id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0810.1267 | Ali Parandehgheibi | Ali ParandehGheibi, Muriel Medard, Asuman Ozdaglar, Atilla Eryilmaz | Information Theory vs. Queueing Theory for Resource Allocation in
Multiple Access Channels | 5 pages. In proc. of PIMRC 2008 | null | null | null | cs.IT cs.NI math.IT math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of rate allocation in a fading Gaussian
multiple-access channel with fixed transmission powers. The goal is to maximize
a general concave utility function of the expected achieved rates of the users.
There are different approaches to this problem in the literature. From an
information theoretic point of view, rates are allocated only by using the
channel state information. The queueing theory approach utilizes the global
queue-length information for rate allocation to guarantee throughput optimality
as well as maximizing a utility function of the rates. In this work, we make a
connection between these two approaches by showing that the information
theoretic capacity region of a multiple-access channel and its stability region
are equivalent. Moreover, our numerical results show that a simple greedy
policy which does not use the queue-length information can outperform
queue-length based policies in terms of convergence rate and fairness.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 18:24:21 GMT"
}
]
| 2008-10-08T00:00:00 | [
[
"ParandehGheibi",
"Ali",
""
],
[
"Medard",
"Muriel",
""
],
[
"Ozdaglar",
"Asuman",
""
],
[
"Eryilmaz",
"Atilla",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0810.1268 | Sang Joon Kim | Sang Joon Kim, Natasha Devroye, Vahid Tarokh | Bi-directional half-duplex protocols with multiple relays | 44 pages, 17 figures, Submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a bi-directional relay channel, two nodes wish to exchange independent
messages over a shared wireless half-duplex channel with the help of relays.
Recent work has considered information theoretic limits of the bi-directional
relay channel with a single relay. In this work we consider bi-directional
relaying with multiple relays. We derive achievable rate regions and outer
bounds for half-duplex protocols with multiple decode and forward relays and
compare these to the same protocols with amplify and forward relays in an
additive white Gaussian noise channel. We consider three novel classes of
half-duplex protocols: the (m,2) 2 phase protocol with m relays, the (m,3) 3
phase protocol with m relays, and general (m, t) Multiple Hops and Multiple
Relays (MHMR) protocols, where m is the total number of relays and 3<t< m+3 is
the number of temporal phases in the protocol. The (m,2) and (m,3) protocols
extend previous bi-directional relaying protocols for a single m=1 relay, while
the new (m,t) protocol efficiently combines multi-hop routing with
message-level network coding. Finally, we provide a comprehensive treatment of
the MHMR protocols with decode and forward relaying and amplify and forward
relaying in the Gaussian noise, obtaining their respective achievable rate
regions, outer bounds and relative performance under different SNRs and relay
geometries, including an analytical comparison on the protocols at low and high
SNR.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 18:26:39 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Sep 2010 11:57:46 GMT"
}
]
| 2010-09-10T00:00:00 | [
[
"Kim",
"Sang Joon",
""
],
[
"Devroye",
"Natasha",
""
],
[
"Tarokh",
"Vahid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1316 | Victor Yodaiken | Victor Yodaiken | The meaning of concurrent programs | Technical report on using recursive functions for the low level
semantics of concurrent systems | null | null | null | cs.DM cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The semantics of assignment and mutual exclusion in concurrent and
multi-core/multi-processor systems is presented with attention to low level
architectural features in an attempt to make the presentation realistic.
Recursive functions on event sequences are used to define state dependent
functions and variables in ordinary (non-formal-method) algebra.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 23:03:29 GMT"
}
]
| 2008-10-09T00:00:00 | [
[
"Yodaiken",
"Victor",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
]
|
0810.1319 | Mohamed Abdel Ghany Mr | Mohamed Abdel Ghany, Ahmed Sultan and Hesham El Gamal | ARQ-Based Secret Key Sharing | null | null | null | WINC-TR-1002 | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper develops a novel framework for sharing secret keys using existing
Automatic Repeat reQuest (ARQ) protocols. Our approach exploits the multi-path
nature of the wireless environment to hide the key from passive eavesdroppers.
The proposed framework does not assume the availability of any prior channel
state information (CSI) and exploits only the one bit ACK/NACK feedback from
the legitimate receiver. Compared with earlier approaches, the main innovation
lies in the distribution of key bits among multiple ARQ frames. Interestingly,
this idea allows for achieving a positive secrecy rate even when the
eavesdropper experiences more favorable channel conditions, on average, than
the legitimate receiver. In the sequel, we characterize the information
theoretic limits of the proposed schemes, develop low complexity explicit
implementations, and conclude with numerical results that validate our
theoretical claims.
| [
{
"version": "v1",
"created": "Tue, 7 Oct 2008 23:22:26 GMT"
}
]
| 2008-10-09T00:00:00 | [
[
"Ghany",
"Mohamed Abdel",
""
],
[
"Sultan",
"Ahmed",
""
],
[
"Gamal",
"Hesham El",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1355 | Michael Mahoney | Jure Leskovec, Kevin J. Lang, Anirban Dasgupta, and Michael W. Mahoney | Community Structure in Large Networks: Natural Cluster Sizes and the
Absence of Large Well-Defined Clusters | 66 pages, a much expanded version of our WWW 2008 paper | null | null | null | cs.DS physics.data-an physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A large body of work has been devoted to defining and identifying clusters or
communities in social and information networks. We explore from a novel
perspective several questions related to identifying meaningful communities in
large social and information networks, and we come to several striking
conclusions. We employ approximation algorithms for the graph partitioning
problem to characterize as a function of size the statistical and structural
properties of partitions of graphs that could plausibly be interpreted as
communities. In particular, we define the network community profile plot, which
characterizes the "best" possible community--according to the conductance
measure--over a wide range of size scales. We study over 100 large real-world
social and information networks. Our results suggest a significantly more
refined picture of community structure in large networks than has been
appreciated previously. In particular, we observe tight communities that are
barely connected to the rest of the network at very small size scales; and
communities of larger size scales gradually "blend into" the expander-like core
of the network and thus become less "community-like." This behavior is not
explained, even at a qualitative level, by any of the commonly-used network
generation models. Moreover, it is exactly the opposite of what one would
expect based on intuition from expander graphs, low-dimensional or
manifold-like graphs, and from small social networks that have served as
testbeds of community detection algorithms. We have found that a generative
graph model, in which new edges are added via an iterative "forest fire"
burning process, is able to produce graphs exhibiting a network community
profile plot similar to what we observe in our network datasets.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2008 05:42:43 GMT"
}
]
| 2008-10-13T00:00:00 | [
[
"Leskovec",
"Jure",
""
],
[
"Lang",
"Kevin J.",
""
],
[
"Dasgupta",
"Anirban",
""
],
[
"Mahoney",
"Michael W.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0810.1368 | Ijaz Haider Naqvi | Ali Khaleghi (IETR), Gha\"is El Zein (IETR), Ijaz Haider Naqvi (IETR) | Demonstration of Time-Reversal in Indoor Ultra-Wideband Communication:
Time Domain Measurement | null | IEEE International Symposium on Wireless Communication Systems
2007, Trondheim : Norv\`ege (2007) | 10.1109/ISWCS.2007.4392383 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using time domain measurements, we assess the feasibility of time-reversal
technique in ultra-wideband (UWB) communication. A typical indoor propagation
channel is selected for the exploration. The channel response between receive
and transmit antenna pairs is measured using time domain equipments which
include an arbitrary wave generator (AWG) and a digital storage oscilloscope
(DSO). The time-reversed version of the channel response is constructed with
AWG and re-transmitted in the channel. The equivalent time reversed channel
response is recorded. The properties of the time reversal technique in the line
of sight (LOS) co-polar and cross-polar scenarios are measured.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2008 07:15:09 GMT"
}
]
| 2008-10-09T00:00:00 | [
[
"Khaleghi",
"Ali",
"",
"IETR"
],
[
"Zein",
"Ghaïs El",
"",
"IETR"
],
[
"Naqvi",
"Ijaz Haider",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.1383 | Krzysztof R. Apt | Krzysztof R. Apt, Arantza Est\'evez-Fern\'andez | Sequential pivotal mechanisms for public project problems | 19 pages. The version without the appendix will appear in the Proc.
2nd International Symposium on Algorithmic Game Theory, 2009 | null | 10.1007/978-3-642-04645-2_9 | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well-known that for several natural decision problems no budget
balanced Groves mechanisms exist. This has motivated recent research on
designing variants of feasible Groves mechanisms (termed as `redistribution of
VCG (Vickrey-Clarke-Groves) payments') that generate reduced deficit. With this
in mind, we study sequential mechanisms and consider optimal strategies that
could reduce the deficit resulting under the simultaneous mechanism. We show
that such strategies exist for the sequential pivotal mechanism of the
well-known public project problem. We also exhibit an optimal strategy with the
property that a maximal social welfare is generated when each player follows
it. Finally, we show that these strategies can be achieved by an implementation
in Nash equilibrium.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2008 08:42:31 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Jul 2009 15:22:47 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Estévez-Fernández",
"Arantza",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0810.1424 | Sidharth Jaggi | Bikash Kumar Dey, Sidharth Jaggi, and Michael Langberg | "Real" Slepian-Wolf Codes | 20 pages. Preliminary version presented at ISIT 2008, Toronto, Canada | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a novel achievability proof of the Slepian-Wolf theorem for i.i.d.
sources over finite alphabets. We demonstrate that random codes that are linear
over the real field achieve the classical Slepian-Wolf rate-region. For finite
alphabets we show that typicality decoding is equivalent to solving an integer
program. Minimum entropy decoding is also shown to achieve exponentially small
probability of error. The techniques used may be of independent interest for
code design for a wide class of information theory problems, and for the field
of compressed sensing.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2008 12:57:51 GMT"
}
]
| 2008-10-09T00:00:00 | [
[
"Dey",
"Bikash Kumar",
""
],
[
"Jaggi",
"Sidharth",
""
],
[
"Langberg",
"Michael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1430 | Omar Mehanna | Omar Mehanna, Ahmed Sultan and Hesham El Gamal | Blind Cognitive MAC Protocols | 5 pages, submitted to ICC'09 | null | null | null | cs.NI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the design of cognitive Medium Access Control (MAC) protocols
enabling an unlicensed (secondary) transmitter-receiver pair to communicate
over the idle periods of a set of licensed channels, i.e., the primary network.
The objective is to maximize data throughput while maintaining the
synchronization between secondary users and avoiding interference with licensed
(primary) users. No statistical information about the primary traffic is
assumed to be available a-priori to the secondary user. We investigate two
distinct sensing scenarios. In the first, the secondary transmitter is capable
of sensing all the primary channels, whereas it senses one channel only in the
second scenario. In both cases, we propose MAC protocols that efficiently learn
the statistics of the primary traffic online. Our simulation results
demonstrate that the proposed blind protocols asymptotically achieve the
throughput obtained when prior knowledge of primary traffic statistics is
available.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2008 13:22:46 GMT"
}
]
| 2008-10-09T00:00:00 | [
[
"Mehanna",
"Omar",
""
],
[
"Sultan",
"Ahmed",
""
],
[
"Gamal",
"Hesham El",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0810.1481 | Marko A. Rodriguez | Marko A. Rodriguez, Joe Geldart | An Evidential Path Logic for Multi-Relational Networks | null | Proceedings of the Association for the Advancement of Artificial
Intelligence Spring Symposium: Technosocial Predictive Analytics, volume
SS-09-09, pages 114-119, ISBN:978-1-57735-416-1, AAAI Press, Stanford
University, March 2009. | null | LA-UR-08-06397 | cs.LO cs.SC | http://creativecommons.org/licenses/publicdomain/ | Multi-relational networks are used extensively to structure knowledge.
Perhaps the most popular instance, due to the widespread adoption of the
Semantic Web, is the Resource Description Framework (RDF). One of the primary
purposes of a knowledge network is to reason; that is, to alter the topology of
the network according to an algorithm that uses the existing topological
structure as its input. There exist many such reasoning algorithms. With
respect to the Semantic Web, the bivalent, monotonic reasoners of the RDF
Schema (RDFS) and the Web Ontology Language (OWL) are the most prevalent.
However, nothing prevents other forms of reasoning from existing in the
Semantic Web. This article presents a non-bivalent, non-monotonic, evidential
logic and reasoner that is an algebraic ring over a multi-relational network
equipped with two binary operations that can be composed to execute various
forms of inference. Given its multi-relational grounding, it is possible to use
the presented evidential framework as another method for structuring knowledge
and reasoning in the Semantic Web. The benefits of this framework are that it
works with arbitrary, partial, and contradictory knowledge while, at the same
time, it supports a tractable approximate reasoning process.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2008 17:49:15 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Dec 2008 18:17:46 GMT"
}
]
| 2009-05-13T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
],
[
"Geldart",
"Joe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0810.1499 | Lenka Zdeborova | Lenka Zdeborov\'a and Marc M\'ezard | Constraint satisfaction problems with isolated solutions are hard | 19 pages, 12 figures | J. Stat. Mech. (2008) P12004 | 10.1088/1742-5468/2008/12/P12004 | null | cond-mat.dis-nn cond-mat.stat-mech cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the phase diagram and the algorithmic hardness of the random
`locked' constraint satisfaction problems, and compare them to the commonly
studied 'non-locked' problems like satisfiability of boolean formulas or graph
coloring. The special property of the locked problems is that clusters of
solutions are isolated points. This simplifies significantly the determination
of the phase diagram, which makes the locked problems particularly appealing
from the mathematical point of view. On the other hand we show empirically that
the clustered phase of these problems is extremely hard from the algorithmic
point of view: the best known algorithms all fail to find solutions. Our
results suggest that the easy/hard transition (for currently known algorithms)
in the locked problems coincides with the clustering transition. These should
thus be regarded as new benchmarks of really hard constraint satisfaction
problems.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2008 18:28:28 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Dec 2008 07:53:25 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Zdeborová",
"Lenka",
""
],
[
"Mézard",
"Marc",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.1506 | Ijaz Haider Naqvi | Ijaz Haider Naqvi (IETR), Ali Khaleghi (IETR), Gha\"is El Zein (IETR) | Performance Enhancement of Multiuser Time Reversal UWB Communication
System | null | IEEE International Symposium on Wireless Communication Systems
2007, Trondheim : Norv\`ege (2007) | 10.1109/ISWCS.2007.4392404 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | UWB communication is a recent research area for indoor propagation channels.
Time Reversal (TR) communication in UWB has shown promising results for
improving the system performance. In multiuser environment, the system
performance is significantly degraded due to the interference among different
users. TR reduces the interference caused by multiusers due to its spatial
focusing property. The performance of a multiuser TR communication system is
further improved if the TR filter is modified. In this paper, multiuser TR in
UWB communication is investigated using simple TR filter and a modified TR
filter with circular shift operation. The concept of circular shift in TR is
analytically studied. Thereafter, the channel impulse responses (CIR) of a
typical indoor laboratory environment are measured. The measured CIRs are used
to analyze the received signal peak power and signal to interference ratio
(SIR) with and without performing the circular shift operation in a multiuser
environment.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2008 18:54:07 GMT"
}
]
| 2008-10-09T00:00:00 | [
[
"Naqvi",
"Ijaz Haider",
"",
"IETR"
],
[
"Khaleghi",
"Ali",
"",
"IETR"
],
[
"Zein",
"Ghaïs El",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.1513 | Ijaz Haider Naqvi | Ijaz Haider Naqvi (IETR), Tanguy P\'erennou (LAAS) | A DCCP Congestion Control Mechanism for Wired- cum-Wireless Environments | null | IEEE Wireless Communications and Networking Conference, Hong-Kong
(2007) | 10.1109/WCNC.2007.715 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing transport protocols, be it TCP, SCTP or DCCP, do not provide an
efficient congestion control mechanism for heterogeneous wired-cum-wireless
networks. Solutions involving implicit loss discrimination schemes have been
proposed but were never implemented. Appropriate mechanisms can dramatically
improve bandwidth usage over the Internet, especially for multimedia transport
based on partial reliability. In this paper we have implemented and evaluated a
congestion control mechanism that implicitly discriminates congestion and
wireless losses in the datagram congestion control protocol (DCCP) congestion
control identification (CCID) framework. The new CCID was implemented as a NS-2
module. Comparisons were made with the TCP-like CCID and showed that the
bandwidth utilization was improved by more than 30% and up to 50% in
significant setups.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2008 19:46:24 GMT"
}
]
| 2008-10-09T00:00:00 | [
[
"Naqvi",
"Ijaz Haider",
"",
"IETR"
],
[
"Pérennou",
"Tanguy",
"",
"LAAS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.1571 | Rena Bakhshi | Rena Bakhshi and Daniela Gavidia and Wan Fokkink and Maarten van Steen | An Analytical Model of Information Dissemination for a Gossip-based
Protocol | 20 pages, 8 figures, technical report | null | 10.1016/j.comnet.2009.03.017 | null | cs.DC cs.DM cs.IT cs.PF math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop an analytical model of information dissemination for a gossiping
protocol that combines both pull and push approaches. With this model we
analyse how fast an item is replicated through a network, and how fast the item
spreads in the network, and how fast the item covers the network. We also
determine the optimal size of the exchange buffer, to obtain fast replication.
Our results are confirmed by large-scale simulation experiments.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 04:42:27 GMT"
}
]
| 2010-03-11T00:00:00 | [
[
"Bakhshi",
"Rena",
""
],
[
"Gavidia",
"Daniela",
""
],
[
"Fokkink",
"Wan",
""
],
[
"van Steen",
"Maarten",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1574 | Michael Singer | Ruyong Feng, Michael F. Singer, Min Wu | Liouvillian Solutions of Difference-Differential Equations | 53 pages | null | null | null | cs.SC math.CA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a field k$with an automorphism \sigma and a derivation \delta, we
introduce the notion of liouvillian solutions of linear difference-differential
systems {\sigma(Y) = AY, \delta(Y) = BY} over k and characterize the existence
of liouvillian solutions in terms of the Galois group of the systems. We will
give an algorithm to decide whether such a system has liouvillian solutions
when k = C(x,t), \sigma(x) = x+1, \delta = d/dt$ and the size of the system is
a prime.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 05:16:48 GMT"
}
]
| 2008-10-10T00:00:00 | [
[
"Feng",
"Ruyong",
""
],
[
"Singer",
"Michael F.",
""
],
[
"Wu",
"Min",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
}
]
|
0810.1624 | Danny Bickson | Danny Bickson, Genia Bezman, Danny Dolev and Benny Pinkas | Peer-to-Peer Secure Multi-Party Numerical Computation | 10 pages, 2 figures, appeared in the 8th IEEE Peer-to-Peer Computing,
Aachen, Germany, Sept. 2008 | The 8th IEEE Peer-to-Peer Computing (P2P 2008), Aachen, Germany,
Sept. 2008 | 10.1109/P2P.2008.22 | null | cs.CR cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an efficient framework for enabling secure multi-party numerical
computations in a Peer-to-Peer network. This problem arises in a range of
applications such as collaborative filtering, distributed computation of trust
and reputation, monitoring and numerous other tasks, where the computing nodes
would like to preserve the privacy of their inputs while performing a joint
computation of a certain function.
Although there is a rich literature in the field of distributed systems
security concerning secure multi-party computation, in practice it is hard to
deploy those methods in very large scale Peer-to-Peer networks. In this work,
we examine several possible approaches and discuss their feasibility. Among the
possible approaches, we identify a single approach which is both scalable and
theoretically secure.
An additional novel contribution is that we show how to compute the
neighborhood based collaborative filtering, a state-of-the-art collaborative
filtering algorithm, winner of the Netflix progress prize of the year 2007. Our
solution computes this algorithm in a Peer-to-Peer network, using a privacy
preserving computation, without loss of accuracy.
Using extensive large scale simulations on top of real Internet topologies,
we demonstrate the applicability of our approach. As far as we know, we are the
first to implement such a large scale secure multi-party simulation of networks
of millions of nodes and hundreds of millions of edges.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 13:07:36 GMT"
}
]
| 2008-11-15T00:00:00 | [
[
"Bickson",
"Danny",
""
],
[
"Bezman",
"Genia",
""
],
[
"Dolev",
"Danny",
""
],
[
"Pinkas",
"Benny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0810.1628 | Danny Bickson | Danny Bickson, Ori Shental and Danny Dolev | Distributed Kalman Filter via Gaussian Belief Propagation | 8 pages, 3 figures, appeared in the 46th Annual Allerton Conference
on Communication, Control and Computing, Allerton House, Illinois, Sept. 2008 | The 46th Annual Allerton Conference on Communication, Control and
Computing, Allerton House, Illinois, Sept. 2008 | 10.1109/ALLERTON.2008.4797617 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent result shows how to compute distributively and efficiently the linear
MMSE for the multiuser detection problem, using the Gaussian BP algorithm. In
the current work, we extend this construction, and show that operating this
algorithm twice on the matching inputs, has several interesting
interpretations. First, we show equivalence to computing one iteration of the
Kalman filter. Second, we show that the Kalman filter is a special case of the
Gaussian information bottleneck algorithm, when the weight parameter $\beta =
1$. Third, we discuss the relation to the Affine-scaling interior-point method
and show it is a special case of Kalman filter.
Besides of the theoretical interest of this linking estimation,
compression/clustering and optimization, we allow a single distributed
implementation of those algorithms, which is a highly practical and important
task in sensor and mobile ad-hoc networks. Application to numerous problem
domains includes collaborative signal processing and distributed allocation of
resources in a communication network.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 11:42:00 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Bickson",
"Danny",
""
],
[
"Shental",
"Ori",
""
],
[
"Dolev",
"Danny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1631 | Danny Bickson | Danny Bickson, Yoav Tock, Ori Shental and Danny Dolev | Polynomial Linear Programming with Gaussian Belief Propagation | 7 pages, 1 figure, appeared in the 46th Annual Allerton Conference on
Communication, Control and Computing, Allerton House, Illinois, Sept. 2008 | The 46th Annual Allerton Conference on Communication, Control and
Computing, Allerton House, Illinois, Sept. 2008 | 10.1109/ALLERTON.2008.4797652 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interior-point methods are state-of-the-art algorithms for solving linear
programming (LP) problems with polynomial complexity. Specifically, the
Karmarkar algorithm typically solves LP problems in time O(n^{3.5}), where $n$
is the number of unknown variables. Karmarkar's celebrated algorithm is known
to be an instance of the log-barrier method using the Newton iteration. The
main computational overhead of this method is in inverting the Hessian matrix
of the Newton iteration. In this contribution, we propose the application of
the Gaussian belief propagation (GaBP) algorithm as part of an efficient and
distributed LP solver that exploits the sparse and symmetric structure of the
Hessian matrix and avoids the need for direct matrix inversion. This approach
shifts the computation from realm of linear algebra to that of probabilistic
inference on graphical models, thus applying GaBP as an efficient inference
engine. Our construction is general and can be used for any interior-point
algorithm which uses the Newton method, including non-linear program solvers.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 11:49:12 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Bickson",
"Danny",
""
],
[
"Tock",
"Yoav",
""
],
[
"Shental",
"Ori",
""
],
[
"Dolev",
"Danny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1639 | Gabriel Istrate | Gabriel Istrate | Identifying almost sorted permutations from TCP buffer dynamics | null | null | null | null | cs.DS cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Associate to each sequence $A$ of integers (intending to represent packet
IDs) a sequence of positive integers of the same length ${\mathcal M}(A)$. The
$i$'th entry of ${\mathcal M}(A)$ is the size (at time $i$) of the smallest
buffer needed to hold out-of-order packets, where space is accounted for
unreceived packets as well. Call two sequences $A$, $B$ {\em equivalent}
(written $A\equiv_{FB} B$) if ${\mathcal M}(A)={\mathcal M}(B)$.
We prove the following result: any two permutations $A,B$ of the same length
with $SUS(A)$, $SUS(B)\leq 3$ (where SUS is the {\em shuffled-up-sequences}
reordering measure), and such that $A\equiv_{FB} B$ are identical.
The result (which is no longer valid if we replace the upper bound 3 by 4)
was motivated by RESTORED, a receiver-oriented model of network traffic we have
previously introduced.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 12:27:32 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Istrate",
"Gabriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0810.1648 | Danny Bickson | Danny Bickson, Elad Yom-Tov and Danny Dolev | A Gaussian Belief Propagation Solver for Large Scale Support Vector
Machines | 12 pages, 1 figure, appeared in the 5th European Complex Systems
Conference, Jerusalem, Sept. 2008 | The 5th European Complex Systems Conference (ECCS 2008),
Jerusalem, Sept. 2008 | null | null | cs.LG cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Support vector machines (SVMs) are an extremely successful type of
classification and regression algorithms. Building an SVM entails solving a
constrained convex quadratic programming problem, which is quadratic in the
number of training samples. We introduce an efficient parallel implementation
of an support vector regression solver, based on the Gaussian Belief
Propagation algorithm (GaBP).
In this paper, we demonstrate that methods from the complex system domain
could be utilized for performing efficient distributed computation. We compare
the proposed algorithm to previously proposed distributed and single-node SVM
solvers. Our comparison shows that the proposed algorithm is just as accurate
as these solvers, while being significantly faster, especially for large
datasets. We demonstrate scalability of the proposed algorithm to up to 1,024
computing nodes and hundreds of thousands of data points using an IBM Blue Gene
supercomputer. As far as we know, our work is the largest parallel
implementation of belief propagation ever done, demonstrating the applicability
of this algorithm for large scale distributed computing systems.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 12:56:43 GMT"
}
]
| 2008-11-15T00:00:00 | [
[
"Bickson",
"Danny",
""
],
[
"Yom-Tov",
"Elad",
""
],
[
"Dolev",
"Danny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1650 | Enrico Grande | Alessandro Agnetis, Enrico Grande, Andrea Pacifici | Demand allocation with latency cost functions | null | null | null | null | cs.DM cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the exact resolution of a MINLP model where resources can be
activated in order to satisfy a demand (a partitioning constraint) while
minimizing total cost. Cost functions are convex latency functions plus a fixed
activation cost. A branch and bound algorithm is devised, featuring three
important characteristics. First, the lower bound (therefore each subproblem)
can be computed in O(nlog n). Second, to break symmetries resulting in improved
efficiency, the branching scheme is n-ary (instead of the "classical" binary).
Third, a very affective heuristic is used to compute a good upper bound at the
root node of the enumeration tree. All three features lead to a successful
comparison against CPLEX MIPQ, which is the fastest among several commercial
and open-source solvers: computational results showing this fact are provided.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 13:10:18 GMT"
}
]
| 2008-10-10T00:00:00 | [
[
"Agnetis",
"Alessandro",
""
],
[
"Grande",
"Enrico",
""
],
[
"Pacifici",
"Andrea",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0810.1655 | Martin Burkhart | Martin Burkhart, Daniela Brauckhoff, Martin May | On the Utility of Anonymized Flow Traces for Anomaly Detection | null | Proceedings of the 19th ITC Specialist Seminar on Network Usage
and Traffic (ITC SS 19), October 2008, Berlin, Germany | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The sharing of network traces is an important prerequisite for the
development and evaluation of efficient anomaly detection mechanisms.
Unfortunately, privacy concerns and data protection laws prevent network
operators from sharing these data. Anonymization is a promising solution in
this context; however, it is unclear if the sanitization of data preserves the
traffic characteristics or introduces artifacts that may falsify traffic
analysis results. In this paper, we examine the utility of anonymized flow
traces for anomaly detection. We quantitatively evaluate the impact of IP
address anonymization, namely variations of permutation and truncation, on the
detectability of large-scale anomalies. Specifically, we analyze three weeks of
un-sampled and non-anonymized network traces from a medium-sized backbone
network. We find that all anonymization techniques, except prefix-preserving
permutation, degrade the utility of data for anomaly detection. We show that
the degree of degradation depends to a large extent on the nature and mix of
anomalies present in a trace. Moreover, we present a case study that
illustrates how traffic characteristics of individual hosts are distorted by
anonymization.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 14:10:42 GMT"
}
]
| 2008-10-10T00:00:00 | [
[
"Burkhart",
"Martin",
""
],
[
"Brauckhoff",
"Daniela",
""
],
[
"May",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.1729 | Danny Bickson | Danny Bickson, Danny Dolev, Ori Shental, Paul H. Siegel and Jack K.
Wolf | Gaussian Belief Propagation Based Multiuser Detection | 6 pages, 1 figures, appeared in the 2008 IEEE International Symposium
on Information Theory, Toronto, July 2008 | The 2008 IEEE International Symposium on Information Theory (ISIT
2008), Toronto, July 2008 | 10.1109/ISIT.2008.4595314 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we present a novel construction for solving the linear
multiuser detection problem using the Gaussian Belief Propagation algorithm.
Our algorithm yields an efficient, iterative and distributed implementation of
the MMSE detector. We compare our algorithm's performance to a recent result
and show an improved memory consumption, reduced computation steps and a
reduction in the number of sent messages. We prove that recent work by
Montanari et al. is an instance of our general algorithm, providing new
convergence results for both algorithms.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 19:55:18 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Bickson",
"Danny",
""
],
[
"Dolev",
"Danny",
""
],
[
"Shental",
"Ori",
""
],
[
"Siegel",
"Paul H.",
""
],
[
"Wolf",
"Jack K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1732 | Christopher Frenz | Christopher M. Frenz | Introduction to Searching with Regular Expressions | 13 pages. From the Proceedings of the 2008 Trenton Computer Festival | null | null | null | cs.IR | http://creativecommons.org/licenses/by/3.0/ | The explosive rate of information growth and availability often makes it
increasingly difficult to locate information pertinent to your needs. These
problems are often compounded when keyword based search methodologies are not
adequate for describing the information you seek. In many instances,
information such as Web site URLs, phone numbers, etc. can often be better
identified through the use of a textual pattern than by keyword. For example,
many more phone numbers could be picked up by a search for the pattern (XXX)
XXX-XXXX, where X could be any digit, than would be by a search for any
specific phone number (i.e. the keyword approach). Programming languages
typically allow for the matching of textual patterns via the usage of regular
expressions. This tutorial will provide an introduction to the basics of
programming regular expressions as well as provide an introduction to how
regular expressions can be applied to data processing tasks such as information
extraction and search refinement.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 19:57:31 GMT"
}
]
| 2008-10-10T00:00:00 | [
[
"Frenz",
"Christopher M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0810.1735 | MinJi Kim | MinJi Kim, Jay Kumar Sundararajan, Muriel Medard, Atilla Eryilmaz,
Ralf Koetter | Network Coding in a Multicast Switch | 26 pages, 27 figures, submitted to IEEE Transactions on Information
Theory | null | 10.1109/TIT.2010.2090213 | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of serving multicast flows in a crossbar switch is considered.
Intra-flow linear network coding is shown to achieve a larger rate region than
the case without coding. A traffic pattern is presented which is achievable
with coding but requires a switch speedup when coding is not allowed. The rate
region with coding can be characterized in a simple graph-theoretic manner, in
terms of the stable set polytope of the "enhanced conflict graph". No such
graph-theoretic characterization is known for the case of fanout splitting
without coding.
The minimum speedup needed to achieve 100% throughput with coding is shown to
be upper bounded by the imperfection ratio of the enhanced conflict graph. When
applied to KxN switches with unicasts and broadcasts only, this gives a bound
of min{(2K-1)/K,2N/(N+1)} on the speedup. This shows that speedup, which is
usually implemented in hardware, can often be substituted by network coding,
which can be done in software.
Computing an offline schedule (using prior knowledge of the flow rates) is
reduced to fractional weighted graph coloring. A graph-theoretic online
scheduling algorithm (using only queue occupancy information) is also proposed,
that stabilizes the queues for all rates within the rate region.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 20:30:43 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Kim",
"MinJi",
""
],
[
"Sundararajan",
"Jay Kumar",
""
],
[
"Medard",
"Muriel",
""
],
[
"Eryilmaz",
"Atilla",
""
],
[
"Koetter",
"Ralf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1736 | Danny Bickson | Ori Shental, Paul H. Siegel, Jack K. Wolf, Danny Bickson and Danny
Dolev | Gaussian Belief Propagation Solver for Systems of Linear Equations | 5 pages, 2 figures, appeared in the 2008 IEEE International Symposium
on Information Theory, Toronto, July 2008 | The 2008 IEEE International Symposium on Information Theory (ISIT
2008), Toronto, July 2008 | 10.1109/ISIT.2008.4595311 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The canonical problem of solving a system of linear equations arises in
numerous contexts in information theory, communication theory, and related
fields. In this contribution, we develop a solution based upon Gaussian belief
propagation (GaBP) that does not involve direct matrix inversion. The iterative
nature of our approach allows for a distributed message-passing implementation
of the solution algorithm. We also address some properties of the GaBP solver,
including convergence, exactness, its max-product version and relation to
classical solution methods. The application example of decorrelation in CDMA is
used to demonstrate the faster convergence rate of the proposed solver in
comparison to conventional linear-algebraic iterative solution methods.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 20:16:25 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Shental",
"Ori",
""
],
[
"Siegel",
"Paul H.",
""
],
[
"Wolf",
"Jack K.",
""
],
[
"Bickson",
"Danny",
""
],
[
"Dolev",
"Danny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1756 | Milan Bradonjic | Milan Bradonjic, Eddie Kohler, Rafail Ostrovsky | Near-Optimal Radio Use For Wireless Network Synchronization | 23 pages | null | 10.1016/j.tcs.2011.09.026 | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the model of communication where wireless devices can either
switch their radios off to save energy, or switch their radios on and engage in
communication. We distill a clean theoretical formulation of this problem of
minimizing radio use and present near-optimal solutions. Our base model ignores
issues of communication interference, although we also extend the model to
handle this requirement. We assume that nodes intend to communicate
periodically, or according to some time-based schedule. Clearly, perfectly
synchronized devices could switch their radios on for exactly the minimum
periods required by their joint schedules. The main challenge in the deployment
of wireless networks is to synchronize the devices' schedules, given that their
initial schedules may be offset relative to one another (even if their clocks
run at the same speed). We significantly improve previous results, and show
optimal use of the radio for two processors and near-optimal use of the radio
for synchronization of an arbitrary number of processors. In particular, for
two processors we prove deterministically matching $\Theta(\sqrt{n})$ upper and
lower bounds on the number of times the radio has to be on, where $n$ is the
discretized uncertainty period of the clock shift between the two processors.
(In contrast, all previous results for two processors are randomized.) For
$m=n^\beta$ processors (for any $\beta < 1$) we prove $\Omega(n^{(1-\beta)/2})$
is the lower bound on the number of times the radio has to be switched on (per
processor), and show a nearly matching (in terms of the radio use)
$\~{O}(n^{(1-\beta)/2})$ randomized upper bound per processor, with failure
probability exponentially close to 0. For $\beta \geq 1$ our algorithm runs
with at most $poly-log(n)$ radio invocations per processor. Our bounds also
hold in a radio-broadcast model where interference must be taken into account.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 20:41:23 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Feb 2012 22:44:09 GMT"
}
]
| 2012-02-15T00:00:00 | [
[
"Bradonjic",
"Milan",
""
],
[
"Kohler",
"Eddie",
""
],
[
"Ostrovsky",
"Rafail",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0810.1773 | Amir Leshem | Eitan Sayag, Amir Leshem, Nikolaos D. Sidiropoulos | Finite Word Length Effects on Transmission Rate in Zero Forcing Linear
Precoding for Multichannel DSL | null | null | 10.1109/TSP.2009.2012889 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Crosstalk interference is the limiting factor in transmission over copper
lines. Crosstalk cancelation techniques show great potential for enabling the
next leap in DSL transmission rates. An important issue when implementing
crosstalk cancelation techniques in hardware is the effect of finite world
length on performance. In this paper we provide an analysis of the performance
of linear zero-forcing precoders, used for crosstalk compensation, in the
presence of finite word length errors. We quantify analytically the trade off
between precoder word length and transmission rate degradation. More
specifically, we prove a simple formula for the transmission rate loss as a
function of the number of bits used for precoding, the signal to noise ratio,
and the standard line parameters. We demonstrate, through simulations on real
lines, the accuracy of our estimates. Moreover, our results are stable in the
presence of channel estimation errors. Finally, we show how to use these
estimates as a design tool for DSL linear crosstalk precoders. For example, we
show that for standard VDSL2 precoded systems, 14 bits representation of the
precoder entries results in capacity loss below 1% for lines over 300m.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2008 22:40:14 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Sayag",
"Eitan",
""
],
[
"Leshem",
"Amir",
""
],
[
"Sidiropoulos",
"Nikolaos D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1808 | Walid Hachem | Abla Kammoun (LTCI), Malika Kharouf (LTCI), Walid Hachem (LTCI), Jamal
Najim (LTCI) | A Central Limit Theorem for the SINR at the LMMSE Estimator Output for
Large Dimensional Signals | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is devoted to the performance study of the Linear Minimum Mean
Squared Error estimator for multidimensional signals in the large dimension
regime. Such an estimator is frequently encountered in wireless communications
and in array processing, and the Signal to Interference and Noise Ratio (SINR)
at its output is a popular performance index. The SINR can be modeled as a
random quadratic form which can be studied with the help of large random matrix
theory, if one assumes that the dimension of the received and transmitted
signals go to infinity at the same pace. This paper considers the asymptotic
behavior of the SINR for a wide class of multidimensional signal models that
includes general multi-antenna as well as spread spectrum transmission models.
The expression of the deterministic approximation of the SINR in the large
dimension regime is recalled and the SINR fluctuations around this
deterministic approximation are studied. These fluctuations are shown to
converge in distribution to the Gaussian law in the large dimension regime, and
their variance is shown to decrease as the inverse of the signal dimension.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2008 06:45:49 GMT"
}
]
| 2008-10-13T00:00:00 | [
[
"Kammoun",
"Abla",
"",
"LTCI"
],
[
"Kharouf",
"Malika",
"",
"LTCI"
],
[
"Hachem",
"Walid",
"",
"LTCI"
],
[
"Najim",
"Jamal",
"",
"LTCI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1823 | Christophe Paul | Emeric Gioan and Christophe Paul | Split decomposition and graph-labelled trees: characterizations and
fully-dynamic algorithms for totally decomposable graphs | extended abstract appeared in ISAAC 2007: Dynamic distance hereditary
graphs using split decompositon. In International Symposium on Algorithms and
Computation - ISAAC. Number 4835 in Lecture Notes, pages 41-51, 2007 | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we revisit the split decomposition of graphs and give new
combinatorial and algorithmic results for the class of totally decomposable
graphs, also known as the distance hereditary graphs, and for two non-trivial
subclasses, namely the cographs and the 3-leaf power graphs. Precisely, we give
strutural and incremental characterizations, leading to optimal fully-dynamic
recognition algorithms for vertex and edge modifications, for each of these
classes. These results rely on a new framework to represent the split
decomposition, namely the graph-labelled trees, which also captures the modular
decomposition of graphs and thereby unify these two decompositions techniques.
The point of the paper is to use bijections between these graph classes and
trees whose nodes are labelled by cliques and stars. Doing so, we are also able
to derive an intersection model for distance hereditary graphs, which answers
an open problem.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2008 07:49:30 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Apr 2011 12:53:57 GMT"
}
]
| 2011-04-19T00:00:00 | [
[
"Gioan",
"Emeric",
""
],
[
"Paul",
"Christophe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.1851 | Marek Karpinski | Piotr Berman, Marek Karpinski, Alex Zelikovsky | 1.25 Approximation Algorithm for the Steiner Tree Problem with Distances
One and Two | null | null | null | null | cs.CC cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a 1.25 approximation algorithm for the Steiner Tree Problem with
distances one and two, improving on the best known bound for that problem.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2008 11:25:09 GMT"
}
]
| 2008-10-13T00:00:00 | [
[
"Berman",
"Piotr",
""
],
[
"Karpinski",
"Marek",
""
],
[
"Zelikovsky",
"Alex",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.1858 | Anne Canteaut | Come Berbain (FT R&D), Olivier Billet (FT R&D), Anne Canteaut (INRIA
Rocquencourt), Nicolas Courtois, Henri Gilbert (FT R&D), Louis Goubin, Aline
Gouget, Louis Granboulan, Cedric Lauradoux (INRIA Rocquencourt), Marine
Minier (INRIA Rocquencourt), Thomas Pornin, Herve Sibert | SOSEMANUK: a fast software-oriented stream cipher | null | New Stream Cipher Designs - The eSTREAM finalists (2008) 98-118 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sosemanuk is a new synchronous software-oriented stream cipher, corresponding
to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is
variable between 128 and 256 bits. It ac- commodates a 128-bit initial value.
Any key length is claimed to achieve 128-bit security. The Sosemanuk cipher
uses both some basic design principles from the stream cipher SNOW 2.0 and some
transformations derived from the block cipher SERPENT. Sosemanuk aims at
improv- ing SNOW 2.0 both from the security and from the efficiency points of
view. Most notably, it uses a faster IV-setup procedure. It also requires a
reduced amount of static data, yielding better performance on several
architectures.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2008 11:53:53 GMT"
}
]
| 2008-10-13T00:00:00 | [
[
"Berbain",
"Come",
"",
"FT R&D"
],
[
"Billet",
"Olivier",
"",
"FT R&D"
],
[
"Canteaut",
"Anne",
"",
"INRIA\n Rocquencourt"
],
[
"Courtois",
"Nicolas",
"",
"FT R&D"
],
[
"Gilbert",
"Henri",
"",
"FT R&D"
],
[
"Goubin",
"Louis",
"",
"INRIA Rocquencourt"
],
[
"Gouget",
"Aline",
"",
"INRIA Rocquencourt"
],
[
"Granboulan",
"Louis",
"",
"INRIA Rocquencourt"
],
[
"Lauradoux",
"Cedric",
"",
"INRIA Rocquencourt"
],
[
"Minier",
"Marine",
"",
"INRIA Rocquencourt"
],
[
"Pornin",
"Thomas",
""
],
[
"Sibert",
"Herve",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0810.1904 | Heidi Gebauer | Heidi Gebauer | Unsatisfiable (k,(4*2^k/k))-CNF formulas | 3 pages, 1 figure | null | null | null | cs.DM cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A boolean formula in a conjuctive normal form is called a (k,s)-formula if
every clause contains exactly k variables and every variable occurs in at most
s clauses. We prove the existence of a (k, 4 * (2^k/k))-CNF formula which is
unsatisfiable.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2008 15:23:37 GMT"
}
]
| 2008-10-13T00:00:00 | [
[
"Gebauer",
"Heidi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0810.1973 | Soumya Jana | Soumya Jana | Alphabet Sizes of Auxiliary Variables in Canonical Inner Bounds | 20 pages, no figures, explanation of a part of impending IEEE IT
submission | null | 10.1109/CISS.2009.5054692 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Alphabet size of auxiliary random variables in our canonical description is
derived. Our analysis improves upon estimates known in special cases, and
generalizes to an arbitrary multiterminal setup. The salient steps include
decomposition of constituent rate polytopes into orthants, translation of a
hyperplane till it becomes tangent to the achievable region at an extreme
point, and derivation of minimum auxiliary alphabet sizes based on
Caratheodory's theorem.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2008 21:57:10 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Jana",
"Soumya",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1980 | Raul Etkin | Raul Etkin, Neri Merhav, Erik Ordentlich | Error Exponents of Optimum Decoding for the Interference Channel | Submitted to IEEE Transactions on Information Theory, Oct 7, 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Exponential error bounds for the finite-alphabet interference channel (IFC)
with two transmitter-receiver pairs, are investigated under the random coding
regime. Our focus is on optimum decoding, as opposed to heuristic decoding
rules that have been used in previous works, like joint typicality decoding,
decoding based on interference cancellation, and decoding that considers the
interference as additional noise. Indeed, the fact that the actual interfering
signal is a codeword and not an i.i.d. noise process complicates the
application of conventional techniques to the performance analysis of the
optimum decoder. Using analytical tools rooted in statistical physics, we
derive a single letter expression for error exponents achievable under optimum
decoding and demonstrate strict improvement over error exponents obtainable
using suboptimal decoding rules, but which are amenable to more conventional
analysis.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2008 22:59:55 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Etkin",
"Raul",
""
],
[
"Merhav",
"Neri",
""
],
[
"Ordentlich",
"Erik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.1981 | Heidi Gebauer | Heidi Gebauer | Disproving the Neighborhood Conjecture | 14 pages, 3 figures | null | null | null | cs.GT cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the following Maker/Breaker game. Maker and Breaker take turns in
choosing vertices from a given n-uniform hypergraph F, with Maker going first.
Maker's goal is to completely occupy a hyperedge and Breaker tries to avoid
this. Beck conjectures that if the maximum neighborhood size of F is at most
2^(n-1) then Breaker has a winning strategy. We disprove this conjecture by
establishing an n-uniform hypergraph with maximum neighborhood size 3*2^(n-3)
where Maker has a winning strategy. Moreover, we show how to construct an
n-uniform hypergraph with maximum degree 2^(n-1)/n where Maker has a winning
strategy. Finally we show that each n-uniform hypergraph with maximum degree at
most 2^(n-2)/(en) has a proper halving 2-coloring, which solves another open
problem posed by Beck related to the Neighborhood Conjecture.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2008 23:22:56 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Gebauer",
"Heidi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0810.1991 | Axel Boldt | Axel Boldt and Michael Janich | A global physician-oriented medical information system | 8 pages | null | null | null | cs.CY cs.AI cs.DB | http://creativecommons.org/licenses/publicdomain/ | We propose to improve medical decision making and reduce global health care
costs by employing a free Internet-based medical information system with two
main target groups: practicing physicians and medical researchers. After
acquiring patients' consent, physicians enter medical histories, physiological
data and symptoms or disorders into the system; an integrated expert system can
then assist in diagnosis and statistical software provides a list of the most
promising treatment options and medications, tailored to the patient.
Physicians later enter information about the outcomes of the chosen treatments,
data the system uses to optimize future treatment recommendations. Medical
researchers can analyze the aggregate data to compare various drugs or
treatments in defined patient populations on a large scale.
| [
{
"version": "v1",
"created": "Sat, 11 Oct 2008 02:01:45 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Boldt",
"Axel",
""
],
[
"Janich",
"Michael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0810.1997 | Heping Gao | Heping Gao, Meera Sitharam | Characterizing 1-Dof Henneberg-I graphs with efficient configuration
spaces | null | null | null | null | cs.CG cs.RO cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define and study exact, efficient representations of realization spaces of
a natural class of underconstrained 2D Euclidean Distance Constraint
Systems(EDCS) or Frameworks based on 1-dof Henneberg-I graphs. Each
representation corresponds to a choice of parameters and yields a different
parametrized configuration space. Our notion of efficiency is based on the
algebraic complexities of sampling the configuration space and of obtaining a
realization from the sample (parametrized) configuration. Significantly, we
give purely combinatorial characterizations that capture (i) the class of
graphs that have efficient configuration spaces and (ii) the possible choices
of representation parameters that yield efficient configuration spaces for a
given graph. Our results automatically yield an efficient algorithm for
sampling realizations, without missing extreme or boundary realizations. In
addition, our results formally show that our definition of efficient
configuration space is robust and that our characterizations are tight. We
choose the class of 1-dof Henneberg-I graphs in order to take the next step in
a systematic and graded program of combinatorial characterizations of efficient
configuration spaces. In particular, the results presented here are the first
characterizations that go beyond graphs that have connected and convex
configuration spaces.
| [
{
"version": "v1",
"created": "Sun, 12 Oct 2008 20:17:21 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Nov 2008 03:48:59 GMT"
}
]
| 2008-11-06T00:00:00 | [
[
"Gao",
"Heping",
""
],
[
"Sitharam",
"Meera",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0810.2021 | Pedro Moreira | Pedro Miguel Moreira, Lu\'is Paulo Reis and Ant\'onio Augusto de Sousa | Visualization Optimization : Application to the RoboCup Rescue Domain | 1+4 pages, 3 Figures | Proceedings SIACG 2006 - Ibero American Symposyum in Computer
Graphics, Santiago de Compostela, Spain, 5-7 July 2006 | null | null | cs.GR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we demonstrate the use of intelligent optimization
methodologies on the visualization optimization of virtual / simulated
environments. The problem of automatic selection of an optimized set of views,
which better describes an on-going simulation over a virtual environment is
addressed in the context of the RoboCup Rescue Simulation domain. A generic
architecture for optimization is proposed and described. We outline the
possible extensions of this architecture and argue on how several problems
within the fields of Interactive Rendering and Visualization can benefit from
it.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 12:53:57 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Moreira",
"Pedro Miguel",
""
],
[
"Reis",
"Luís Paulo",
""
],
[
"de Sousa",
"António Augusto",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0810.2042 | Steven Noble | Andrew J. Goodall, Steven D. Noble | Counting cocircuits and convex two-colourings is #P-complete | 5 pages | null | null | null | math.CO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that the problem of counting the number of colourings of the
vertices of a graph with at most two colours, such that the colour classes
induce connected subgraphs is #P-complete. We also show that the closely
related problem of counting the number of cocircuits of a graph is #P-complete.
| [
{
"version": "v1",
"created": "Sat, 11 Oct 2008 17:11:35 GMT"
}
]
| 2017-01-24T00:00:00 | [
[
"Goodall",
"Andrew J.",
""
],
[
"Noble",
"Steven D.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0810.2046 | \^Hamed \"Owladeghaffari | Hamed Owladeghaffari, Witold Pedrycz, Mostafa Sharifzadeh | Modeling of Social Transitions Using Intelligent Systems | null | null | 10.1109/CANS.2008.8 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this study, we reproduce two new hybrid intelligent systems, involve three
prominent intelligent computing and approximate reasoning methods: Self
Organizing feature Map (SOM), Neruo-Fuzzy Inference System and Rough Set Theory
(RST),called SONFIS and SORST. We show how our algorithms can be construed as a
linkage of government-society interactions, where government catches various
states of behaviors: solid (absolute) or flexible. So, transition of society,
by changing of connectivity parameters (noise) from order to disorder is
inferred.
| [
{
"version": "v1",
"created": "Sat, 11 Oct 2008 19:09:22 GMT"
}
]
| 2014-07-29T00:00:00 | [
[
"Owladeghaffari",
"Hamed",
""
],
[
"Pedrycz",
"Witold",
""
],
[
"Sharifzadeh",
"Mostafa",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0810.2061 | Daniel Hirschkoff | Daniel Hirschkoff (LIP), Damien Pous (INRIA Rh\^one-Alpes / LIG
Laboratoire d'Informatique de Grenoble) | On characterising strong bisimilarity in a fragment of CCS with
replication | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a characterisation of strong bisimilarity in a fragment of CCS
that contains only prefix, parallel composition, synchronisation and a limited
form of replication. The characterisation is not an axiomatisation, but is
instead presented as a rewriting system. We discuss how our method allows us to
derive a new congruence result in the $\pi$-calculus: congruence holds in the
sub-calculus that does not include restriction nor sum, and features a limited
form of replication. We have not formalised the latter result in all details.
| [
{
"version": "v1",
"created": "Sun, 12 Oct 2008 18:54:26 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Hirschkoff",
"Daniel",
"",
"LIP"
],
[
"Pous",
"Damien",
"",
"INRIA Rhône-Alpes / LIG\n Laboratoire d'Informatique de Grenoble"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0810.2063 | Changjia Chen | Chunxi Li and Changjia Chen | Initial Offset Placement in p2p Live Streaming Systems | 12 pages, 8 figures | null | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Initial offset placement in p2p streaming systems is studied in this paper.
Proportional placement (PP) scheme is proposed. In this scheme, peer places the
initial offset as the offset reported by other reference peer with a shift
proportional to the buffer width or offset lag of this reference peer. This
will introduce a stable placement that supports larger buffer width for peers
and small buffer width for tracker. Real deployed placement method in PPLive is
studied through measurement. It shows that, instead of based on offset lag, the
placement is based on buffer width of the reference peer to facilitate the
initial chunk fetching. We will prove that, such a PP scheme may not be stable
under arbitrary buffer occupation in the reference peer. The required average
buffer width then is derived. A simple good peer selection mechanism to check
the buffer occupation of reference peer is proposed for a stable PP scheme
based on buffer width
| [
{
"version": "v1",
"created": "Sun, 12 Oct 2008 00:15:27 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Li",
"Chunxi",
""
],
[
"Chen",
"Changjia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0810.2067 | Igor Shparlinski | David Naccache and Igor E. Shparlinski | Divisibility, Smoothness and Cryptographic Applications | null | null | null | null | math.NT cs.CC cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with products of moderate-size primes, familiarly known as
smooth numbers. Smooth numbers play a crucial role in information theory,
signal processing and cryptography.
We present various properties of smooth numbers relating to their
enumeration, distribution and occurrence in various integer sequences. We then
turn our attention to cryptographic applications in which smooth numbers play a
pivotal role.
| [
{
"version": "v1",
"created": "Sun, 12 Oct 2008 02:28:07 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Oct 2008 07:57:01 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Jan 2009 03:54:55 GMT"
}
]
| 2009-01-02T00:00:00 | [
[
"Naccache",
"David",
""
],
[
"Shparlinski",
"Igor E.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0810.2133 | Salman Avestimehr | Sameer Pawar, Amir Salman Avestimehr and David N. C. Tse | Diversity-Multiplexing Tradeoff of the Half-Duplex Relay Channel | 8 pages, 6 figures, appeared in the 46th annual Allerton conference,
September 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that the diversity-multiplexing tradeoff of a half-duplex
single-relay channel with identically distributed Rayleigh fading channel gains
meets the 2 by 1 MISO bound. We generalize the result to the case when there
are N non-interfering relays and show that the diversity-multiplexing tradeoff
is equal to the N + 1 by 1 MISO bound.
| [
{
"version": "v1",
"created": "Sun, 12 Oct 2008 22:34:13 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Pawar",
"Sameer",
""
],
[
"Avestimehr",
"Amir Salman",
""
],
[
"Tse",
"David N. C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.2134 | Changjia Chen | Chunxi Li and Changjia Chen | Fetching Strategy in the Startup Stage of p2p Live Streaming | 9 pages, 11 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A protocol named Threshold Bipolar (TB) is proposed as a fetching strategy at
the startup stage of p2p live streaming systems. In this protocol, chunks are
fetched consecutively from buffer head at the beginning. After the buffer is
filled into a threshold, chunks at the buffer tail will be fetched first while
keeping the contiguously filled part in the buffer above the threshold even
when the buffer is drained at a playback rate. High download rate, small
startup latency and natural strategy handover can be reached at the same time
by this protocol. Important parameters in this protocol are identified. The
buffer progress under this protocol is then expressed as piecewise lines
specified by those parameters. Startup traces of peers measured from PPLive are
studied to show the real performance of TB protocol in a real system. A simple
design model of TB protocol is proposed to reveal important considerations in a
practical design.
| [
{
"version": "v1",
"created": "Sun, 12 Oct 2008 22:37:35 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Li",
"Chunxi",
""
],
[
"Chen",
"Changjia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.2144 | Guangyue Han | Guangyue Han, Brian Marcus | Asymptotics of Entropy Rate in Special Families of Hidden Markov Chains | 16 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We derive an asymptotic formula for entropy rate of a hidden Markov chain
around a "weak Black Hole". We also discuss applications of the asymptotic
formula to the asymptotic behaviors of certain channels.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 02:09:50 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Han",
"Guangyue",
""
],
[
"Marcus",
"Brian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.2150 | Christine Task | Christine Task, Arun Chauhan | A Model for Communication in Clusters of Multi-core Machines | This paper has been withdrawn by the author because it was basically
a short-hand write-up of an incompletely formed idea from her Masters, and
she'd like to start using her ArXiv account for her formal PhD research | null | null | null | cs.DC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A common paradigm for scientific computing is distributed message-passing
systems, and a common approach to these systems is to implement them across
clusters of high-performance workstations. As multi-core architectures become
increasingly mainstream, these clusters are very likely to include multi-core
machines. However, the theoretical models which are currently used to develop
communication algorithms across these systems do not take into account the
unique properties of processes running on shared-memory architectures,
including shared external network connections and communication via shared
memory locations. Because of this, existing algorithms are far from optimal for
modern clusters. Additionally, recent attempts to adapt these algorithms to
multicore systems have proceeded without the introduction of a more accurate
formal model and have generally neglected to capitalize on the full power these
systems offer. We propose a new model which simply and effectively captures the
strengths of multi-core machines in collective communications patterns and
suggest how it could be used to properly optimize these patterns.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 04:04:42 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Apr 2012 19:16:37 GMT"
}
]
| 2012-05-01T00:00:00 | [
[
"Task",
"Christine",
""
],
[
"Chauhan",
"Arun",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.2164 | Neri Merhav | Neri Merhav | Joint source-channel coding via statistical mechanics: thermal
equilibrium between the source and the channel | 24 pages; submitted to IEEE Trans. on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We examine the classical joint source--channel coding problem from the
viewpoint of statistical physics and demonstrate that in the random coding
regime, the posterior probability distribution of the source given the channel
output is dominated by source sequences, which exhibit a behavior that is
highly parallel to that of thermal equilibrium between two systems of particles
that exchange energy, where one system corresponds to the source and the other
corresponds to the channel. The thermodynamical entopies of the dual physical
problem are analogous to conditional and unconditional Shannon entropies of the
source, and so, their balance in thermal equilibrium yields a simple formula
for the mutual information between the source and the channel output, that is
induced by the typical code in an ensemble of joint source--channel codes under
certain conditions. We also demonstrate how our results can be used in
applications, like the wiretap channel, and how can it be extended to multiuser
scenarios, like that of the multiple access channel.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 07:34:51 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Merhav",
"Neri",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.2175 | Jukka Suomela | Valentin Polishchuk, Jukka Suomela | A simple local 3-approximation algorithm for vertex cover | 6 pages, 1 figure | Information Processing Letters 109 (2009) 642-645 | 10.1016/j.ipl.2009.02.017 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a local algorithm (constant-time distributed algorithm) for
finding a 3-approximate vertex cover in bounded-degree graphs. The algorithm is
deterministic, and no auxiliary information besides port numbering is required.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 12:45:15 GMT"
}
]
| 2009-05-02T00:00:00 | [
[
"Polishchuk",
"Valentin",
""
],
[
"Suomela",
"Jukka",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0810.2179 | Yves Bertot | Yves Bertot (INRIA Sophia Antipolis) | Structural abstract interpretation, A formal study using Coq | null | Dans LERNET Summer School (2008) | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | interpreters are tools to compute approximations for behaviors of a program.
These approximations can then be used for optimisation or for error detection.
In this paper, we show how to describe an abstract interpreter using the
type-theory based theorem prover Coq, using inductive types for syntax and
structural recursive programming for the abstract interpreter's kernel. The
abstract interpreter can then be proved correct with respect to a Hoare logic
for the programming language.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 09:07:38 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Oct 2008 14:23:41 GMT"
}
]
| 2008-10-20T00:00:00 | [
[
"Bertot",
"Yves",
"",
"INRIA Sophia Antipolis"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0810.2208 | Tobias Koch | Tobias Koch and Amos Lapidoth | Multipath Channels of Unbounded Capacity | To be presented at the 2008 IEEE 25-th Convention of Electrical and
Electronics Engineers in Israel | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The capacity of discrete-time, noncoherent, multipath fading channels is
considered. It is shown that if the variances of the path gains decay faster
than exponentially, then capacity is unbounded in the transmit power.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 11:21:01 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Koch",
"Tobias",
""
],
[
"Lapidoth",
"Amos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.2226 | Bogdan Nicolae | Bogdan Nicolae (IRISA), Gabriel Antoniu (IRISA), Luc Boug\'e (IRISA) | Enabling Lock-Free Concurrent Fine-Grain Access to Massive Distributed
Data: Application to Supernovae Detection | null | Dans IEEE Cluster 2008 - Poster Session (2008) | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of efficiently managing massive data in a large-scale
distributed environment. We consider data strings of size in the order of
Terabytes, shared and accessed by concurrent clients. On each individual
access, a segment of a string, of the order of Megabytes, is read or modified.
Our goal is to provide the clients with efficient fine-grain access the data
string as concurrently as possible, without locking the string itself. This
issue is crucial in the context of applications in the field of astronomy,
databases, data mining and multimedia. We illustrate these requiremens with the
case of an application for searching supernovae. Our solution relies on
distributed, RAM-based data storage, while leveraging a DHT-based, parallel
metadata management scheme. The proposed architecture and algorithms have been
validated through a software prototype and evaluated in a cluster environment.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 13:07:18 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Nicolae",
"Bogdan",
"",
"IRISA"
],
[
"Antoniu",
"Gabriel",
"",
"IRISA"
],
[
"Bougé",
"Luc",
"",
"IRISA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0810.2227 | Bogdan Nicolae | Bogdan Nicolae (IRISA), Gabriel Antoniu (IRISA), Luc Boug\'e (IRISA) | Distributed Management of Massive Data: an Efficient Fine-Grain Data
Access Scheme | null | Dans VECPAR 2008 (2008) | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the problem of efficiently storing and accessing massive
data blocks in a large-scale distributed environment, while providing efficient
fine-grain access to data subsets. This issue is crucial in the context of
applications in the field of databases, data mining and multimedia. We propose
a data sharing service based on distributed, RAM-based storage of data, while
leveraging a DHT-based, natively parallel metadata management scheme. As
opposed to the most commonly used grid storage infrastructures that provide
mechanisms for explicit data localization and transfer, we provide a
transparent access model, where data are accessed through global identifiers.
Our proposal has been validated through a prototype implementation whose
preliminary evaluation provides promising results.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 13:08:14 GMT"
}
]
| 2008-10-14T00:00:00 | [
[
"Nicolae",
"Bogdan",
"",
"IRISA"
],
[
"Antoniu",
"Gabriel",
"",
"IRISA"
],
[
"Bougé",
"Luc",
"",
"IRISA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0810.2263 | Xavier Mora | Rosa Camps, Xavier Mora, Laia Saumell | A continuous rating method for preferential voting | v2: a comment has been added in section 18 about monotonicity | null | null | null | math.OC cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A method is given for quantitatively rating the social acceptance of
different options which are the matter of a preferential vote. The proposed
method is proved to satisfy certain desirable conditions, among which there is
a majority principle, a property of clone consistency, and the continuity of
the rates with respect to the data. One can view this method as a quantitative
complement for a qualitative method introduced in 1997 by Markus Schulze. It is
also related to certain methods of one-dimensional scaling or cluster analysis.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 16:34:18 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2008 18:32:21 GMT"
}
]
| 2009-12-12T00:00:00 | [
[
"Camps",
"Rosa",
""
],
[
"Mora",
"Xavier",
""
],
[
"Saumell",
"Laia",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0810.2279 | Slavcho Shtrakov | Slavcho Shtrakov and Joerg Koppitz | On finite functions with non-trivial arity gap | 17 pages, Int. Conf. Algebraic and Combinatorial Coding Theory,
ACCT2008, June 16 - Sunday 22, 2008, Pamporovo, BULGARIA | null | null | null | cs.DM cs.CC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Given an $n$-ary
$k-$valued function $f$, $gap(f)$ denotes the minimal number of essential
variables in $f$ which become fictive when identifying any two distinct
essential variables in $f$.
We particularly solve a problem concerning the explicit determination of
$n$-ary
$k-$valued functions $f$ with $2\leq gap(f)\leq n\leq k$. Our methods yield
new combinatorial results about the number of such functions.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 18:09:27 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Mar 2009 16:22:54 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Aug 2009 18:21:34 GMT"
},
{
"version": "v4",
"created": "Thu, 19 Nov 2009 17:55:53 GMT"
},
{
"version": "v5",
"created": "Thu, 4 Mar 2010 18:51:02 GMT"
},
{
"version": "v6",
"created": "Fri, 5 Mar 2010 12:18:18 GMT"
}
]
| 2010-03-05T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
],
[
"Koppitz",
"Joerg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0810.2311 | Nikolaos Vasiloglou | Nikolaos Vasiloglou, Alexander G. Gray, David V. Anderson | Non-Negative Matrix Factorization, Convexity and Isometry | accpepted in SIAM Data Mining 2009, 12 pages | null | null | null | cs.AI cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper we explore avenues for improving the reliability of
dimensionality reduction methods such as Non-Negative Matrix Factorization
(NMF) as interpretive exploratory data analysis tools. We first explore the
difficulties of the optimization problem underlying NMF, showing for the first
time that non-trivial NMF solutions always exist and that the optimization
problem is actually convex, by using the theory of Completely Positive
Factorization. We subsequently explore four novel approaches to finding
globally-optimal NMF solutions using various ideas from convex optimization. We
then develop a new method, isometric NMF (isoNMF), which preserves
non-negativity while also providing an isometric embedding, simultaneously
achieving two properties which are helpful for interpretation. Though it
results in a more difficult optimization problem, we show experimentally that
the resulting method is scalable and even achieves more compact spectra than
standard NMF.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 20:43:24 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Apr 2009 16:05:22 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Vasiloglou",
"Nikolaos",
""
],
[
"Gray",
"Alexander G.",
""
],
[
"Anderson",
"David V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0810.2323 | Sergey Loyka | Sergey Loyka, Francois Gagnon | On Outage and Error Rate Analysis of the Ordered V-BLAST | accepted by IEEE Transactions on Wireless Communications | null | 10.1109/T-WC.2008.070271 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Outage and error rate performance of the ordered BLAST with more than 2
transmit antennas is evaluated for i.i.d. Rayleigh fading channels. A number of
lower and upper bounds on the 1st step outage probability at any SNR are
derived, which are further used to obtain accurate approximations to average
block and total error rates. For m Tx antennas, the effect of the optimal
ordering at the first step is an m-fold SNR gain. As m increases to infinity,
the BLER decreases to zero, which is a manifestation of the space-time
autocoding effect in the V-BLAST. While the sub-optimal ordering (based on the
before-projection SNR) suffers a few dB SNR penalty compared to the optimal
one, it has a lower computational complexity and a 3 dB SNR gain compared to
the unordered V-BLAST and can be an attractive solution for
low-complexity/low-energy systems. Uncoded D-BLAST exhibits the same outage and
error rate performance as that of the V-BLAST. An SNR penalty of the linear
receiver interfaces compared to the BLAST is also evaluated.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2008 21:55:27 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Loyka",
"Sergey",
""
],
[
"Gagnon",
"Francois",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.2336 | Stephanie Vance | Stephanie Vance | A Mordell Inequality for Lattices over Maximal Orders | 13 pages | Trans. Amer. Math. Soc. 362 (2010), no. 7, 3827-3839 | null | null | math.MG cs.IT math.IT math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we prove an analogue of Mordell's inequality for lattices in
finite-dimensional complex or quaternionic Hermitian space that are modules
over a maximal order in an imaginary quadratic number field or a totally
definite rational quaternion algebra. This inequality implies that the
16-dimensional Barnes-Wall lattice has optimal density among all 16-dimensional
lattices with Hurwitz structures.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2008 00:24:34 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Feb 2009 00:53:22 GMT"
},
{
"version": "v3",
"created": "Sun, 1 Mar 2009 23:05:10 GMT"
},
{
"version": "v4",
"created": "Wed, 1 Apr 2009 17:46:15 GMT"
},
{
"version": "v5",
"created": "Fri, 30 Jul 2010 19:42:56 GMT"
}
]
| 2010-08-02T00:00:00 | [
[
"Vance",
"Stephanie",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
]
|
0810.2352 | Deniz Gunduz | Nan Liu, Deniz Gunduz, Andrea J. Goldsmith, H. Vincent Poor | Interference Channels with Correlated Receiver Side Information | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of joint source-channel coding in transmitting independent
sources over interference channels with correlated receiver side information is
studied. When each receiver has side information correlated with its own
desired source, it is shown that source-channel code separation is optimal.
When each receiver has side information correlated with the interfering source,
sufficient conditions for reliable transmission are provided based on a joint
source-channel coding scheme using the superposition encoding and partial
decoding idea of Han and Kobayashi. When the receiver side information is a
deterministic function of the interfering source, source-channel code
separation is again shown to be optimal. As a special case, for a class of
Z-interference channels, when the side information of the receiver facing
interference is a deterministic function of the interfering source, necessary
and sufficient conditions for reliable transmission are provided in the form of
single letter expressions. As a byproduct of these joint source-channel coding
results, the capacity region of a class of Z-channels with degraded message
sets is also provided.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2008 03:57:30 GMT"
}
]
| 2008-10-15T00:00:00 | [
[
"Liu",
"Nan",
""
],
[
"Gunduz",
"Deniz",
""
],
[
"Goldsmith",
"Andrea J.",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.2390 | Simone Faro | Simone Faro and Thierry Lecroq | Efficient Pattern Matching on Binary Strings | 12 pages | null | null | null | cs.DS cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The binary string matching problem consists in finding all the occurrences of
a pattern in a text where both strings are built on a binary alphabet. This is
an interesting problem in computer science, since binary data are omnipresent
in telecom and computer network applications. Moreover the problem finds
applications also in the field of image processing and in pattern matching on
compressed texts. Recently it has been shown that adaptations of classical
exact string matching algorithms are not very efficient on binary data. In this
paper we present two efficient algorithms for the problem adapted to completely
avoid any reference to bits allowing to process pattern and text byte by byte.
Experimental results show that the new algorithms outperform existing solutions
in most cases.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2008 08:44:27 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Oct 2008 12:15:24 GMT"
}
]
| 2008-10-15T00:00:00 | [
[
"Faro",
"Simone",
""
],
[
"Lecroq",
"Thierry",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0810.2434 | Edward Rosten | Edward Rosten, Reid Porter, Tom Drummond | Faster and better: a machine learning approach to corner detection | 35 pages, 11 figures | IEEE Trans. PAMI, 32 (2010), 105--119 | 10.1109/TPAMI.2008.275 | 07-3912 | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The repeatability and efficiency of a corner detector determines how likely
it is to be useful in a real-world application. The repeatability is importand
because the same scene viewed from different positions should yield features
which correspond to the same real-world 3D locations [Schmid et al 2000]. The
efficiency is important because this determines whether the detector combined
with further processing can operate at frame rate.
Three advances are described in this paper. First, we present a new heuristic
for feature detection, and using machine learning we derive a feature detector
from this which can fully process live PAL video using less than 5% of the
available processing time. By comparison, most other detectors cannot even
operate at frame rate (Harris detector 115%, SIFT 195%). Second, we generalize
the detector, allowing it to be optimized for repeatability, with little loss
of efficiency. Third, we carry out a rigorous comparison of corner detectors
based on the above repeatability criterion applied to 3D scenes. We show that
despite being principally constructed for speed, on these stringent tests, our
heuristic detector significantly outperforms existing feature detectors.
Finally, the comparison demonstrates that using machine learning produces
significant improvements in repeatability, yielding a detector that is both
very fast and very high quality.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2008 14:22:05 GMT"
}
]
| 2010-07-09T00:00:00 | [
[
"Rosten",
"Edward",
""
],
[
"Porter",
"Reid",
""
],
[
"Drummond",
"Tom",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0810.2486 | Fr\'ed\'eric Meunier | Fr\'ed\'eric Meunier and Nicolas Wagner | Dynamic assignment: there is an equilibrium ! | 13 pages | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a network with a continuum of users at some origins, suppose that the
users wish to reach specific destinations, but that they are not indifferent to
the time needed to reach their destination. They may have several possibilities
(of routes or deparure time), but their choices modify the travel times on the
network. Hence, each user faces the following problem: given a pattern of
travel times for the different possible routes that reach the destination, find
a shortest path. The situation in a context of perfect information is a
so-called Nash equilibrium, and the question whether there is such an
equilibrium and of finding it if it exists is the so-called equilibrium
assignment problem. It arises for various kind of networks, such as computers,
communication or transportation network. When each user occupies permanently
the whole route from the origin to its destination, we call it the static
assignment problem, which has been extensively studied with pioneers works by
Wardrop or Beckmann. A less studied, but more realistic, and maybe more
difficult, problem is when the time needed to reach an arc is taken into
account. We speak then of a dynamic assignment problem. Several models have
been proposed. For some of them, the existence of an equilibrium has been
proved, but always under some technical assumptions or in a very special case
(a network with one arc for the case when the users may chose their departure
time). The present paper proposes a compact model, with minimal and natural
assumptions. For this model, we prove that there is always an equilibrium. To
our knowledge, this imply all previous results about existence of an
equilibrium for the dynamic assignment problem.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2008 16:37:24 GMT"
}
]
| 2008-10-15T00:00:00 | [
[
"Meunier",
"Frédéric",
""
],
[
"Wagner",
"Nicolas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0810.2513 | Anand Sarwate | Anand D. Sarwate, Alexandros G. Dimakis | The Impact of Mobility on Gossip Algorithms | Revised version submitted to IEEE Transactions on Information Theory | null | null | null | cs.NI cs.DC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The influence of node mobility on the convergence time of averaging gossip
algorithms in networks is studied. It is shown that a small number of fully
mobile nodes can yield a significant decrease in convergence time. A method is
developed for deriving lower bounds on the convergence time by merging nodes
according to their mobility pattern. This method is used to show that if the
agents have one-dimensional mobility in the same direction the convergence time
is improved by at most a constant. Upper bounds are obtained on the convergence
time using techniques from the theory of Markov chains and show that simple
models of mobility can dramatically accelerate gossip as long as the mobility
paths significantly overlap. Simulations verify that different mobility
patterns can have significantly different effects on the convergence of
distributed algorithms.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2008 18:24:52 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Dec 2009 23:57:51 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Jun 2011 17:05:33 GMT"
}
]
| 2011-06-22T00:00:00 | [
[
"Sarwate",
"Anand D.",
""
],
[
"Dimakis",
"Alexandros G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.2529 | Alireza Bayesteh | Jamshid Abouei, Alireza Bayesteh, Masoud Ebrahimi, and Amir K.
Khandani | On the Throughput Maximization in Dencentralized Wireless Networks | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A distributed single-hop wireless network with $K$ links is considered, where
the links are partitioned into a fixed number ($M$) of clusters each operating
in a subchannel with bandwidth $\frac{W}{M}$. The subchannels are assumed to be
orthogonal to each other. A general shadow-fading model, described by
parameters $(\alpha,\varpi)$, is considered where $\alpha$ denotes the
probability of shadowing and $\varpi$ ($\varpi \leq 1$) represents the average
cross-link gains. The main goal of this paper is to find the maximum network
throughput in the asymptotic regime of $K \to \infty$, which is achieved by: i)
proposing a distributed and non-iterative power allocation strategy, where the
objective of each user is to maximize its best estimate (based on its local
information, i.e., direct channel gain) of the average network throughput, and
ii) choosing the optimum value for $M$. In the first part of the paper, the
network hroughput is defined as the \textit{average sum-rate} of the network,
which is shown to scale as $\Theta (\log K)$. Moreover, it is proved that in
the strong interference scenario, the optimum power allocation strategy for
each user is a threshold-based on-off scheme. In the second part, the network
throughput is defined as the \textit{guaranteed sum-rate}, when the outage
probability approaches zero. In this scenario, it is demonstrated that the
on-off power allocation scheme maximizes the throughput, which scales as
$\frac{W}{\alpha \varpi} \log K$. Moreover, the optimum spectrum sharing for
maximizing the average sum-rate and the guaranteed sum-rate is achieved at M=1.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2008 19:40:22 GMT"
}
]
| 2008-10-15T00:00:00 | [
[
"Abouei",
"Jamshid",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"Ebrahimi",
"Masoud",
""
],
[
"Khandani",
"Amir K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.2598 | Heli Honkanen | J. Carnahan, H. Honkanen, S. Liuti, Y. Loitiere, P. R. Reynolds | New avenue to the Parton Distribution Functions: Self-Organizing Maps | 34 pages, 17 figures, minor revisions, 2 figures updated | Phys.Rev.D79:034022,2009 | 10.1103/PhysRevD.79.034022 | null | hep-ph cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural network algorithms have been recently applied to construct Parton
Distribution Function (PDF) parametrizations which provide an alternative to
standard global fitting procedures. We propose a technique based on an
interactive neural network algorithm using Self-Organizing Maps (SOMs). SOMs
are a class of clustering algorithms based on competitive learning among
spatially-ordered neurons. Our SOMs are trained on selections of stochastically
generated PDF samples. The selection criterion for every optimization iteration
is based on the features of the clustered PDFs. Our main goal is to provide a
fitting procedure that, at variance with the standard neural network
approaches, allows for an increased control of the systematic bias by enabling
user interaction in the various stages of the process.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2008 05:41:51 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Nov 2008 23:56:06 GMT"
}
]
| 2009-04-30T00:00:00 | [
[
"Carnahan",
"J.",
""
],
[
"Honkanen",
"H.",
""
],
[
"Liuti",
"S.",
""
],
[
"Loitiere",
"Y.",
""
],
[
"Reynolds",
"P. R.",
""
]
]
| [
{
"class": "Physics",
"code": "hep-ph",
"description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.",
"span": "(High Energy Physics - Phenomenology)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
]
|
0810.2653 | Viorica Sofronie-Stokkermans | Viorica Sofronie-Stokkermans | On combinations of local theory extensions | 22 pages, no figure | null | null | null | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study possibilities of efficient reasoning in combinations
of theories over possibly non-disjoint signatures. We first present a class of
theory extensions (called local extensions) in which hierarchical reasoning is
possible, and give several examples from computer science and mathematics in
which such extensions occur in a natural way. We then identify situations in
which combinations of local extensions of a theory are again local extensions
of that theory. We thus obtain criteria both for recognizing wider classes of
local theory extensions, and for modular reasoning in combinations of theories
over non-disjoint signatures.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2008 10:26:02 GMT"
}
]
| 2008-10-16T00:00:00 | [
[
"Sofronie-Stokkermans",
"Viorica",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0810.2659 | Pannir Selvam Elamvazhuthi | P.S. Elamvazhuthi (1 and 2), P.S. Kulkarni (1 and 3), and B.K. Dey (1)
((1) Indian Institute of Technology Bombay, Mumbai, India, (2) Cognizant
Technology Solutions India Pvt. Ltd., Chennai, India, (3) Juniper Networks
Inc., Bengaluru, India) | DSTC Layering Protocols in Wireless Cooperative Networks | 39 pages, 20 figures. Part of this paper is submitted to IEEE 70th
Vehicular Technology Conference: VTC2009-Fall for publication | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a radio network with single source-destination pair and some relays, a
link between any two nodes is considered to have same or zero path loss.
However in practice some links may have considerably high path loss than others
but still being useful. In this report, we take into account signals received
from these links also. \indent Our system model consists of a
source-destination pair with two layers of relays in which weaker links between
source and second layer and between the first layer and destination are also
considered. We propose some protocols in this system model, run simulations
under optimum power allocation, and compare these protocols. We show that under
reasonable channel strength of these weaker links, the proposed protocols
perform ($ \approx 2$ dB) better than the existing basic protocol. As expected,
the degree of improvement increases with the strength of the weaker links. We
also show that with the receive channel knowledge in relays, the reliability
and data rate are improved.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2008 10:57:55 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Mar 2009 09:29:59 GMT"
},
{
"version": "v3",
"created": "Sat, 7 Mar 2009 17:02:26 GMT"
}
]
| 2009-03-07T00:00:00 | [
[
"Elamvazhuthi",
"P. S.",
"",
"1 and 2"
],
[
"Kulkarni",
"P. S.",
"",
"1 and 3"
],
[
"Dey",
"B. K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.2665 | Damien Chablat | Damien Chablat (IRCCyN) | Path Planner for Objects, Robots and Mannequins by Multi-Agents Systems
or Motion Captures | null | International Conference on Digital Enterprise Technology, Nantes
: France (2008) | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to optimise the costs and time of design of the new products while
improving their quality, concurrent engineering is based on the digital model
of these products. However, in order to be able to avoid definitively physical
model without loss of information, new tools must be available. Especially, a
tool making it possible to check simply and quickly the maintainability of
complex mechanical sets using the numerical model is necessary. Since one
decade, the MCM team of IRCCyN works on the creation of tools for the
generation and the analysis of trajectories of virtual mannequins. The
simulation of human tasks can be carried out either by robot-like simulation or
by simulation by motion capture. This paper presents some results on the both
two methods. The first method is based on a multi-agent system and on a digital
mock-up technology, to assess an efficient path planner for a manikin or a
robot for access and visibility task taking into account ergonomic constraints
or joint limits. The human operator is integrated in the process optimisation
to contribute to a global perception of the environment. This operator
cooperates, in real-time, with several automatic local elementary agents. In
the second method, we worked with the CEA and EADS/CCR to solve the constraints
related to the evolution of human virtual in its environment on the basis of
data resulting from motion capture system. An approach using of the virtual
guides was developed to allow to the user the realization of precise trajectory
in absence of force feedback.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2008 11:13:12 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Oct 2008 09:27:31 GMT"
}
]
| 2008-10-22T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0810.2666 | Damien Chablat | Flavien Paccot (LASMEA), Philippe Lemoine (IRCCyN), Nicolas Andreff
(LASMEA), Damien Chablat (IRCCyN), Philippe Martinet (LASMEA) | A Vision-based Computed Torque Control for Parallel Kinematic Machines | null | IEEE International Conference on Robotics and Automation, Pasadena
: \'Etats-Unis d'Am\'erique (2008) | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a novel approach for parallel kinematic machine control
relying on a fast exteroceptive measure is implemented and validated on the
Orthoglide robot. This approach begins with rewriting the robot models as a
function of the only end-effector pose. It is shown that such an operation
reduces the model complexity. Then, this approach uses a classical Cartesian
space computed torque control with a fast exteroceptive measure, reducing the
control schemes complexity. Simulation results are given to show the expected
performance improvements and experiments prove the practical feasibility of the
approach.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2008 11:14:15 GMT"
}
]
| 2008-10-16T00:00:00 | [
[
"Paccot",
"Flavien",
"",
"LASMEA"
],
[
"Lemoine",
"Philippe",
"",
"IRCCyN"
],
[
"Andreff",
"Nicolas",
"",
"LASMEA"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Martinet",
"Philippe",
"",
"LASMEA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0810.2697 | Anita Das | L. Sunil Chandran, Anita Das, Naveen Sivadasan | On the cubicity of bipartite graphs | 7 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | {\it A unit cube in $k$-dimension (or a $k$-cube) is defined as the cartesian
product $R_1 \times R_2 \times ... \times R_k$, where each $R_i$ is a closed
interval on the real line of the form $[a_i, a_i+1]$. The {\it cubicity} of
$G$, denoted as $cub(G)$, is the minimum $k$ such that $G$ is the intersection
graph of a collection of $k$-cubes. Many NP-complete graph problems can be
solved efficiently or have good approximation ratios in graphs of low cubicity.
In most of these cases the first step is to get a low dimensional cube
representation of the given graph.
It is known that for a graph $G$, $cub(G) \leq \lfloor\frac{2n}{3}\rfloor$.
Recently it has been shown that for a graph $G$, $cub(G) \leq 4(\Delta + 1)\ln
n$, where $n$ and $\Delta$ are the number of vertices and maximum degree of
$G$, respectively. In this paper, we show that for a bipartite graph $G = (A
\cup B, E)$ with $|A| = n_1$, $|B| = n_2$, $n_1 \leq n_2$, and $\Delta' =
\min\{\Delta_A, \Delta_B\}$, where $\Delta_A = {max}_{a \in A}d(a)$ and
$\Delta_B = {max}_{b \in B}d(b)$, $d(a)$ and $d(b)$ being the degree of $a$ and
$b$ in $G$ respectively, $cub(G) \leq 2(\Delta'+2) \lceil \ln n_2 \rceil$. We
also give an efficient randomized algorithm to construct the cube
representation of $G$ in $3(\Delta'+2)\lceil \ln n_2 \rceil$ dimensions. The
reader may note that in general $\Delta'$ can be much smaller than $\Delta$.}
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2008 13:44:56 GMT"
}
]
| 2008-10-16T00:00:00 | [
[
"Chandran",
"L. Sunil",
""
],
[
"Das",
"Anita",
""
],
[
"Sivadasan",
"Naveen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0810.2717 | Pavel Chebotarev | Pavel Chebotarev | A Class of Graph-Geodetic Distances Generalizing the Shortest-Path and
the Resistance Distances | 14 pages. Discrete Applied Mathematics | Discrete Applied Mathematics 159(2011) No. 5. 295-302 | 10.1016/j.dam.2010.11.017 | null | math.CO cs.DM math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new class of distances for graph vertices is proposed. This class contains
parametric families of distances which reduce to the shortest-path, weighted
shortest-path, and the resistance distances at the limiting values of the
family parameters. The main property of the class is that all distances it
comprises are graph-geodetic: $d(i,j)+d(j,k)=d(i,k)$ if and only if every path
from $i$ to $k$ passes through $j$. The construction of the class is based on
the matrix forest theorem and the transition inequality.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2008 16:07:04 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Oct 2008 12:32:29 GMT"
},
{
"version": "v3",
"created": "Wed, 20 May 2009 20:38:16 GMT"
},
{
"version": "v4",
"created": "Fri, 22 May 2009 12:51:23 GMT"
},
{
"version": "v5",
"created": "Sun, 23 Aug 2009 10:26:47 GMT"
},
{
"version": "v6",
"created": "Sun, 6 Dec 2009 20:29:31 GMT"
},
{
"version": "v7",
"created": "Thu, 23 Sep 2010 12:15:11 GMT"
},
{
"version": "v8",
"created": "Tue, 18 Jan 2011 20:27:07 GMT"
}
]
| 2011-01-25T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
]
|
0810.2746 | Zhihang Yi | Zhihang Yi and Il-Min Kim | Finite-SNR Diversity-Multiplexing Tradeoff and Optimum Power Allocation
in Bidirectional Cooperative Networks | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper focuses on analog network coding (ANC) and time division
broadcasting (TDBC) which are two major protocols used in bidirectional
cooperative networks. Lower bounds of the outage probabilities of those two
protocols are derived first. Those lower bounds are extremely tight in the
whole signal-to-noise ratio (SNR) range irrespective of the values of channel
variances. Based on those lower bounds, finite-SNR diversity-multiplexing
tradeoffs of the ANC and TDBC protocols are obtained. Secondly, we investigate
how to efficiently use channel state information (CSI) in those two protocols.
Specifically, an optimum power allocation scheme is proposed for the ANC
protocol. It simultaneously minimizes the outage probability and maximizes the
total mutual information of this protocol. For the TDBC protocol, an optimum
method to combine the received signals at the relay terminal is developed under
an equal power allocation assumption. This method minimizes the outage
probability and maximizes the total mutual information of the TDBC protocol at
the same time.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2008 17:32:43 GMT"
}
]
| 2008-10-16T00:00:00 | [
[
"Yi",
"Zhihang",
""
],
[
"Kim",
"Il-Min",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.2764 | Nir Ailon | Nir Ailon | A Simple Linear Ranking Algorithm Using Query Dependent Intercept
Variables | 5 pages | null | null | null | cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The LETOR website contains three information retrieval datasets used as a
benchmark for testing machine learning ideas for ranking. Algorithms
participating in the challenge are required to assign score values to search
results for a collection of queries, and are measured using standard IR ranking
measures (NDCG, precision, MAP) that depend only the relative score-induced
order of the results. Similarly to many of the ideas proposed in the
participating algorithms, we train a linear classifier. In contrast with other
participating algorithms, we define an additional free variable (intercept, or
benchmark) for each query. This allows expressing the fact that results for
different queries are incomparable for the purpose of determining relevance.
The cost of this idea is the addition of relatively few nuisance parameters.
Our approach is simple, and we used a standard logistic regression library to
test it. The results beat the reported participating algorithms. Hence, it
seems promising to combine our approach with other more complex ideas.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2008 19:03:10 GMT"
}
]
| 2008-10-16T00:00:00 | [
[
"Ailon",
"Nir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0810.2781 | Jin Lu | Jin Lu, Jos\'e M. F. Moura | Linear Time Encoding of LDPC Codes | 36 pages, 13 figures, submitted to IEEE Transactions on Information
Theory | null | 10.1109/TIT.2009.2034823 | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper, we propose a linear complexity encoding method for arbitrary
LDPC codes. We start from a simple graph-based encoding method
``label-and-decide.'' We prove that the ``label-and-decide'' method is
applicable to Tanner graphs with a hierarchical structure--pseudo-trees-- and
that the resulting encoding complexity is linear with the code block length.
Next, we define a second type of Tanner graphs--the encoding stopping set. The
encoding stopping set is encoded in linear complexity by a revised
label-and-decide algorithm--the ``label-decide-recompute.'' Finally, we prove
that any Tanner graph can be partitioned into encoding stopping sets and
pseudo-trees. By encoding each encoding stopping set or pseudo-tree
sequentially, we develop a linear complexity encoding method for general LDPC
codes where the encoding complexity is proved to be less than $4 \cdot M \cdot
(\overline{k} - 1)$, where $M$ is the number of independent rows in the parity
check matrix and $\overline{k}$ represents the mean row weight of the parity
check matrix.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2008 19:32:48 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Lu",
"Jin",
""
],
[
"Moura",
"José M. F.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.2837 | Martin Levesque | Martin Levesque, Halima Elbiaze, Wael Hosny Fouad Aly | Adaptive Hybrid Deflection and Retransmission Routing for Optical
Burst-Switched Networks | 4 pages | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Burst contention is a well known challenging problem in Optical Burst
Switching (OBS) networks. Deflection routing is used to resolve contention.
Burst retransmission is used to reduce the Burst Loss Ratio (BLR) by
retransmitting dropped bursts. Previous works show that combining deflection
and retransmission outperforms both pure deflection and pure retransmission
approaches. This paper proposes a new Adaptive Hybrid Deflection and
Retransmission (AHDR) approach that dynamically combines deflection and
retransmission approaches based on network conditions such as BLR and link
utilization. Network Simulator 2 (ns-2) is used to simulate the proposed
approach on different network topologies. Simulation results show that the
proposed approach outperforms static approaches in terms of BLR and goodput.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2008 02:12:54 GMT"
}
]
| 2008-10-17T00:00:00 | [
[
"Levesque",
"Martin",
""
],
[
"Elbiaze",
"Halima",
""
],
[
"Aly",
"Wael Hosny Fouad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.2861 | Krzysztof R. Apt | Krzysztof R. Apt, Francesca Rossi, and K. Brent Venable | A comparison of the notions of optimality in soft constraints and
graphical games | 18 pages. To appear in Recent Advances in Constraints, (F. Fages, S.
Soliman and F. Rossi, eds.) Springer Lecture Notes in Artificial Intelligence
5129, 2008 | null | null | null | cs.AI cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The notion of optimality naturally arises in many areas of applied
mathematics and computer science concerned with decision making. Here we
consider this notion in the context of two formalisms used for different
purposes and in different research areas: graphical games and soft constraints.
We relate the notion of optimality used in the area of soft constraint
satisfaction problems (SCSPs) to that used in graphical games, showing that for
a large class of SCSPs that includes weighted constraints every optimal
solution corresponds to a Nash equilibrium that is also a Pareto efficient
joint strategy.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2008 07:53:50 GMT"
}
]
| 2008-10-17T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Rossi",
"Francesca",
""
],
[
"Venable",
"K. Brent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0810.2865 | Krzysztof R. Apt | Krzysztof R. Apt, Vincent Conitzer, Mingyu Guo and Evangelos Markakis | Welfare Undominated Groves Mechanisms | 12 pages. To appear in Proceedings of the 4th International Workshop
On Internet And Network Economics (WINE 2008). Springer Lecture Notes in
Computer Science, 2008 | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A common objective in mechanism design is to choose the outcome (for example,
allocation of resources) that maximizes the sum of the agents' valuations,
without introducing incentives for agents to misreport their preferences. The
class of Groves mechanisms achieves this; however, these mechanisms require the
agents to make payments, thereby reducing the agents' total welfare.
In this paper we introduce a measure for comparing two mechanisms with
respect to the final welfare they generate. This measure induces a partial
order on mechanisms and we study the question of finding minimal elements with
respect to this partial order. In particular, we say a non-deficit Groves
mechanism is welfare undominated if there exists no other non-deficit Groves
mechanism that always has a smaller or equal sum of payments. We focus on two
domains: (i) auctions with multiple identical units and unit-demand bidders,
and (ii) mechanisms for public project problems. In the first domain we
analytically characterize all welfare undominated Groves mechanisms that are
anonymous and have linear payment functions, by showing that the family of
optimal-in-expectation linear redistribution mechanisms, which were introduced
in [6] and include the Bailey-Cavallo mechanism [1,2], coincides with the
family of welfare undominated Groves mechanisms that are anonymous and linear
in the setting we study. In the second domain we show that the classic VCG
(Clarke) mechanism is welfare undominated for the class of public project
problems with equal participation costs, but is not undominated for a more
general class.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2008 08:25:11 GMT"
}
]
| 2008-10-17T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Conitzer",
"Vincent",
""
],
[
"Guo",
"Mingyu",
""
],
[
"Markakis",
"Evangelos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0810.2877 | Viorica Sofronie-Stokkermans | Viorica Sofronie-Stokkermans | Sheaves and geometric logic and applications to the modular verification
of complex systems | 30 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we show that states, transitions and behavior of concurrent
systems can often be modeled as sheaves over a suitable topological space. In
this context, geometric logic can be used to describe which local properties
(i.e. properties of individual systems) are preserved, at a global level, when
interconnecting the systems. The main area of application is to modular
verification of complex systems. We illustrate the ideas by means of an example
involving a family of interacting controllers for trains on a rail track.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2008 09:38:51 GMT"
}
]
| 2008-10-17T00:00:00 | [
[
"Sofronie-Stokkermans",
"Viorica",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0810.2891 | Luca Roversi | Ugo Dal Lago, Luca Roversi, Luca Vercelli | Taming Modal Impredicativity: Superlazy Reduction | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Pure, or type-free, Linear Logic proof nets are Turing complete once
cut-elimination is considered as computation. We introduce modal
impredicativity as a new form of impredicativity causing the complexity of
cut-elimination to be problematic from a complexity point of view. Modal
impredicativity occurs when, during reduction, the conclusion of a residual of
a box b interacts with a node that belongs to the proof net inside another
residual of b. Technically speaking, superlazy reduction is a new notion of
reduction that allows to control modal impredicativity. More specifically,
superlazy reduction replicates a box only when all its copies are opened. This
makes the overall cost of reducing a proof net finite and predictable.
Specifically, superlazy reduction applied to any pure proof nets takes
primitive recursive time. Moreover, any primitive recursive function can be
computed by a pure proof net via superlazy reduction.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2008 12:37:26 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Oct 2008 08:25:16 GMT"
}
]
| 2008-10-17T00:00:00 | [
[
"Lago",
"Ugo Dal",
""
],
[
"Roversi",
"Luca",
""
],
[
"Vercelli",
"Luca",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0810.2924 | Kammoun Abla | Abla Kammoun, Malika Kharouf, Walid Hachem, Jamal Najim | BER and Outage Probability Approximations for LMMSE Detectors on
Correlated MIMO Channels | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is devoted to the study of the performance of the Linear Minimum
Mean-Square Error receiver for (receive) correlated Multiple-Input
Multiple-Output systems. By the random matrix theory, it is well-known that the
Signal-to-Noise Ratio (SNR) at the output of this receiver behaves
asymptotically like a Gaussian random variable as the number of receive and
transmit antennas converge to +$\infty$ at the same rate. However, this
approximation being inaccurate for the estimation of some performance metrics
such as the Bit Error Rate and the outage probability, especially for small
system dimensions, Li et al. proposed convincingly to assume that the SNR
follows a generalized Gamma distribution which parameters are tuned by
computing the first three asymptotic moments of the SNR. In this article, this
technique is generalized to (receive) correlated channels, and closed-form
expressions for the first three asymptotic moments of the SNR are provided. To
obtain these results, a random matrix theory technique adapted to matrices with
Gaussian elements is used. This technique is believed to be simple, efficient,
and of broad interest in wireless communications. Simulations are provided, and
show that the proposed technique yields in general a good accuracy, even for
small system dimensions.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2008 14:50:54 GMT"
}
]
| 2008-10-17T00:00:00 | [
[
"Kammoun",
"Abla",
""
],
[
"Kharouf",
"Malika",
""
],
[
"Hachem",
"Walid",
""
],
[
"Najim",
"Jamal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.2953 | Onur Ozan Koyluoglu | Onur Ozan Koyluoglu and Hesham El Gamal | On Power Control and Frequency Reuse in the Two User Cognitive Channel | Submitted to IEEE Transactions on Wireless Communications (revised on
October 16, 2008) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the generalized cognitive radio channel where the
secondary user is allowed to reuse the frequency during both the idle and
active periods of the primary user, as long as the primary rate remains the
same. In this setting, the optimal power allocation policy with single-input
single-output (SISO) primary and secondary channels is explored. Interestingly,
the offered gain resulting from the frequency reuse during the active periods
of the spectrum is shown to disappear in both the low and high signal-to-noise
ratio (SNR) regimes. We then argue that this drawback in the high SNR region
can be avoided by equipping both the primary and secondary transmitters with
multiple antennas. Finally, the scenario consisting of SISO primary and
multi-input multi-output (MIMO) secondary channels is investigated. Here, a
simple Zero-Forcing approach is shown to significantly outperform the
celebrated Decoding-Forwarding-Dirty Paper Coding strategy (especially in the
high SNR regime).
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2008 16:06:01 GMT"
}
]
| 2008-10-17T00:00:00 | [
[
"Koyluoglu",
"Onur Ozan",
""
],
[
"Gamal",
"Hesham El",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.3023 | Rafael Pass | Joseph Y. Halpern and Rafael Pass | Iterated Regret Minimization: A More Realistic Solution Concept | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For some well-known games, such as the Traveler's Dilemma or the Centipede
Game, traditional game-theoretic solution concepts--and most notably Nash
equilibrium--predict outcomes that are not consistent with empirical
observations. In this paper, we introduce a new solution concept, iterated
regret minimization, which exhibits the same qualitative behavior as that
observed in experiments in many games of interest, including Traveler's
Dilemma, the Centipede Game, Nash bargaining, and Bertrand competition. As the
name suggests, iterated regret minimization involves the iterated deletion of
strategies that do not minimize regret.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2008 20:49:34 GMT"
}
]
| 2008-10-20T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Pass",
"Rafael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0810.3058 | Dimitrios Tsolis Dr | Dimitrios K. Tsolis, Spyros Sioutas and Theodore S. Papatheodorou | Watermarking Digital Images Based on a Content Based Image Retrieval
Technique | 18 pages, 4 figures, 4 tables, submitted to Multimedia Tools and
Applications Journal, Springer | null | null | null | cs.DS cs.CR | http://creativecommons.org/licenses/by/3.0/ | The current work is focusing on the implementation of a robust watermarking
algorithm for digital images, which is based on an innovative spread spectrum
analysis algorithm for watermark embedding and on a content-based image
retrieval technique for watermark detection. The highly robust watermark
algorithms are applying "detectable watermarks" for which a detection mechanism
checks if the watermark exists or no (a Boolean decision) based on a
watermarking key. The problem is that the detection of a watermark in a digital
image library containing thousands of images means that the watermark detection
algorithm is necessary to apply all the keys to the digital images. This
application is non-efficient for very large image databases. On the other hand
"readable" watermarks may prove weaker but easier to detect as only the
detection mechanism is required. The proposed watermarking algorithm combine's
the advantages of both "detectable" and "readable" watermarks. The result is a
fast and robust watermarking algorithm.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 04:22:01 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Tsolis",
"Dimitrios K.",
""
],
[
"Sioutas",
"Spyros",
""
],
[
"Papatheodorou",
"Theodore S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0810.3076 | Tobias Kuhn | Tobias Kuhn | Combining Semantic Wikis and Controlled Natural Language | null | In Proceedings of the Poster and Demonstration Session at the 7th
International Semantic Web Conference (ISWC2008), CEUR Workshop Proceedings,
Volume 401, 2008 | null | null | cs.HC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We demonstrate AceWiki that is a semantic wiki using the controlled natural
language Attempto Controlled English (ACE). The goal is to enable easy creation
and modification of ontologies through the web. Texts in ACE can automatically
be translated into first-order logic and other languages, for example OWL.
Previous evaluation showed that ordinary people are able to use AceWiki without
being instructed.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 07:19:39 GMT"
}
]
| 2008-10-20T00:00:00 | [
[
"Kuhn",
"Tobias",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0810.3093 | Huawei Shen | Huawei Shen, Xueqi Cheng, Kai Cai, Mao-Bin Hu | Detect overlapping and hierarchical community structure in networks | 7 pages, 5 figures | Physica A 388 (2009) 1706-1712 | 10.1016/j.physa.2008.12.021 | null | cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Clustering and community structure is crucial for many network systems and
the related dynamic processes. It has been shown that communities are usually
overlapping and hierarchical. However, previous methods investigate these two
properties of community structure separately. This paper proposes an algorithm
(EAGLE) to detect both the overlapping and hierarchical properties of complex
community structure together. This algorithm deals with the set of maximal
cliques and adopts an agglomerative framework. The quality function of
modularity is extended to evaluate the goodness of a cover. The examples of
application to real world networks give excellent results.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 08:55:49 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Oct 2008 13:30:40 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Nov 2008 11:26:54 GMT"
}
]
| 2009-02-20T00:00:00 | [
[
"Shen",
"Huawei",
""
],
[
"Cheng",
"Xueqi",
""
],
[
"Cai",
"Kai",
""
],
[
"Hu",
"Mao-Bin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0810.3125 | {\L}ukasz D{\ke}bowski | {\L}ukasz D\k{e}bowski | On the Vocabulary of Grammar-Based Codes and the Logical Consistency of
Texts | 24 pages, no figures | IEEE Transactions on Information Theory 57:4589-4599, 2011 | 10.1109/TIT.2011.2145170 | null | cs.IT cs.CL math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The article presents a new interpretation for Zipf-Mandelbrot's law in
natural language which rests on two areas of information theory. Firstly, we
construct a new class of grammar-based codes and, secondly, we investigate
properties of strongly nonergodic stationary processes. The motivation for the
joint discussion is to prove a proposition with a simple informal statement: If
a text of length $n$ describes $n^\beta$ independent facts in a repetitive way
then the text contains at least $n^\beta/\log n$ different words, under
suitable conditions on $n$. In the formal statement, two modeling postulates
are adopted. Firstly, the words are understood as nonterminal symbols of the
shortest grammar-based encoding of the text. Secondly, the text is assumed to
be emitted by a finite-energy strongly nonergodic source whereas the facts are
binary IID variables predictable in a shift-invariant way.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 16:32:17 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Oct 2008 11:57:34 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Nov 2009 20:47:24 GMT"
},
{
"version": "v4",
"created": "Tue, 26 Oct 2010 15:47:45 GMT"
},
{
"version": "v5",
"created": "Mon, 7 Feb 2011 16:48:23 GMT"
}
]
| 2020-03-11T00:00:00 | [
[
"Dębowski",
"Łukasz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.3136 | Francesco Scarcello | Gianluigi Greco, Enrico Malizia, Luigi Palopoli, Francesco Scarcello | On the Complexity of Core, Kernel, and Bargaining Set | 30 pages, 6 figures | Artif. Intell. 175(12-13): 1877-1910 (2011) | 10.1016/j.artint.2011.06.002 | null | cs.GT cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Coalitional games are mathematical models suited to analyze scenarios where
players can collaborate by forming coalitions in order to obtain higher worths
than by acting in isolation. A fundamental problem for coalitional games is to
single out the most desirable outcomes in terms of appropriate notions of worth
distributions, which are usually called solution concepts. Motivated by the
fact that decisions taken by realistic players cannot involve unbounded
resources, recent computer science literature reconsidered the definition of
such concepts by advocating the relevance of assessing the amount of resources
needed for their computation in terms of their computational complexity. By
following this avenue of research, the paper provides a complete picture of the
complexity issues arising with three prominent solution concepts for
coalitional games with transferable utility, namely, the core, the kernel, and
the bargaining set, whenever the game worth-function is represented in some
reasonable compact form (otherwise, if the worths of all coalitions are
explicitly listed, the input sizes are so large that complexity problems
are---artificially---trivial). The starting investigation point is the setting
of graph games, about which various open questions were stated in the
literature. The paper gives an answer to these questions, and in addition
provides new insights on the setting, by characterizing the computational
complexity of the three concepts in some relevant generalizations and
specializations.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 11:53:30 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Aug 2010 16:27:27 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Sep 2010 11:38:03 GMT"
}
]
| 2013-07-19T00:00:00 | [
[
"Greco",
"Gianluigi",
""
],
[
"Malizia",
"Enrico",
""
],
[
"Palopoli",
"Luigi",
""
],
[
"Scarcello",
"Francesco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0810.3150 | Jean B. Lasserre | Rida Laraki (CECO), Jean B. Lasserre (LAAS) | Semidefinite Programming for Min-Max Problems and Games | 21 pages | null | null | Rapport LAAS 08582 | math.OC cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce two min-max problems: the first problem is to minimize the
supremum of finitely many rational functions over a compact basic
semi-algebraic set whereas the second problem is a 2-player zero-sum polynomial
game in randomized strategies and with compact basic semi-algebraic pure
strategy sets. It is proved that their optimal solution can be approximated by
solving a hierarchy of semidefinite relaxations, in the spirit of the moment
approach developed in Lasserre. This provides a unified approach and a class of
algorithms to approximate all Nash equilibria and min-max strategies of many
static and dynamic games. Each semidefinite relaxation can be solved in time
which is polynomial in its input size and practice from global optimization
suggests that very often few relaxations are needed for a good approximation
(and sometimes even finite convergence).
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 12:58:10 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Dec 2009 13:03:41 GMT"
}
]
| 2009-12-16T00:00:00 | [
[
"Laraki",
"Rida",
"",
"CECO"
],
[
"Lasserre",
"Jean B.",
"",
"LAAS"
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0810.3162 | Zhaohua Luo | Zhaohua Luo | Clone Theory: Its Syntax and Semantics, Applications to Universal
Algebra, Lambda Calculus and Algebraic Logic | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The primary goal of this paper is to present a unified way to transform the
syntax of a logic system into certain initial algebraic structure so that it
can be studied algebraically. The algebraic structures which one may choose for
this purpose are various clones over a full subcategory of a category. We show
that the syntax of equational logic, lambda calculus and first order logic can
be represented as clones or right algebras of clones over the set of positive
integers. The semantics is then represented by structures derived from left
algebras of these clones.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 17:46:14 GMT"
}
]
| 2008-10-20T00:00:00 | [
[
"Luo",
"Zhaohua",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0810.3163 | Emmanuel Briand | Emmanuel Briand (Universidad de Sevilla), Rosa Orellana (Darmouth
College), Mercedes Rosas (Universidad de Sevilla) | Reduced Kronecker coefficients and counter-examples to Mulmuley's strong
saturation conjecture SH | 25 pages. With an appendix by Ketan Mulmuley. To appear in
Computational Complexity. See also
http://emmanuel.jean.briand.free.fr/publications/ | Computational Complexity, vol. 18(4) pp. 577-600 (2009) | 10.1007/s00037-009-0279-z | null | math.CO cs.CC math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide counter-examples to Mulmuley's strong saturation conjecture
(strong SH) for the Kronecker coefficients. This conjecture was proposed in the
setting of Geometric Complexity Theory to show that deciding whether or not a
Kronecker coefficient is zero can be done in polynomial time. We also provide a
short proof of the #P-hardness of computing the Kronecker coefficients. Both
results rely on the connections between the Kronecker coefficients and another
family of structural constants in the representation theory of the symmetric
groups: Murnaghan's reduced Kronecker coefficients.
An appendix by Mulmuley introduces a relaxed form of the saturation
hypothesis SH, still strong enough for the aims of Geometric Complexity Theory.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 14:09:04 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2008 23:57:36 GMT"
},
{
"version": "v3",
"created": "Thu, 14 May 2009 21:17:27 GMT"
}
]
| 2022-05-16T00:00:00 | [
[
"Briand",
"Emmanuel",
"",
"Universidad de Sevilla"
],
[
"Orellana",
"Rosa",
"",
"Darmouth\n College"
],
[
"Rosas",
"Mercedes",
"",
"Universidad de Sevilla"
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
]
|
0810.3182 | Krzysztof R. Apt | Krzysztof R. Apt, Vangelis Markakis | Optimal Strategies in Sequential Bidding | 26 pages | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We are interested in mechanisms that maximize social welfare. In [1] this
problem was studied for multi-unit auctions with unit demand bidders and for
the public project problem, and in each case social welfare undominated
mechanisms in the class of feasible and incentive compatible mechanisms were
identified. One way to improve upon these optimality results is by allowing the
players to move sequentially. With this in mind, we study here sequential
versions of two feasible Groves mechanisms used for single item auctions: the
Vickrey auction and the Bailey-Cavallo mechanism. Because of the absence of
dominant strategies in this sequential setting, we focus on a weaker concept of
an optimal strategy. For each mechanism we introduce natural optimal strategies
and observe that in each mechanism these strategies exhibit different
behaviour. However, we then show that among all optimal strategies, the one we
introduce for each mechanism maximizes the social welfare when each player
follows it. The resulting social welfare can be larger than the one obtained in
the simultaneous setting. Finally, we show that, when interpreting both
mechanisms as simultaneous ones, the vectors of the proposed strategies form a
Pareto optimal Nash equilibrium in the class of optimal strategies.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 15:53:02 GMT"
}
]
| 2008-10-20T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Markakis",
"Vangelis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0810.3199 | Krzysztof R. Apt | Krzysztof R. Apt, Farhad Arbab, Huiye Ma | A Distributed Platform for Mechanism Design | 6 pages. To appear in the Proc. of International Conference on
Computational Intelligence for Modelling, Control and Automation, IEEE
Society | null | 10.1109/CIMCA.2008.9 | null | cs.GT cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a structured system for distributed mechanism design. It consists
of a sequence of layers. The lower layers deal with the operations relevant for
distributed computing only, while the upper layers are concerned only with
communication among players, including broadcasting and multicasting, and
distributed decision making. This yields a highly flexible distributed system
whose specific applications are realized as instances of its top layer.
This design supports fault-tolerance, prevents manipulations and makes it
possible to implement distributed policing. The system is implemented in Java.
We illustrate it by discussing a number of implemented examples.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 17:19:54 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Arbab",
"Farhad",
""
],
[
"Ma",
"Huiye",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0810.3203 | David Harvey | David Harvey | A cache-friendly truncated FFT | 14 pages, 11 figures, uses algorithm2e package | null | null | null | cs.SC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a cache-friendly version of van der Hoeven's truncated FFT and
inverse truncated FFT, focusing on the case of `large' coefficients, such as
those arising in the Schonhage--Strassen algorithm for multiplication in Z[x].
We describe two implementations and examine their performance.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 17:36:27 GMT"
}
]
| 2008-10-20T00:00:00 | [
[
"Harvey",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.3226 | Bike Xie | Bike Xie, Miguel Griot, Andres I. Vila Casado, and Richard D. Wesel | Optimal Transmission Strategy and Explicit Capacity Region for Broadcast
Z Channels | 9 pages, 14 figures, published in IEEE Transactions on Information
Theory, Vol. 53, No. 9, pp 4296-4304, September 2008 | IEEE Transactions on Information Theory, Vol. 53, No. 9, pp
4296-4304, September 2008 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper provides an explicit expression for the capacity region of the
two-user broadcast Z channel and proves that the optimal boundary can be
achieved by independent encoding of each user. Specifically, the information
messages corresponding to each user are encoded independently and the OR of
these two encoded streams is transmitted. Nonlinear turbo codes that provide a
controlled distribution of ones and zeros are used to demonstrate a
low-complexity scheme that operates close to the optimal boundary.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 19:21:01 GMT"
}
]
| 2008-10-20T00:00:00 | [
[
"Xie",
"Bike",
""
],
[
"Griot",
"Miguel",
""
],
[
"Casado",
"Andres I. Vila",
""
],
[
"Wesel",
"Richard D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.3227 | Oliver Kennedy | Oliver Kennedy, Christoph Koch, Al Demers | Dynamic Approaches to In-Network Aggregation | null | null | null | null | cs.DC cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Collaboration between small-scale wireless devices hinges on their ability to
infer properties shared across multiple nearby nodes. Wireless-enabled mobile
devices in particular create a highly dynamic environment not conducive to
distributed reasoning about such global properties. This paper addresses a
specific instance of this problem: distributed aggregation. We present
extensions to existing unstructured aggregation protocols that enable
estimation of count, sum, and average aggregates in highly dynamic
environments. With the modified protocols, devices with only limited
connectivity can maintain estimates of the aggregate, despite
\textit{unexpected} peer departures and arrivals. Our analysis of these
aggregate maintenance extensions demonstrates their effectiveness in
unstructured environments despite high levels of node mobility.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2008 19:48:38 GMT"
}
]
| 2008-10-20T00:00:00 | [
[
"Kennedy",
"Oliver",
""
],
[
"Koch",
"Christoph",
""
],
[
"Demers",
"Al",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.3283 | Daoyi Dong | Daoyi Dong, Chunlin Chen, Chenbin Zhang, Zonghai Chen | Quantum robot: structure, algorithms and applications | This paper has been withdrawn | null | null | null | cs.RO cs.AI quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn.
| [
{
"version": "v1",
"created": "Sat, 18 Oct 2008 01:18:03 GMT"
},
{
"version": "v2",
"created": "Sat, 25 Oct 2008 12:42:07 GMT"
}
]
| 2010-09-02T00:00:00 | [
[
"Dong",
"Daoyi",
""
],
[
"Chen",
"Chunlin",
""
],
[
"Zhang",
"Chenbin",
""
],
[
"Chen",
"Zonghai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0810.3294 | Jan Bergstra | Jan A. Bergstra and Mark Burgess | A static theory of promises | 36 pages. Revision of v4. In v5 some remarks about the institution of
promising in the philosophy of Law have been included as well as a comment
concerning the anthropology of promising. Several minor mistakes were found
and remedied | null | null | null | cs.MA cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss for the concept of promises within a framework that can be applied
to either humans or technology. We compare promises to the more established
notion of obligations and find promises to be both simpler and more effective
at reducing uncertainty in behavioural outcomes.
| [
{
"version": "v1",
"created": "Sat, 18 Oct 2008 07:41:26 GMT"
},
{
"version": "v2",
"created": "Tue, 28 May 2013 21:01:37 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Nov 2013 07:21:44 GMT"
},
{
"version": "v4",
"created": "Sat, 14 Dec 2013 14:16:24 GMT"
},
{
"version": "v5",
"created": "Thu, 30 Jan 2014 11:46:50 GMT"
}
]
| 2014-01-31T00:00:00 | [
[
"Bergstra",
"Jan A.",
""
],
[
"Burgess",
"Mark",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0810.3332 | Gheorghe Stefanescu | Cezara Dragoi and Gheorghe Stefanescu | A sound spatio-temporal Hoare logic for the verification of structured
interactive programs with registers and voices | 21 pages, 8 figures, Invited submission for WADT'08 LNCS Proceedings | null | null | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interactive systems with registers and voices (shortly, "rv-systems") are a
model for interactive computing obtained closing register machines with respect
to a space-time duality transformation ("voices" are the time-dual counterparts
of "registers"). In the same vain, AGAPIA v0.1, a structured programming
language for rv-systems, is the space-time dual closure of classical while
programs (over a specific type of data). Typical AGAPIA programs describe open
processes located at various sites and having their temporal windows of
adequate reaction to the environment. The language naturally supports process
migration, structured interaction, and deployment of components on
heterogeneous machines.
In this paper a sound Hoare-like spatio-temporal logic for the verification
of AGAPIA v0.1 programs is introduced. As a case study, a formal verification
proof of a popular distributed termination detection protocol is presented.
| [
{
"version": "v1",
"created": "Sun, 19 Oct 2008 00:05:20 GMT"
}
]
| 2008-10-21T00:00:00 | [
[
"Dragoi",
"Cezara",
""
],
[
"Stefanescu",
"Gheorghe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0810.3345 | Xiaowen Zhang | Xiaowen Zhang, Zhanyang Zhang, Xinzhou Wei | Enhancements to A Lightweight RFID Authentication Protocol | 9 pages, 2 figures | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Vajda and Buttyan (VB) proposed a set of five lightweight RFID authentication
protocols. Defend, Fu, and Juels (DFJ) did cryptanalysis on two of them - XOR
and SUBSET. To the XOR protocol, DFJ proposed repeated keys attack and nibble
attack. In this paper, we identify the vulnerability existed in the original
VB's successive session key permutation algorithm. We propose three
enhancements to prevent DFJ's attacks and make XOR protocol stronger without
introducing extra resource cost.
| [
{
"version": "v1",
"created": "Sat, 18 Oct 2008 20:13:39 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Oct 2008 03:48:54 GMT"
},
{
"version": "v3",
"created": "Sat, 25 Oct 2008 21:29:03 GMT"
}
]
| 2008-10-26T00:00:00 | [
[
"Zhang",
"Xiaowen",
""
],
[
"Zhang",
"Zhanyang",
""
],
[
"Wei",
"Xinzhou",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.