0810.0882 | Chien-Hwa Hwang | Chien-Hwa Hwang | Asymptotic Eigenvalue Moments of Wishart-Type Random Matrix Without
Ergodicity in One Channel Realization | 36 pages, 6 figures, submitted to IEEE Transactions on Information
Theory, Oct. 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a random matrix whose variance profile is random. This random matrix
is ergodic in one channel realization if, for each column and row, the
empirical distribution of the squared magnitudes of elements therein converges
to a nonrandom distribution. In this paper, noncrossing partition theory is
employed to derive expressions for several asymptotic eigenvalue moments (AEM)
related quantities of a large Wishart-type random matrix $\bb H\bb H^\dag$ when
$\bb H$ has a random variance profile and is nonergodic in one channel
realization. It is known the empirical eigenvalue moments of $\bb H\bb H^\dag$
are dependent (or independent) on realizations of the variance profile of $\bb
H$ when $\bb H$ is nonergodic (or ergodic) in one channel realization. For
nonergodic $\bb H$, the AEM can be obtained by i) deriving the expression of
AEM in terms of the variance profile of $\bb H$, and then ii) averaging the
derived quantity over the ensemble of variance profiles. Since the AEM are
independent of the variance profile if $\bb H$ is ergodic, the expression
obtained in i) can also serve as the AEM formula for ergodic $\bb H$ when any
realization of variance profile is available.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2008 05:31:40 GMT"
}
]
| 2008-10-07T00:00:00 | [
[
"Hwang",
"Chien-Hwa",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0883 | K. Raj Kumar | K. Raj Kumar, G. Caire and A. L. Moustakas | Asymptotic Performance of Linear Receivers in MIMO Fading Channels | 48 pages, Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2027493 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Linear receivers are an attractive low-complexity alternative to optimal
processing for multi-antenna MIMO communications. In this paper we characterize
the information-theoretic performance of MIMO linear receivers in two different
asymptotic regimes. For fixed number of antennas, we investigate the limit of
error probability in the high-SNR regime in terms of the Diversity-Multiplexing
Tradeoff (DMT). Following this, we characterize the error probability for fixed
SNR in the regime of large (but finite) number of antennas.
As far as the DMT is concerned, we report a negative result: we show that
both linear Zero-Forcing (ZF) and linear Minimum Mean-Square Error (MMSE)
receivers achieve the same DMT, which is largely suboptimal even in the case
where outer coding and decoding is performed across the antennas. We also
provide an approximate quantitative analysis of the markedly different behavior
of the MMSE and ZF receivers at finite rate and non-asymptotic SNR, and show
that while the ZF receiver achieves poor diversity at any finite rate, the MMSE
receiver error curve slope flattens out progressively, as the coding rate
increases.
When SNR is fixed and the number of antennas becomes large, we show that the
mutual information at the output of a MMSE or ZF linear receiver has
fluctuations that converge in distribution to a Gaussian random variable, whose
mean and variance can be characterized in closed form. This analysis extends to
the linear receiver case a well-known result previously obtained for the
optimal receiver. Simulations reveal that the asymptotic analysis captures
accurately the outage behavior of systems even with a moderate number of
antennas.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2008 05:32:20 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Feb 2009 04:34:27 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Kumar",
"K. Raj",
""
],
[
"Caire",
"G.",
""
],
[
"Moustakas",
"A. L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.0906 | Hirotaka Ono | Toru Hasunuma, Toshimasa Ishii, Hirotaka Ono, Yushi Uno | A linear time algorithm for L(2,1)-labeling of trees | 23 pages, 3 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An L(2,1)-labeling of a graph $G$ is an assignment $f$ from the vertex set
$V(G)$ to the set of nonnegative integers such that $|f(x)-f(y)|\ge 2$ if $x$
and $y$ are adjacent and $|f(x)-f(y)|\ge 1$ if $x$ and $y$ are at distance 2,
for all $x$ and $y$ in $V(G)$. A $k$-L(2,1)-labeling is an assignment
$f:V(G)\to\{0,..., k\}$, and the L(2,1)-labeling problem asks the minimum $k$,
which we denote by $\lambda(G)$, among all possible assignments. It is known
that this problem is NP-hard even for graphs of treewidth 2, and tree is one of
a very few classes for which the problem is polynomially solvable. The running
time of the best known algorithm for trees had been $\mO(\Delta^{4.5} n)$ for
more than a decade, however, an $\mO(n^{1.75})$-time algorithm has been
proposed recently, which substantially improved the previous one, where
$\Delta$ is the maximum degree of $T$ and $n=|V(T)|$. In this paper, we finally
establish a linear time algorithm for L(2,1)-labeling of trees.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2008 08:21:17 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Nov 2010 07:06:08 GMT"
}
]
| 2010-11-25T00:00:00 | [
[
"Hasunuma",
"Toru",
""
],
[
"Ishii",
"Toshimasa",
""
],
[
"Ono",
"Hirotaka",
""
],
[
"Uno",
"Yushi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.1018 | Alexander Russell | Cristopher Moore and Alexander Russell | A simple constant-probability RP reduction from NP to Parity P | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The proof of Toda's celebrated theorem that the polynomial hierarchy is
contained in $\P^{# P}$ relies on the fact that, under mild technical
conditions on the complexity class $C$, we have $\exists C \subset BP \cdot
\oplus C$. More concretely, there is a randomized reduction which transforms
nonempty sets and the empty set, respectively, into sets of odd or even size.
The customary method is to invoke Valiant's and Vazirani's randomized reduction
from NP to UP, followed by amplification of the resulting success probability
from $1/\poly(n)$ to a constant by combining the parities of $\poly(n)$ trials.
Here we give a direct algebraic reduction which achieves constant success
probability without the need for amplification. Our reduction is very simple,
and its analysis relies on well-known properties of the Legendre symbol in
finite fields.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2008 17:23:06 GMT"
}
]
| 2008-10-07T00:00:00 | [
[
"Moore",
"Cristopher",
""
],
[
"Russell",
"Alexander",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0810.1103 | Prasanna Chaporkar | Prasanna Chaporkar, Kimmo Kansanen, Ralf R. M\"uller | Channel and Multiuser Diversities in Wireless Systems: Delay-Energy
Tradeoff | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a communication system with multi-access fading channel. Each
user in the system requires certain rate guarantee. Our main contribution is to
devise a scheduling scheme called "Opportunistic Super-position Coding" that
satisfies the users' rate requirements. Using mean-field analysis, i.e., when
the number of users go to infinity, we analytically show that the energy
required to guarantee the required user rate can be made as small as required
at the cost of a higher delay ("delay-energy tradeoff"). We explicitly compute
the delay under the proposed scheduling policy and discuss how delay
differentiation can be achieved. We extend the results to multi-band
multi-access channel. Finally, all the results can be generalized in a
straightforward fashion to broadcast channel due to the AWGN
multiaccess-broadcast duality.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 06:00:35 GMT"
}
]
| 2009-11-24T00:00:00 | [
[
"Chaporkar",
"Prasanna",
""
],
[
"Kansanen",
"Kimmo",
""
],
[
"Müller",
"Ralf R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1105 | Anantha Raman Krishnan | Shashi Kiran Chilappagari, Anantha Raman Krishnan, Bane Vasic, Michael
W. Marcellin | Low-Density Parity-Check Codes Which Can Correct Three Errors Under
Iterative Decoding | 25 pages. 11 Figures. Part of the work was presented at the
Information Theory Workshop (ITW), May 5-9 2008, Porto, Portugal. submitted
to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we give necessary and sufficient conditions for low-density
parity-check (LDPC) codes with column-weight three to correct three errors when
decoded using hard-decision message-passing decoding. Additionally, we give
necessary and sufficient conditions for column-weight-four codes to correct
three errors in four iterations of hard-decision message-passing decoding. We
then give a construction technique which results in codes satisfying these
conditions. We also provide numerical assessment of code performance via
simulation results.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 06:22:16 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Chilappagari",
"Shashi Kiran",
""
],
[
"Krishnan",
"Anantha Raman",
""
],
[
"Vasic",
"Bane",
""
],
[
"Marcellin",
"Michael W.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1106 | Kees Middelburg | J.A. Bergstra, C.A. Middelburg | On the expressiveness of single-pass instruction sequences | 14 pages; error corrected, acknowledgement added; another error
corrected, another acknowledgement added | Theory of Computing Systems, 50(2):313--328, 2012 | 10.1007/s00224-010-9301-8 | PRG0813 | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We perceive programs as single-pass instruction sequences. A single-pass
instruction sequence under execution is considered to produce a behaviour to be
controlled by some execution environment. Threads as considered in basic thread
algebra model such behaviours. We show that all regular threads, i.e. threads
that can only be in a finite number of states, can be produced by single-pass
instruction sequences without jump instructions if use can be made of Boolean
registers. We also show that, in the case where goto instructions are used
instead of jump instructions, a bound to the number of labels restricts the
expressiveness.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 06:51:53 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2008 08:28:59 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Jan 2009 08:14:05 GMT"
}
]
| 2012-01-12T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0810.1119 | Danny Bickson | Ori Shental, Danny Bickson, Paul H. Siegel, Jack K. Wolf and Danny
Dolev | Gaussian Belief Propagation for Solving Systems of Linear Equations:
Theory and Application | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The canonical problem of solving a system of linear equations arises in
numerous contexts in information theory, communication theory, and related
fields. In this contribution, we develop a solution based upon Gaussian belief
propagation (GaBP) that does not involve direct matrix inversion. The iterative
nature of our approach allows for a distributed message-passing implementation
of the solution algorithm. We address the properties of the GaBP solver,
including convergence, exactness, computational complexity, message-passing
efficiency and its relation to classical solution methods. We use numerical
examples and applications, like linear detection, to illustrate these
properties through the use of computer simulations. This empirical study
demonstrates the attractiveness (e.g., faster convergence rate) of the proposed
GaBP solver in comparison to conventional linear-algebraic iterative solution
methods.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 08:06:42 GMT"
}
]
| 2008-10-08T00:00:00 | [
[
"Shental",
"Ori",
""
],
[
"Bickson",
"Danny",
""
],
[
"Siegel",
"Paul H.",
""
],
[
"Wolf",
"Jack K.",
""
],
[
"Dolev",
"Danny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1132 | Moufida Maimour | Moufida Maimour (CRAN) | Maximally Radio-Disjoint Multipath Routing for Wireless Multimedia
Sensor Networks | null | Fourth ACM International Workshop on Wireless Multimedia
Networking and erformance Modeling, Vancouver : Canada (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In wireless sensor networks, bandwidth is one of precious resources to
multimedia applications. To get more bandwidth, multipath routing is one
appropriate solution provided that inter-path interferences are minimized. In
this paper, we address the problem of interfering paths in the context of
wireless multimedia sensor networks and consider both intra-session as well as
inter-session interferences. Our main objective is to provide necessary
bandwidth to multimedia applications through non-interfering paths while
increasing the network lifetime. To do so, we adopt an incremental approach
where for a given session, only one path is built at once. Additional paths are
built when required, typically in case of congestion or bandwidth shortage.
Interference awareness and energy saving are achieved by switching a subset of
sensor nodes in a {\em passive state} in which they do not take part in the
routing process. Despite the routing overhead introduced by the incremental
approach we adopt, our simulations show that this can be compensated by the
overall achieved throughput and the amount of consumed energy per correctly
received packet especially for relatively long sessions such as multimedia
ones. This is mainly due to the fact that a small number of non-interfering
paths allows for better performances than a large number of interfering ones.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 09:04:06 GMT"
}
]
| 2008-10-08T00:00:00 | [
[
"Maimour",
"Moufida",
"",
"CRAN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.1139 | Moufida Maimour | Moufida Maimour (CRAN), Congduc Pham (LIUPPA), Julien Amelot (CRAN) | Load Repartition for Congestion Control in Multimedia Wireless Sensor
Networks with Multipath Routing | null | 3rd International Symposium on Wireless Pervasive Computing, ISWPC
2008, Santorini : Gr\`ece (2008) | 10.1109/ISWPC.2008.4556156 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless sensor networks hold a great potential in the deployment of several
applications of a paramount importance in our daily life. Video sensors are
able to improve a number of these applications where new approaches adapted to
both wireless sensor networks and video transport specific characteristics are
required. The aim of this work is to provide the necessary bandwidth and to
alleviate the congestion problem to video streaming. In this paper, we
investigate various load repartition strategies for congestion control
mechanism on top of a multipath routing feature. Simulations are performed in
order to get insight into the performances of our proposals.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 09:32:40 GMT"
}
]
| 2009-01-18T00:00:00 | [
[
"Maimour",
"Moufida",
"",
"CRAN"
],
[
"Pham",
"Congduc",
"",
"LIUPPA"
],
[
"Amelot",
"Julien",
"",
"CRAN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.1151 | Alban Ponse | Jan A. Bergstra and Alban Ponse | Periodic Single-Pass Instruction Sequences | 16 pages, 3 tables, New title | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A program is a finite piece of data that produces a (possibly infinite)
sequence of primitive instructions. From scratch we develop a linear notation
for sequential, imperative programs, using a familiar class of primitive
instructions and so-called repeat instructions, a particular type of control
instructions. The resulting mathematical structure is a semigroup. We relate
this set of programs to program algebra (PGA) and show that a particular
subsemigroup is a carrier for PGA by providing axioms for single-pass
congruence, structural congruence, and thread extraction. This subsemigroup
characterizes periodic single-pass instruction sequences and provides a direct
basis for PGA's toolset.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 13:55:21 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Apr 2013 12:11:12 GMT"
}
]
| 2013-04-17T00:00:00 | [
[
"Bergstra",
"Jan A.",
""
],
[
"Ponse",
"Alban",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0810.1186 | Hubie Chen | Hubie Chen, Omer Gimenez | On-the-fly Macros | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a domain-independent algorithm that computes macros in a novel
way. Our algorithm computes macros "on-the-fly" for a given set of states and
does not require previously learned or inferred information, nor prior domain
knowledge. The algorithm is used to define new domain-independent tractable
classes of classical planning that are proved to include \emph{Blocksworld-arm}
and \emph{Towers of Hanoi}.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 13:10:26 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jul 2012 14:54:51 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Chen",
"Hubie",
""
],
[
"Gimenez",
"Omer",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0810.1187 | Onur Ozan Koyluoglu | Onur Ozan Koyluoglu, Hesham El Gamal, Lifeng Lai, and H. Vincent Poor | Interference Alignment for Secrecy | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2011.2132430 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the frequency/time selective $K$-user Gaussian
interference channel with secrecy constraints. Two distinct models, namely the
interference channel with confidential messages and the one with an external
eavesdropper, are analyzed. The key difference between the two models is the
lack of channel state information (CSI) about the external eavesdropper. Using
interference alignment along with secrecy pre-coding, it is shown that each
user can achieve non-zero secure Degrees of Freedom (DoF) for both cases. More
precisely, the proposed coding scheme achieves $\frac{K-2}{2K-2}$ secure DoF
{\em with probability one} per user in the confidential messages model. For the
external eavesdropper scenario, on the other hand, it is shown that each user
can achieve $\frac{K-2}{2K}$ secure DoF {\em in the ergodic setting}.
Remarkably, these results establish the {\em positive impact} of interference
on the secrecy capacity region of wireless networks.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 13:13:25 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Koyluoglu",
"Onur Ozan",
""
],
[
"Gamal",
"Hesham El",
""
],
[
"Lai",
"Lifeng",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1197 | Enrico Paolini | E. Paolini and M. Chiani | Construction of Near-Optimum Burst Erasure Correcting Low-Density
Parity-Check Codes | 15 pages, 4 figures. IEEE Trans. on Communications, accepted
(submitted in Feb. 2007) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a simple, general-purpose and effective tool for the design of
low-density parity-check (LDPC) codes for iterative correction of bursts of
erasures is presented. The design method consists in starting from the
parity-check matrix of an LDPC code and developing an optimized parity-check
matrix, with the same performance on the memory-less erasure channel, and
suitable also for the iterative correction of single bursts of erasures. The
parity-check matrix optimization is performed by an algorithm called pivot
searching and swapping (PSS) algorithm, which executes permutations of
carefully chosen columns of the parity-check matrix, after a local analysis of
particular variable nodes called stopping set pivots. This algorithm can be in
principle applied to any LDPC code. If the input parity-check matrix is
designed for achieving good performance on the memory-less erasure channel,
then the code obtained after the application of the PSS algorithm provides good
joint correction of independent erasures and single erasure bursts. Numerical
results are provided in order to show the effectiveness of the PSS algorithm
when applied to different categories of LDPC codes.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 14:08:35 GMT"
}
]
| 2008-10-08T00:00:00 | [
[
"Paolini",
"E.",
""
],
[
"Chiani",
"M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1199 | Pascal Vaillant | Pascal Vaillant | Une grammaire formelle du cr\'eole martiniquais pour la g\'en\'eration
automatique | In French. 10 pages, 4 figures, LaTeX 2e using EPSF and custom
package Taln2003.sty (JC/PZ, ATALA). Proceedings of the 10th annual
French-speaking conference on Natural Language Processing: `Traitement
Automatique des Langues Naturelles' (TALN 2003), Batz-sur-mer, France, 10-14
June 2003 | Actes de la 10eme conference annuelle sur le Traitement
Automatique des Langues Naturelles (TALN 2003), p. 255-264. Batz-sur-mer,
France, 10-14 juin 2003 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, some first elements of a computational modelling of the
grammar of the Martiniquese French Creole dialect are presented. The sources of
inspiration for the modelling is the functional description given by Damoiseau
(1984), and Pinalie's & Bernabe's (1999) grammar manual. Based on earlier works
in text generation (Vaillant, 1997), a unification grammar formalism, namely
Tree Adjoining Grammars (TAG), and a modelling of lexical functional categories
based on syntactic and semantic properties, are used to implement a grammar of
Martiniquese Creole which is used in a prototype of text generation system. One
of the main applications of the system could be its use as a tool software
supporting the task of learning Creole as a second language. -- Nous
pr\'esenterons dans cette communication les premiers travaux de mod\'elisation
informatique d'une grammaire de la langue cr\'eole martiniquaise, en nous
inspirant des descriptions fonctionnelles de Damoiseau (1984) ainsi que du
manuel de Pinalie & Bernab\'e (1999). Prenant appui sur des travaux
ant\'erieurs en g\'en\'eration de texte (Vaillant, 1997), nous utilisons un
formalisme de grammaires d'unification, les grammaires d'adjonction d'arbres
(TAG d'apr\`es l'acronyme anglais), ainsi qu'une mod\'elisation de cat\'egories
lexicales fonctionnelles \`a base syntaxico-s\'emantique, pour mettre en oeuvre
une grammaire du cr\'eole martiniquais utilisable dans une maquette de
syst\`eme de g\'en\'eration automatique. L'un des int\'er\^ets principaux de ce
syst\`eme pourrait \^etre son utilisation comme logiciel outil pour l'aide \`a
l'apprentissage du cr\'eole en tant que langue seconde.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 14:40:19 GMT"
}
]
| 2008-10-08T00:00:00 | [
[
"Vaillant",
"Pascal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0810.1207 | Pascal Vaillant | Pascal Vaillant | A Layered Grammar Model: Using Tree-Adjoining Grammars to Build a Common
Syntactic Kernel for Related Dialects | 8 pages, 3 figures, 2 tables. LaTeX 2e using the coling08 style (and
standard packages like epsf, amssymb, multirow, url...). Proceedings of the
9th International Workshop on Tree Adjoining Grammars and Related Formalisms.
Tuebingen, Baden-Wurttemberg, Germany, 6-8 June 2008 | Proceedings of the Ninth International Workshop on Tree Adjoining
Grammars and Related Formalisms (TAG+9 2008), p. 157-164. Tuebingen,
Baden-Wurttemberg, Germany, 6-8 June 2008 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article describes the design of a common syntactic description for the
core grammar of a group of related dialects. The common description does not
rely on an abstract sub-linguistic structure like a metagrammar: it consists in
a single FS-LTAG where the actual specific language is included as one of the
attributes in the set of attribute types defined for the features. When the
lang attribute is instantiated, the selected subset of the grammar is
equivalent to the grammar of one dialect. When it is not, we have a model of a
hybrid multidialectal linguistic system. This principle is used for a group of
creole languages of the West-Atlantic area, namely the French-based Creoles of
Haiti, Guadeloupe, Martinique and French Guiana.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 14:50:59 GMT"
}
]
| 2008-10-08T00:00:00 | [
[
"Vaillant",
"Pascal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0810.1212 | Pascal Vaillant | Pascal Vaillant, Richard Nock and Claudia Henry | Analyse spectrale des textes: d\'etection automatique des fronti\`eres
de langue et de discours | In French. 10 pages, 5 figures, LaTeX 2e using EPSF and custom
package taln2006.sty (designed by Pierre Zweigenbaum, ATALA). Proceedings of
the 13th annual French-speaking conference on Natural Language Processing:
`Traitement Automatique des Langues Naturelles' (TALN 2006), Louvain
(Leuven), Belgium, 10-13 April 2003 | Verbum ex machina: Actes de la 13eme conference annuelle sur le
Traitement Automatique des Langues Naturelles (TALN 2006), p. 619-629.
Louvain (Leuven), Belgique, 10-13 avril 2006 | null | null | cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a theoretical framework within which information on the vocabulary
of a given corpus can be inferred on the basis of statistical information
gathered on that corpus. Inferences can be made on the categories of the words
in the vocabulary, and on their syntactical properties within particular
languages. Based on the same statistical data, it is possible to build matrices
of syntagmatic similarity (bigram transition matrices) or paradigmatic
similarity (probability for any pair of words to share common contexts). When
clustered with respect to their syntagmatic similarity, words tend to group
into sublanguage vocabularies, and when clustered with respect to their
paradigmatic similarity, into syntactic or semantic classes. Experiments have
explored the first of these two possibilities. Their results are interpreted in
the frame of a Markov chain modelling of the corpus' generative processe(s): we
show that the results of a spectral analysis of the transition matrix can be
interpreted as probability distributions of words within clusters. This method
yields a soft clustering of the vocabulary into sublanguages which contribute
to the generation of heterogeneous corpora. As an application, we show how
multilingual texts can be visually segmented into linguistically homogeneous
segments. Our method is specifically useful in the case of related languages
which happened to be mixed in corpora.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 15:25:31 GMT"
}
]
| 2008-10-08T00:00:00 | [
[
"Vaillant",
"Pascal",
""
],
[
"Nock",
"Richard",
""
],
[
"Henry",
"Claudia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0810.1226 | Attila Fekete | Attila Fekete | Traffic Dynamics of Computer Networks | phd thesis (135 pages, 62 figures) | null | null | null | cs.NI cond-mat.stat-mech | http://creativecommons.org/licenses/publicdomain/ | Two important aspects of the Internet, namely the properties of its topology
and the characteristics of its data traffic, have attracted growing attention
of the physics community. My thesis has considered problems of both aspects.
First I studied the stochastic behavior of TCP, the primary algorithm governing
traffic in the current Internet, in an elementary network scenario consisting
of a standalone infinite-sized buffer and an access link. The effect of the
fast recovery and fast retransmission (FR/FR) algorithms is also considered. I
showed that my model can be extended further to involve the effect of link
propagation delay, characteristic of WAN. I continued my thesis with the
investigation of finite-sized semi-bottleneck buffers, where packets can be
dropped not only at the link, but also at the buffer. I demonstrated that the
behavior of the system depends only on a certain combination of the parameters.
Moreover, an analytic formula was derived that gives the ratio of packet loss
rate at the buffer to the total packet loss rate. This formula makes it
possible to treat buffer-losses as if they were link-losses. Finally, I studied
computer networks from a structural perspective. I demonstrated through fluid
simulations that the distribution of resources, specifically the link
bandwidth, has a serious impact on the global performance of the network. Then
I analyzed the distribution of edge betweenness in a growing scale-free tree
under the condition that a local property, the in-degree of the "younger" node
of an arbitrary edge, is known in order to find an optimum distribution of link
capacity. The derived formula is exact even for finite-sized networks. I also
calculated the conditional expectation of edge betweenness, rescaled for
infinite networks.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 15:54:06 GMT"
}
]
| 2008-10-08T00:00:00 | [
[
"Fekete",
"Attila",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
]
|
0810.1234 | Ali Parandehgheibi | Ali ParandehGheibi, Atilla Eryilmaz, Asuman Ozdaglar, Muriel Medard | On Resource Allocation in Fading Multiple Access Channels - An Efficient
Approximate Projection Approach | 32 pages, Submitted to IEEE Trans. on Information Theory | null | 10.1109/TIT.2010.2053902 | LIDS report 2787 | cs.IT cs.NI math.IT math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of rate and power allocation in a multiple-access
channel. Our objective is to obtain rate and power allocation policies that
maximize a general concave utility function of average transmission rates on
the information theoretic capacity region of the multiple-access channel. Our
policies does not require queue-length information. We consider several
different scenarios. First, we address the utility maximization problem in a
nonfading channel to obtain the optimal operating rates, and present an
iterative gradient projection algorithm that uses approximate projection. By
exploiting the polymatroid structure of the capacity region, we show that the
approximate projection can be implemented in time polynomial in the number of
users. Second, we consider resource allocation in a fading channel. Optimal
rate and power allocation policies are presented for the case that power
control is possible and channel statistics are available. For the case that
transmission power is fixed and channel statistics are unknown, we propose a
greedy rate allocation policy and provide bounds on the performance difference
of this policy and the optimal policy in terms of channel variations and
structure of the utility function. We present numerical results that
demonstrate superior convergence rate performance for the greedy policy
compared to queue-length based policies. In order to reduce the computational
complexity of the greedy policy, we present approximate rate allocation
policies which track the greedy policy within a certain neighborhood that is
characterized in terms of the speed of fading.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 16:29:10 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"ParandehGheibi",
"Ali",
""
],
[
"Eryilmaz",
"Atilla",
""
],
[
"Ozdaglar",
"Asuman",
""
],
[
"Medard",
"Muriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0810.1248 | Ali Parandehgheibi | Ali ParandehGheibi, Atilla Eryilmaz, Asuman Ozdaglar, Muriel Medard | Resource Allocation in Multiple Access Channels | 5 pages, In proc. of ACSSC 2007 | null | null | null | cs.IT cs.NI math.IT math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of rate allocation in a Gaussian multiple-access
channel, with the goal of maximizing a utility function over transmission
rates. In contrast to the literature which focuses on linear utility functions,
we study general concave utility functions. We present a gradient projection
algorithm for this problem. Since the constraint set of the problem is
described by exponentially many constraints, methods that use exact projections
are computationally intractable. Therefore, we develop a new method that uses
approximate projections. We use the polymatroid structure of the capacity
region to show that the approximate projection can be implemented by a
recursive algorithm in time polynomial in the number of users. We further
propose another algorithm for implementing the approximate projections using
rate-splitting and show improved bounds on its convergence time.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 17:29:52 GMT"
}
]
| 2008-10-08T00:00:00 | [
[
"ParandehGheibi",
"Ali",
""
],
[
"Eryilmaz",
"Atilla",
""
],
[
"Ozdaglar",
"Asuman",
""
],
[
"Medard",
"Muriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0810.1253 | Ali Parandehgheibi | Ali ParandehGheibi, Atilla Eryilmaz, Asuman Ozdaglar, Muriel Medard | Dynamic Rate Allocation in Fading Multiple-access Channels | 9 pages, In proc. of ITA 2008 | null | null | null | cs.IT cs.NI math.IT math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of rate allocation in a fading Gaussian
multiple-access channel (MAC) with fixed transmission powers. Our goal is to
maximize a general concave utility function of transmission rates over the
throughput capacity region. In contrast to earlier works in this context that
propose solutions where a potentially complex optimization problem must be
solved in every decision instant, we propose a low-complexity approximate rate
allocation policy and analyze the effect of temporal channel variations on its
utility performance. To the best of our knowledge, this is the first work that
studies the tracking capabilities of an approximate rate allocation scheme
under fading channel conditions. We build on an earlier work to present a new
rate allocation policy for a fading MAC that implements a low-complexity
approximate gradient projection iteration for each channel measurement, and
explicitly characterize the effect of the speed of temporal channel variations
on the tracking neighborhood of our policy. We further improve our results by
proposing an alternative rate allocation policy for which tighter bounds on the
size of the tracking neighborhood are derived. These proposed rate allocation
policies are computationally efficient in our setting since they implement a
single gradient projection iteration per channel measurement and each such
iteration relies on approximate projections which has polynomial-complexity in
the number of users.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 17:55:19 GMT"
}
]
| 2008-10-08T00:00:00 | [
[
"ParandehGheibi",
"Ali",
""
],
[
"Eryilmaz",
"Atilla",
""
],
[
"Ozdaglar",
"Asuman",
""
],
[
"Medard",
"Muriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0810.1260 | Ali Parandehgheibi | Ali ParandehGheibi, Atilla Eryilmaz, Asuman Ozdaglar, Muriel Medard | Rate and Power Allocation in Fading Multiple Access Channels | 6 pages, In proc. of WiOpt 2008 | null | null | null | cs.IT cs.NI math.IT math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of rate and power allocation in a fading
multiple-access channel. Our objective is to obtain rate and power allocation
policies that maximize a utility function defined over average transmission
rates. In contrast with the literature, which focuses on the linear case, we
present results for general concave utility functions. We consider two cases.
In the first case, we assume that power control is possible and channel
statistics are known. In this case, we show that the optimal policies can be
obtained greedily by maximizing a linear utility function at each channel
state. In the second case, we assume that power control is not possible and
channel statistics are not available. In this case, we define a greedy rate
allocation policy and provide upper bounds on the performance difference
between the optimal and the greedy policy. Our bounds highlight the dependence
of the performance difference on the channel variations and the structure of
the utility function.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 18:08:10 GMT"
}
]
| 2008-10-08T00:00:00 | [
[
"ParandehGheibi",
"Ali",
""
],
[
"Eryilmaz",
"Atilla",
""
],
[
"Ozdaglar",
"Asuman",
""
],
[
"Medard",
"Muriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0810.1261 | Pascal Vaillant | Richard Nock, Pascal Vaillant, Frank Nielsen and Claudia Henry | Soft Uncoupling of Markov Chains for Permeable Language Distinction: A
New Algorithm | 6 pages, 7 embedded figures, LaTeX 2e using the ecai2006.cls document
class and the algorithm2e.sty style file (+ standard packages like epsfig,
amsmath, amssymb, amsfonts...). Extends the short version contained in the
ECAI 2006 proceedings | ECAI 2006: 17th European Conference on Artificial Intelligence.
Riva del Garda, Italy, 29 August - 1st September 2006 | null | null | cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Without prior knowledge, distinguishing different languages may be a hard
task, especially when their borders are permeable. We develop an extension of
spectral clustering -- a powerful unsupervised classification toolbox -- that
is shown to resolve accurately the task of soft language distinction. At the
heart of our approach, we replace the usual hard membership assignment of
spectral clustering by a soft, probabilistic assignment, which also presents
the advantage to bypass a well-known complexity bottleneck of the method.
Furthermore, our approach relies on a novel, convenient construction of a
Markov chain out of a corpus. Extensive experiments with a readily available
system clearly display the potential of the method, which brings a visually
appealing soft distinction of languages that may define altogether a whole
corpus.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 18:09:07 GMT"
}
]
| 2008-10-08T00:00:00 | [
[
"Nock",
"Richard",
""
],
[
"Vaillant",
"Pascal",
""
],
[
"Nielsen",
"Frank",
""
],
[
"Henry",
"Claudia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.