id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0810.1267
Ali Parandehgheibi
Ali ParandehGheibi, Muriel Medard, Asuman Ozdaglar, Atilla Eryilmaz
Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels
5 pages. In proc. of PIMRC 2008
null
null
null
cs.IT cs.NI math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of rate allocation in a fading Gaussian multiple-access channel with fixed transmission powers. The goal is to maximize a general concave utility function of the expected achieved rates of the users. There are different approaches to this problem in the literature. From an information theoretic point of view, rates are allocated only by using the channel state information. The queueing theory approach utilizes the global queue-length information for rate allocation to guarantee throughput optimality as well as maximizing a utility function of the rates. In this work, we make a connection between these two approaches by showing that the information theoretic capacity region of a multiple-access channel and its stability region are equivalent. Moreover, our numerical results show that a simple greedy policy which does not use the queue-length information can outperform queue-length based policies in terms of convergence rate and fairness.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 18:24:21 GMT" } ]
2008-10-08T00:00:00
[ [ "ParandehGheibi", "Ali", "" ], [ "Medard", "Muriel", "" ], [ "Ozdaglar", "Asuman", "" ], [ "Eryilmaz", "Atilla", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0810.1268
Sang Joon Kim
Sang Joon Kim, Natasha Devroye, Vahid Tarokh
Bi-directional half-duplex protocols with multiple relays
44 pages, 17 figures, Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a bi-directional relay channel, two nodes wish to exchange independent messages over a shared wireless half-duplex channel with the help of relays. Recent work has considered information theoretic limits of the bi-directional relay channel with a single relay. In this work we consider bi-directional relaying with multiple relays. We derive achievable rate regions and outer bounds for half-duplex protocols with multiple decode and forward relays and compare these to the same protocols with amplify and forward relays in an additive white Gaussian noise channel. We consider three novel classes of half-duplex protocols: the (m,2) 2 phase protocol with m relays, the (m,3) 3 phase protocol with m relays, and general (m, t) Multiple Hops and Multiple Relays (MHMR) protocols, where m is the total number of relays and 3<t< m+3 is the number of temporal phases in the protocol. The (m,2) and (m,3) protocols extend previous bi-directional relaying protocols for a single m=1 relay, while the new (m,t) protocol efficiently combines multi-hop routing with message-level network coding. Finally, we provide a comprehensive treatment of the MHMR protocols with decode and forward relaying and amplify and forward relaying in the Gaussian noise, obtaining their respective achievable rate regions, outer bounds and relative performance under different SNRs and relay geometries, including an analytical comparison on the protocols at low and high SNR.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 18:26:39 GMT" }, { "version": "v2", "created": "Thu, 9 Sep 2010 11:57:46 GMT" } ]
2010-09-10T00:00:00
[ [ "Kim", "Sang Joon", "" ], [ "Devroye", "Natasha", "" ], [ "Tarokh", "Vahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1316
Victor Yodaiken
Victor Yodaiken
The meaning of concurrent programs
Technical report on using recursive functions for the low level semantics of concurrent systems
null
null
null
cs.DM cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The semantics of assignment and mutual exclusion in concurrent and multi-core/multi-processor systems is presented with attention to low level architectural features in an attempt to make the presentation realistic. Recursive functions on event sequences are used to define state dependent functions and variables in ordinary (non-formal-method) algebra.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 23:03:29 GMT" } ]
2008-10-09T00:00:00
[ [ "Yodaiken", "Victor", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0810.1319
Mohamed Abdel Ghany Mr
Mohamed Abdel Ghany, Ahmed Sultan and Hesham El Gamal
ARQ-Based Secret Key Sharing
null
null
null
WINC-TR-1002
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper develops a novel framework for sharing secret keys using existing Automatic Repeat reQuest (ARQ) protocols. Our approach exploits the multi-path nature of the wireless environment to hide the key from passive eavesdroppers. The proposed framework does not assume the availability of any prior channel state information (CSI) and exploits only the one bit ACK/NACK feedback from the legitimate receiver. Compared with earlier approaches, the main innovation lies in the distribution of key bits among multiple ARQ frames. Interestingly, this idea allows for achieving a positive secrecy rate even when the eavesdropper experiences more favorable channel conditions, on average, than the legitimate receiver. In the sequel, we characterize the information theoretic limits of the proposed schemes, develop low complexity explicit implementations, and conclude with numerical results that validate our theoretical claims.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 23:22:26 GMT" } ]
2008-10-09T00:00:00
[ [ "Ghany", "Mohamed Abdel", "" ], [ "Sultan", "Ahmed", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1355
Michael Mahoney
Jure Leskovec, Kevin J. Lang, Anirban Dasgupta, and Michael W. Mahoney
Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters
66 pages, a much expanded version of our WWW 2008 paper
null
null
null
cs.DS physics.data-an physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A large body of work has been devoted to defining and identifying clusters or communities in social and information networks. We explore from a novel perspective several questions related to identifying meaningful communities in large social and information networks, and we come to several striking conclusions. We employ approximation algorithms for the graph partitioning problem to characterize as a function of size the statistical and structural properties of partitions of graphs that could plausibly be interpreted as communities. In particular, we define the network community profile plot, which characterizes the "best" possible community--according to the conductance measure--over a wide range of size scales. We study over 100 large real-world social and information networks. Our results suggest a significantly more refined picture of community structure in large networks than has been appreciated previously. In particular, we observe tight communities that are barely connected to the rest of the network at very small size scales; and communities of larger size scales gradually "blend into" the expander-like core of the network and thus become less "community-like." This behavior is not explained, even at a qualitative level, by any of the commonly-used network generation models. Moreover, it is exactly the opposite of what one would expect based on intuition from expander graphs, low-dimensional or manifold-like graphs, and from small social networks that have served as testbeds of community detection algorithms. We have found that a generative graph model, in which new edges are added via an iterative "forest fire" burning process, is able to produce graphs exhibiting a network community profile plot similar to what we observe in our network datasets.
[ { "version": "v1", "created": "Wed, 8 Oct 2008 05:42:43 GMT" } ]
2008-10-13T00:00:00
[ [ "Leskovec", "Jure", "" ], [ "Lang", "Kevin J.", "" ], [ "Dasgupta", "Anirban", "" ], [ "Mahoney", "Michael W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0810.1368
Ijaz Haider Naqvi
Ali Khaleghi (IETR), Gha\"is El Zein (IETR), Ijaz Haider Naqvi (IETR)
Demonstration of Time-Reversal in Indoor Ultra-Wideband Communication: Time Domain Measurement
null
IEEE International Symposium on Wireless Communication Systems 2007, Trondheim : Norv\`ege (2007)
10.1109/ISWCS.2007.4392383
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using time domain measurements, we assess the feasibility of time-reversal technique in ultra-wideband (UWB) communication. A typical indoor propagation channel is selected for the exploration. The channel response between receive and transmit antenna pairs is measured using time domain equipments which include an arbitrary wave generator (AWG) and a digital storage oscilloscope (DSO). The time-reversed version of the channel response is constructed with AWG and re-transmitted in the channel. The equivalent time reversed channel response is recorded. The properties of the time reversal technique in the line of sight (LOS) co-polar and cross-polar scenarios are measured.
[ { "version": "v1", "created": "Wed, 8 Oct 2008 07:15:09 GMT" } ]
2008-10-09T00:00:00
[ [ "Khaleghi", "Ali", "", "IETR" ], [ "Zein", "Ghaïs El", "", "IETR" ], [ "Naqvi", "Ijaz Haider", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.1383
Krzysztof R. Apt
Krzysztof R. Apt, Arantza Est\'evez-Fern\'andez
Sequential pivotal mechanisms for public project problems
19 pages. The version without the appendix will appear in the Proc. 2nd International Symposium on Algorithmic Game Theory, 2009
null
10.1007/978-3-642-04645-2_9
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well-known that for several natural decision problems no budget balanced Groves mechanisms exist. This has motivated recent research on designing variants of feasible Groves mechanisms (termed as `redistribution of VCG (Vickrey-Clarke-Groves) payments') that generate reduced deficit. With this in mind, we study sequential mechanisms and consider optimal strategies that could reduce the deficit resulting under the simultaneous mechanism. We show that such strategies exist for the sequential pivotal mechanism of the well-known public project problem. We also exhibit an optimal strategy with the property that a maximal social welfare is generated when each player follows it. Finally, we show that these strategies can be achieved by an implementation in Nash equilibrium.
[ { "version": "v1", "created": "Wed, 8 Oct 2008 08:42:31 GMT" }, { "version": "v2", "created": "Fri, 24 Jul 2009 15:22:47 GMT" } ]
2015-05-13T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Estévez-Fernández", "Arantza", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0810.1424
Sidharth Jaggi
Bikash Kumar Dey, Sidharth Jaggi, and Michael Langberg
"Real" Slepian-Wolf Codes
20 pages. Preliminary version presented at ISIT 2008, Toronto, Canada
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a novel achievability proof of the Slepian-Wolf theorem for i.i.d. sources over finite alphabets. We demonstrate that random codes that are linear over the real field achieve the classical Slepian-Wolf rate-region. For finite alphabets we show that typicality decoding is equivalent to solving an integer program. Minimum entropy decoding is also shown to achieve exponentially small probability of error. The techniques used may be of independent interest for code design for a wide class of information theory problems, and for the field of compressed sensing.
[ { "version": "v1", "created": "Wed, 8 Oct 2008 12:57:51 GMT" } ]
2008-10-09T00:00:00
[ [ "Dey", "Bikash Kumar", "" ], [ "Jaggi", "Sidharth", "" ], [ "Langberg", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1430
Omar Mehanna
Omar Mehanna, Ahmed Sultan and Hesham El Gamal
Blind Cognitive MAC Protocols
5 pages, submitted to ICC'09
null
null
null
cs.NI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the design of cognitive Medium Access Control (MAC) protocols enabling an unlicensed (secondary) transmitter-receiver pair to communicate over the idle periods of a set of licensed channels, i.e., the primary network. The objective is to maximize data throughput while maintaining the synchronization between secondary users and avoiding interference with licensed (primary) users. No statistical information about the primary traffic is assumed to be available a-priori to the secondary user. We investigate two distinct sensing scenarios. In the first, the secondary transmitter is capable of sensing all the primary channels, whereas it senses one channel only in the second scenario. In both cases, we propose MAC protocols that efficiently learn the statistics of the primary traffic online. Our simulation results demonstrate that the proposed blind protocols asymptotically achieve the throughput obtained when prior knowledge of primary traffic statistics is available.
[ { "version": "v1", "created": "Wed, 8 Oct 2008 13:22:46 GMT" } ]
2008-10-09T00:00:00
[ [ "Mehanna", "Omar", "" ], [ "Sultan", "Ahmed", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0810.1481
Marko A. Rodriguez
Marko A. Rodriguez, Joe Geldart
An Evidential Path Logic for Multi-Relational Networks
null
Proceedings of the Association for the Advancement of Artificial Intelligence Spring Symposium: Technosocial Predictive Analytics, volume SS-09-09, pages 114-119, ISBN:978-1-57735-416-1, AAAI Press, Stanford University, March 2009.
null
LA-UR-08-06397
cs.LO cs.SC
http://creativecommons.org/licenses/publicdomain/
Multi-relational networks are used extensively to structure knowledge. Perhaps the most popular instance, due to the widespread adoption of the Semantic Web, is the Resource Description Framework (RDF). One of the primary purposes of a knowledge network is to reason; that is, to alter the topology of the network according to an algorithm that uses the existing topological structure as its input. There exist many such reasoning algorithms. With respect to the Semantic Web, the bivalent, monotonic reasoners of the RDF Schema (RDFS) and the Web Ontology Language (OWL) are the most prevalent. However, nothing prevents other forms of reasoning from existing in the Semantic Web. This article presents a non-bivalent, non-monotonic, evidential logic and reasoner that is an algebraic ring over a multi-relational network equipped with two binary operations that can be composed to execute various forms of inference. Given its multi-relational grounding, it is possible to use the presented evidential framework as another method for structuring knowledge and reasoning in the Semantic Web. The benefits of this framework are that it works with arbitrary, partial, and contradictory knowledge while, at the same time, it supports a tractable approximate reasoning process.
[ { "version": "v1", "created": "Wed, 8 Oct 2008 17:49:15 GMT" }, { "version": "v2", "created": "Tue, 30 Dec 2008 18:17:46 GMT" } ]
2009-05-13T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Geldart", "Joe", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0810.1499
Lenka Zdeborova
Lenka Zdeborov\'a and Marc M\'ezard
Constraint satisfaction problems with isolated solutions are hard
19 pages, 12 figures
J. Stat. Mech. (2008) P12004
10.1088/1742-5468/2008/12/P12004
null
cond-mat.dis-nn cond-mat.stat-mech cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the phase diagram and the algorithmic hardness of the random `locked' constraint satisfaction problems, and compare them to the commonly studied 'non-locked' problems like satisfiability of boolean formulas or graph coloring. The special property of the locked problems is that clusters of solutions are isolated points. This simplifies significantly the determination of the phase diagram, which makes the locked problems particularly appealing from the mathematical point of view. On the other hand we show empirically that the clustered phase of these problems is extremely hard from the algorithmic point of view: the best known algorithms all fail to find solutions. Our results suggest that the easy/hard transition (for currently known algorithms) in the locked problems coincides with the clustering transition. These should thus be regarded as new benchmarks of really hard constraint satisfaction problems.
[ { "version": "v1", "created": "Wed, 8 Oct 2008 18:28:28 GMT" }, { "version": "v2", "created": "Thu, 4 Dec 2008 07:53:25 GMT" } ]
2008-12-09T00:00:00
[ [ "Zdeborová", "Lenka", "" ], [ "Mézard", "Marc", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.1506
Ijaz Haider Naqvi
Ijaz Haider Naqvi (IETR), Ali Khaleghi (IETR), Gha\"is El Zein (IETR)
Performance Enhancement of Multiuser Time Reversal UWB Communication System
null
IEEE International Symposium on Wireless Communication Systems 2007, Trondheim : Norv\`ege (2007)
10.1109/ISWCS.2007.4392404
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
UWB communication is a recent research area for indoor propagation channels. Time Reversal (TR) communication in UWB has shown promising results for improving the system performance. In multiuser environment, the system performance is significantly degraded due to the interference among different users. TR reduces the interference caused by multiusers due to its spatial focusing property. The performance of a multiuser TR communication system is further improved if the TR filter is modified. In this paper, multiuser TR in UWB communication is investigated using simple TR filter and a modified TR filter with circular shift operation. The concept of circular shift in TR is analytically studied. Thereafter, the channel impulse responses (CIR) of a typical indoor laboratory environment are measured. The measured CIRs are used to analyze the received signal peak power and signal to interference ratio (SIR) with and without performing the circular shift operation in a multiuser environment.
[ { "version": "v1", "created": "Wed, 8 Oct 2008 18:54:07 GMT" } ]
2008-10-09T00:00:00
[ [ "Naqvi", "Ijaz Haider", "", "IETR" ], [ "Khaleghi", "Ali", "", "IETR" ], [ "Zein", "Ghaïs El", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.1513
Ijaz Haider Naqvi
Ijaz Haider Naqvi (IETR), Tanguy P\'erennou (LAAS)
A DCCP Congestion Control Mechanism for Wired- cum-Wireless Environments
null
IEEE Wireless Communications and Networking Conference, Hong-Kong (2007)
10.1109/WCNC.2007.715
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing transport protocols, be it TCP, SCTP or DCCP, do not provide an efficient congestion control mechanism for heterogeneous wired-cum-wireless networks. Solutions involving implicit loss discrimination schemes have been proposed but were never implemented. Appropriate mechanisms can dramatically improve bandwidth usage over the Internet, especially for multimedia transport based on partial reliability. In this paper we have implemented and evaluated a congestion control mechanism that implicitly discriminates congestion and wireless losses in the datagram congestion control protocol (DCCP) congestion control identification (CCID) framework. The new CCID was implemented as a NS-2 module. Comparisons were made with the TCP-like CCID and showed that the bandwidth utilization was improved by more than 30% and up to 50% in significant setups.
[ { "version": "v1", "created": "Wed, 8 Oct 2008 19:46:24 GMT" } ]
2008-10-09T00:00:00
[ [ "Naqvi", "Ijaz Haider", "", "IETR" ], [ "Pérennou", "Tanguy", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.1571
Rena Bakhshi
Rena Bakhshi and Daniela Gavidia and Wan Fokkink and Maarten van Steen
An Analytical Model of Information Dissemination for a Gossip-based Protocol
20 pages, 8 figures, technical report
null
10.1016/j.comnet.2009.03.017
null
cs.DC cs.DM cs.IT cs.PF math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop an analytical model of information dissemination for a gossiping protocol that combines both pull and push approaches. With this model we analyse how fast an item is replicated through a network, and how fast the item spreads in the network, and how fast the item covers the network. We also determine the optimal size of the exchange buffer, to obtain fast replication. Our results are confirmed by large-scale simulation experiments.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 04:42:27 GMT" } ]
2010-03-11T00:00:00
[ [ "Bakhshi", "Rena", "" ], [ "Gavidia", "Daniela", "" ], [ "Fokkink", "Wan", "" ], [ "van Steen", "Maarten", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1574
Michael Singer
Ruyong Feng, Michael F. Singer, Min Wu
Liouvillian Solutions of Difference-Differential Equations
53 pages
null
null
null
cs.SC math.CA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a field k$with an automorphism \sigma and a derivation \delta, we introduce the notion of liouvillian solutions of linear difference-differential systems {\sigma(Y) = AY, \delta(Y) = BY} over k and characterize the existence of liouvillian solutions in terms of the Galois group of the systems. We will give an algorithm to decide whether such a system has liouvillian solutions when k = C(x,t), \sigma(x) = x+1, \delta = d/dt$ and the size of the system is a prime.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 05:16:48 GMT" } ]
2008-10-10T00:00:00
[ [ "Feng", "Ruyong", "" ], [ "Singer", "Michael F.", "" ], [ "Wu", "Min", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" } ]
0810.1624
Danny Bickson
Danny Bickson, Genia Bezman, Danny Dolev and Benny Pinkas
Peer-to-Peer Secure Multi-Party Numerical Computation
10 pages, 2 figures, appeared in the 8th IEEE Peer-to-Peer Computing, Aachen, Germany, Sept. 2008
The 8th IEEE Peer-to-Peer Computing (P2P 2008), Aachen, Germany, Sept. 2008
10.1109/P2P.2008.22
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and numerous other tasks, where the computing nodes would like to preserve the privacy of their inputs while performing a joint computation of a certain function. Although there is a rich literature in the field of distributed systems security concerning secure multi-party computation, in practice it is hard to deploy those methods in very large scale Peer-to-Peer networks. In this work, we examine several possible approaches and discuss their feasibility. Among the possible approaches, we identify a single approach which is both scalable and theoretically secure. An additional novel contribution is that we show how to compute the neighborhood based collaborative filtering, a state-of-the-art collaborative filtering algorithm, winner of the Netflix progress prize of the year 2007. Our solution computes this algorithm in a Peer-to-Peer network, using a privacy preserving computation, without loss of accuracy. Using extensive large scale simulations on top of real Internet topologies, we demonstrate the applicability of our approach. As far as we know, we are the first to implement such a large scale secure multi-party simulation of networks of millions of nodes and hundreds of millions of edges.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 13:07:36 GMT" } ]
2008-11-15T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Bezman", "Genia", "" ], [ "Dolev", "Danny", "" ], [ "Pinkas", "Benny", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0810.1628
Danny Bickson
Danny Bickson, Ori Shental and Danny Dolev
Distributed Kalman Filter via Gaussian Belief Propagation
8 pages, 3 figures, appeared in the 46th Annual Allerton Conference on Communication, Control and Computing, Allerton House, Illinois, Sept. 2008
The 46th Annual Allerton Conference on Communication, Control and Computing, Allerton House, Illinois, Sept. 2008
10.1109/ALLERTON.2008.4797617
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent result shows how to compute distributively and efficiently the linear MMSE for the multiuser detection problem, using the Gaussian BP algorithm. In the current work, we extend this construction, and show that operating this algorithm twice on the matching inputs, has several interesting interpretations. First, we show equivalence to computing one iteration of the Kalman filter. Second, we show that the Kalman filter is a special case of the Gaussian information bottleneck algorithm, when the weight parameter $\beta = 1$. Third, we discuss the relation to the Affine-scaling interior-point method and show it is a special case of Kalman filter. Besides of the theoretical interest of this linking estimation, compression/clustering and optimization, we allow a single distributed implementation of those algorithms, which is a highly practical and important task in sensor and mobile ad-hoc networks. Application to numerous problem domains includes collaborative signal processing and distributed allocation of resources in a communication network.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 11:42:00 GMT" } ]
2009-04-16T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Shental", "Ori", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1631
Danny Bickson
Danny Bickson, Yoav Tock, Ori Shental and Danny Dolev
Polynomial Linear Programming with Gaussian Belief Propagation
7 pages, 1 figure, appeared in the 46th Annual Allerton Conference on Communication, Control and Computing, Allerton House, Illinois, Sept. 2008
The 46th Annual Allerton Conference on Communication, Control and Computing, Allerton House, Illinois, Sept. 2008
10.1109/ALLERTON.2008.4797652
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interior-point methods are state-of-the-art algorithms for solving linear programming (LP) problems with polynomial complexity. Specifically, the Karmarkar algorithm typically solves LP problems in time O(n^{3.5}), where $n$ is the number of unknown variables. Karmarkar's celebrated algorithm is known to be an instance of the log-barrier method using the Newton iteration. The main computational overhead of this method is in inverting the Hessian matrix of the Newton iteration. In this contribution, we propose the application of the Gaussian belief propagation (GaBP) algorithm as part of an efficient and distributed LP solver that exploits the sparse and symmetric structure of the Hessian matrix and avoids the need for direct matrix inversion. This approach shifts the computation from realm of linear algebra to that of probabilistic inference on graphical models, thus applying GaBP as an efficient inference engine. Our construction is general and can be used for any interior-point algorithm which uses the Newton method, including non-linear program solvers.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 11:49:12 GMT" } ]
2009-04-16T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Tock", "Yoav", "" ], [ "Shental", "Ori", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1639
Gabriel Istrate
Gabriel Istrate
Identifying almost sorted permutations from TCP buffer dynamics
null
null
null
null
cs.DS cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Associate to each sequence $A$ of integers (intending to represent packet IDs) a sequence of positive integers of the same length ${\mathcal M}(A)$. The $i$'th entry of ${\mathcal M}(A)$ is the size (at time $i$) of the smallest buffer needed to hold out-of-order packets, where space is accounted for unreceived packets as well. Call two sequences $A$, $B$ {\em equivalent} (written $A\equiv_{FB} B$) if ${\mathcal M}(A)={\mathcal M}(B)$. We prove the following result: any two permutations $A,B$ of the same length with $SUS(A)$, $SUS(B)\leq 3$ (where SUS is the {\em shuffled-up-sequences} reordering measure), and such that $A\equiv_{FB} B$ are identical. The result (which is no longer valid if we replace the upper bound 3 by 4) was motivated by RESTORED, a receiver-oriented model of network traffic we have previously introduced.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 12:27:32 GMT" } ]
2008-11-04T00:00:00
[ [ "Istrate", "Gabriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0810.1648
Danny Bickson
Danny Bickson, Elad Yom-Tov and Danny Dolev
A Gaussian Belief Propagation Solver for Large Scale Support Vector Machines
12 pages, 1 figure, appeared in the 5th European Complex Systems Conference, Jerusalem, Sept. 2008
The 5th European Complex Systems Conference (ECCS 2008), Jerusalem, Sept. 2008
null
null
cs.LG cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Support vector machines (SVMs) are an extremely successful type of classification and regression algorithms. Building an SVM entails solving a constrained convex quadratic programming problem, which is quadratic in the number of training samples. We introduce an efficient parallel implementation of an support vector regression solver, based on the Gaussian Belief Propagation algorithm (GaBP). In this paper, we demonstrate that methods from the complex system domain could be utilized for performing efficient distributed computation. We compare the proposed algorithm to previously proposed distributed and single-node SVM solvers. Our comparison shows that the proposed algorithm is just as accurate as these solvers, while being significantly faster, especially for large datasets. We demonstrate scalability of the proposed algorithm to up to 1,024 computing nodes and hundreds of thousands of data points using an IBM Blue Gene supercomputer. As far as we know, our work is the largest parallel implementation of belief propagation ever done, demonstrating the applicability of this algorithm for large scale distributed computing systems.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 12:56:43 GMT" } ]
2008-11-15T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Yom-Tov", "Elad", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1650
Enrico Grande
Alessandro Agnetis, Enrico Grande, Andrea Pacifici
Demand allocation with latency cost functions
null
null
null
null
cs.DM cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the exact resolution of a MINLP model where resources can be activated in order to satisfy a demand (a partitioning constraint) while minimizing total cost. Cost functions are convex latency functions plus a fixed activation cost. A branch and bound algorithm is devised, featuring three important characteristics. First, the lower bound (therefore each subproblem) can be computed in O(nlog n). Second, to break symmetries resulting in improved efficiency, the branching scheme is n-ary (instead of the "classical" binary). Third, a very affective heuristic is used to compute a good upper bound at the root node of the enumeration tree. All three features lead to a successful comparison against CPLEX MIPQ, which is the fastest among several commercial and open-source solvers: computational results showing this fact are provided.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 13:10:18 GMT" } ]
2008-10-10T00:00:00
[ [ "Agnetis", "Alessandro", "" ], [ "Grande", "Enrico", "" ], [ "Pacifici", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0810.1655
Martin Burkhart
Martin Burkhart, Daniela Brauckhoff, Martin May
On the Utility of Anonymized Flow Traces for Anomaly Detection
null
Proceedings of the 19th ITC Specialist Seminar on Network Usage and Traffic (ITC SS 19), October 2008, Berlin, Germany
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sharing of network traces is an important prerequisite for the development and evaluation of efficient anomaly detection mechanisms. Unfortunately, privacy concerns and data protection laws prevent network operators from sharing these data. Anonymization is a promising solution in this context; however, it is unclear if the sanitization of data preserves the traffic characteristics or introduces artifacts that may falsify traffic analysis results. In this paper, we examine the utility of anonymized flow traces for anomaly detection. We quantitatively evaluate the impact of IP address anonymization, namely variations of permutation and truncation, on the detectability of large-scale anomalies. Specifically, we analyze three weeks of un-sampled and non-anonymized network traces from a medium-sized backbone network. We find that all anonymization techniques, except prefix-preserving permutation, degrade the utility of data for anomaly detection. We show that the degree of degradation depends to a large extent on the nature and mix of anomalies present in a trace. Moreover, we present a case study that illustrates how traffic characteristics of individual hosts are distorted by anonymization.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 14:10:42 GMT" } ]
2008-10-10T00:00:00
[ [ "Burkhart", "Martin", "" ], [ "Brauckhoff", "Daniela", "" ], [ "May", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.1729
Danny Bickson
Danny Bickson, Danny Dolev, Ori Shental, Paul H. Siegel and Jack K. Wolf
Gaussian Belief Propagation Based Multiuser Detection
6 pages, 1 figures, appeared in the 2008 IEEE International Symposium on Information Theory, Toronto, July 2008
The 2008 IEEE International Symposium on Information Theory (ISIT 2008), Toronto, July 2008
10.1109/ISIT.2008.4595314
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we present a novel construction for solving the linear multiuser detection problem using the Gaussian Belief Propagation algorithm. Our algorithm yields an efficient, iterative and distributed implementation of the MMSE detector. We compare our algorithm's performance to a recent result and show an improved memory consumption, reduced computation steps and a reduction in the number of sent messages. We prove that recent work by Montanari et al. is an instance of our general algorithm, providing new convergence results for both algorithms.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 19:55:18 GMT" } ]
2009-04-16T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Dolev", "Danny", "" ], [ "Shental", "Ori", "" ], [ "Siegel", "Paul H.", "" ], [ "Wolf", "Jack K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1732
Christopher Frenz
Christopher M. Frenz
Introduction to Searching with Regular Expressions
13 pages. From the Proceedings of the 2008 Trenton Computer Festival
null
null
null
cs.IR
http://creativecommons.org/licenses/by/3.0/
The explosive rate of information growth and availability often makes it increasingly difficult to locate information pertinent to your needs. These problems are often compounded when keyword based search methodologies are not adequate for describing the information you seek. In many instances, information such as Web site URLs, phone numbers, etc. can often be better identified through the use of a textual pattern than by keyword. For example, many more phone numbers could be picked up by a search for the pattern (XXX) XXX-XXXX, where X could be any digit, than would be by a search for any specific phone number (i.e. the keyword approach). Programming languages typically allow for the matching of textual patterns via the usage of regular expressions. This tutorial will provide an introduction to the basics of programming regular expressions as well as provide an introduction to how regular expressions can be applied to data processing tasks such as information extraction and search refinement.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 19:57:31 GMT" } ]
2008-10-10T00:00:00
[ [ "Frenz", "Christopher M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0810.1735
MinJi Kim
MinJi Kim, Jay Kumar Sundararajan, Muriel Medard, Atilla Eryilmaz, Ralf Koetter
Network Coding in a Multicast Switch
26 pages, 27 figures, submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2010.2090213
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of serving multicast flows in a crossbar switch is considered. Intra-flow linear network coding is shown to achieve a larger rate region than the case without coding. A traffic pattern is presented which is achievable with coding but requires a switch speedup when coding is not allowed. The rate region with coding can be characterized in a simple graph-theoretic manner, in terms of the stable set polytope of the "enhanced conflict graph". No such graph-theoretic characterization is known for the case of fanout splitting without coding. The minimum speedup needed to achieve 100% throughput with coding is shown to be upper bounded by the imperfection ratio of the enhanced conflict graph. When applied to KxN switches with unicasts and broadcasts only, this gives a bound of min{(2K-1)/K,2N/(N+1)} on the speedup. This shows that speedup, which is usually implemented in hardware, can often be substituted by network coding, which can be done in software. Computing an offline schedule (using prior knowledge of the flow rates) is reduced to fractional weighted graph coloring. A graph-theoretic online scheduling algorithm (using only queue occupancy information) is also proposed, that stabilizes the queues for all rates within the rate region.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 20:30:43 GMT" } ]
2016-11-17T00:00:00
[ [ "Kim", "MinJi", "" ], [ "Sundararajan", "Jay Kumar", "" ], [ "Medard", "Muriel", "" ], [ "Eryilmaz", "Atilla", "" ], [ "Koetter", "Ralf", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1736
Danny Bickson
Ori Shental, Paul H. Siegel, Jack K. Wolf, Danny Bickson and Danny Dolev
Gaussian Belief Propagation Solver for Systems of Linear Equations
5 pages, 2 figures, appeared in the 2008 IEEE International Symposium on Information Theory, Toronto, July 2008
The 2008 IEEE International Symposium on Information Theory (ISIT 2008), Toronto, July 2008
10.1109/ISIT.2008.4595311
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The canonical problem of solving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. In this contribution, we develop a solution based upon Gaussian belief propagation (GaBP) that does not involve direct matrix inversion. The iterative nature of our approach allows for a distributed message-passing implementation of the solution algorithm. We also address some properties of the GaBP solver, including convergence, exactness, its max-product version and relation to classical solution methods. The application example of decorrelation in CDMA is used to demonstrate the faster convergence rate of the proposed solver in comparison to conventional linear-algebraic iterative solution methods.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 20:16:25 GMT" } ]
2009-04-16T00:00:00
[ [ "Shental", "Ori", "" ], [ "Siegel", "Paul H.", "" ], [ "Wolf", "Jack K.", "" ], [ "Bickson", "Danny", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1756
Milan Bradonjic
Milan Bradonjic, Eddie Kohler, Rafail Ostrovsky
Near-Optimal Radio Use For Wireless Network Synchronization
23 pages
null
10.1016/j.tcs.2011.09.026
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the model of communication where wireless devices can either switch their radios off to save energy, or switch their radios on and engage in communication. We distill a clean theoretical formulation of this problem of minimizing radio use and present near-optimal solutions. Our base model ignores issues of communication interference, although we also extend the model to handle this requirement. We assume that nodes intend to communicate periodically, or according to some time-based schedule. Clearly, perfectly synchronized devices could switch their radios on for exactly the minimum periods required by their joint schedules. The main challenge in the deployment of wireless networks is to synchronize the devices' schedules, given that their initial schedules may be offset relative to one another (even if their clocks run at the same speed). We significantly improve previous results, and show optimal use of the radio for two processors and near-optimal use of the radio for synchronization of an arbitrary number of processors. In particular, for two processors we prove deterministically matching $\Theta(\sqrt{n})$ upper and lower bounds on the number of times the radio has to be on, where $n$ is the discretized uncertainty period of the clock shift between the two processors. (In contrast, all previous results for two processors are randomized.) For $m=n^\beta$ processors (for any $\beta < 1$) we prove $\Omega(n^{(1-\beta)/2})$ is the lower bound on the number of times the radio has to be switched on (per processor), and show a nearly matching (in terms of the radio use) $\~{O}(n^{(1-\beta)/2})$ randomized upper bound per processor, with failure probability exponentially close to 0. For $\beta \geq 1$ our algorithm runs with at most $poly-log(n)$ radio invocations per processor. Our bounds also hold in a radio-broadcast model where interference must be taken into account.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 20:41:23 GMT" }, { "version": "v2", "created": "Mon, 13 Feb 2012 22:44:09 GMT" } ]
2012-02-15T00:00:00
[ [ "Bradonjic", "Milan", "" ], [ "Kohler", "Eddie", "" ], [ "Ostrovsky", "Rafail", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0810.1773
Amir Leshem
Eitan Sayag, Amir Leshem, Nikolaos D. Sidiropoulos
Finite Word Length Effects on Transmission Rate in Zero Forcing Linear Precoding for Multichannel DSL
null
null
10.1109/TSP.2009.2012889
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Crosstalk interference is the limiting factor in transmission over copper lines. Crosstalk cancelation techniques show great potential for enabling the next leap in DSL transmission rates. An important issue when implementing crosstalk cancelation techniques in hardware is the effect of finite world length on performance. In this paper we provide an analysis of the performance of linear zero-forcing precoders, used for crosstalk compensation, in the presence of finite word length errors. We quantify analytically the trade off between precoder word length and transmission rate degradation. More specifically, we prove a simple formula for the transmission rate loss as a function of the number of bits used for precoding, the signal to noise ratio, and the standard line parameters. We demonstrate, through simulations on real lines, the accuracy of our estimates. Moreover, our results are stable in the presence of channel estimation errors. Finally, we show how to use these estimates as a design tool for DSL linear crosstalk precoders. For example, we show that for standard VDSL2 precoded systems, 14 bits representation of the precoder entries results in capacity loss below 1% for lines over 300m.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 22:40:14 GMT" } ]
2009-11-13T00:00:00
[ [ "Sayag", "Eitan", "" ], [ "Leshem", "Amir", "" ], [ "Sidiropoulos", "Nikolaos D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1808
Walid Hachem
Abla Kammoun (LTCI), Malika Kharouf (LTCI), Walid Hachem (LTCI), Jamal Najim (LTCI)
A Central Limit Theorem for the SINR at the LMMSE Estimator Output for Large Dimensional Signals
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is devoted to the performance study of the Linear Minimum Mean Squared Error estimator for multidimensional signals in the large dimension regime. Such an estimator is frequently encountered in wireless communications and in array processing, and the Signal to Interference and Noise Ratio (SINR) at its output is a popular performance index. The SINR can be modeled as a random quadratic form which can be studied with the help of large random matrix theory, if one assumes that the dimension of the received and transmitted signals go to infinity at the same pace. This paper considers the asymptotic behavior of the SINR for a wide class of multidimensional signal models that includes general multi-antenna as well as spread spectrum transmission models. The expression of the deterministic approximation of the SINR in the large dimension regime is recalled and the SINR fluctuations around this deterministic approximation are studied. These fluctuations are shown to converge in distribution to the Gaussian law in the large dimension regime, and their variance is shown to decrease as the inverse of the signal dimension.
[ { "version": "v1", "created": "Fri, 10 Oct 2008 06:45:49 GMT" } ]
2008-10-13T00:00:00
[ [ "Kammoun", "Abla", "", "LTCI" ], [ "Kharouf", "Malika", "", "LTCI" ], [ "Hachem", "Walid", "", "LTCI" ], [ "Najim", "Jamal", "", "LTCI" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1823
Christophe Paul
Emeric Gioan and Christophe Paul
Split decomposition and graph-labelled trees: characterizations and fully-dynamic algorithms for totally decomposable graphs
extended abstract appeared in ISAAC 2007: Dynamic distance hereditary graphs using split decompositon. In International Symposium on Algorithms and Computation - ISAAC. Number 4835 in Lecture Notes, pages 41-51, 2007
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we revisit the split decomposition of graphs and give new combinatorial and algorithmic results for the class of totally decomposable graphs, also known as the distance hereditary graphs, and for two non-trivial subclasses, namely the cographs and the 3-leaf power graphs. Precisely, we give strutural and incremental characterizations, leading to optimal fully-dynamic recognition algorithms for vertex and edge modifications, for each of these classes. These results rely on a new framework to represent the split decomposition, namely the graph-labelled trees, which also captures the modular decomposition of graphs and thereby unify these two decompositions techniques. The point of the paper is to use bijections between these graph classes and trees whose nodes are labelled by cliques and stars. Doing so, we are also able to derive an intersection model for distance hereditary graphs, which answers an open problem.
[ { "version": "v1", "created": "Fri, 10 Oct 2008 07:49:30 GMT" }, { "version": "v2", "created": "Mon, 18 Apr 2011 12:53:57 GMT" } ]
2011-04-19T00:00:00
[ [ "Gioan", "Emeric", "" ], [ "Paul", "Christophe", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.1851
Marek Karpinski
Piotr Berman, Marek Karpinski, Alex Zelikovsky
1.25 Approximation Algorithm for the Steiner Tree Problem with Distances One and Two
null
null
null
null
cs.CC cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a 1.25 approximation algorithm for the Steiner Tree Problem with distances one and two, improving on the best known bound for that problem.
[ { "version": "v1", "created": "Fri, 10 Oct 2008 11:25:09 GMT" } ]
2008-10-13T00:00:00
[ [ "Berman", "Piotr", "" ], [ "Karpinski", "Marek", "" ], [ "Zelikovsky", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.1858
Anne Canteaut
Come Berbain (FT R&D), Olivier Billet (FT R&D), Anne Canteaut (INRIA Rocquencourt), Nicolas Courtois, Henri Gilbert (FT R&D), Louis Goubin, Aline Gouget, Louis Granboulan, Cedric Lauradoux (INRIA Rocquencourt), Marine Minier (INRIA Rocquencourt), Thomas Pornin, Herve Sibert
SOSEMANUK: a fast software-oriented stream cipher
null
New Stream Cipher Designs - The eSTREAM finalists (2008) 98-118
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and 256 bits. It ac- commodates a 128-bit initial value. Any key length is claimed to achieve 128-bit security. The Sosemanuk cipher uses both some basic design principles from the stream cipher SNOW 2.0 and some transformations derived from the block cipher SERPENT. Sosemanuk aims at improv- ing SNOW 2.0 both from the security and from the efficiency points of view. Most notably, it uses a faster IV-setup procedure. It also requires a reduced amount of static data, yielding better performance on several architectures.
[ { "version": "v1", "created": "Fri, 10 Oct 2008 11:53:53 GMT" } ]
2008-10-13T00:00:00
[ [ "Berbain", "Come", "", "FT R&D" ], [ "Billet", "Olivier", "", "FT R&D" ], [ "Canteaut", "Anne", "", "INRIA\n Rocquencourt" ], [ "Courtois", "Nicolas", "", "FT R&D" ], [ "Gilbert", "Henri", "", "FT R&D" ], [ "Goubin", "Louis", "", "INRIA Rocquencourt" ], [ "Gouget", "Aline", "", "INRIA Rocquencourt" ], [ "Granboulan", "Louis", "", "INRIA Rocquencourt" ], [ "Lauradoux", "Cedric", "", "INRIA Rocquencourt" ], [ "Minier", "Marine", "", "INRIA Rocquencourt" ], [ "Pornin", "Thomas", "" ], [ "Sibert", "Herve", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0810.1904
Heidi Gebauer
Heidi Gebauer
Unsatisfiable (k,(4*2^k/k))-CNF formulas
3 pages, 1 figure
null
null
null
cs.DM cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A boolean formula in a conjuctive normal form is called a (k,s)-formula if every clause contains exactly k variables and every variable occurs in at most s clauses. We prove the existence of a (k, 4 * (2^k/k))-CNF formula which is unsatisfiable.
[ { "version": "v1", "created": "Fri, 10 Oct 2008 15:23:37 GMT" } ]
2008-10-13T00:00:00
[ [ "Gebauer", "Heidi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0810.1973
Soumya Jana
Soumya Jana
Alphabet Sizes of Auxiliary Variables in Canonical Inner Bounds
20 pages, no figures, explanation of a part of impending IEEE IT submission
null
10.1109/CISS.2009.5054692
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Alphabet size of auxiliary random variables in our canonical description is derived. Our analysis improves upon estimates known in special cases, and generalizes to an arbitrary multiterminal setup. The salient steps include decomposition of constituent rate polytopes into orthants, translation of a hyperplane till it becomes tangent to the achievable region at an extreme point, and derivation of minimum auxiliary alphabet sizes based on Caratheodory's theorem.
[ { "version": "v1", "created": "Fri, 10 Oct 2008 21:57:10 GMT" } ]
2016-11-18T00:00:00
[ [ "Jana", "Soumya", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1980
Raul Etkin
Raul Etkin, Neri Merhav, Erik Ordentlich
Error Exponents of Optimum Decoding for the Interference Channel
Submitted to IEEE Transactions on Information Theory, Oct 7, 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Exponential error bounds for the finite-alphabet interference channel (IFC) with two transmitter-receiver pairs, are investigated under the random coding regime. Our focus is on optimum decoding, as opposed to heuristic decoding rules that have been used in previous works, like joint typicality decoding, decoding based on interference cancellation, and decoding that considers the interference as additional noise. Indeed, the fact that the actual interfering signal is a codeword and not an i.i.d. noise process complicates the application of conventional techniques to the performance analysis of the optimum decoder. Using analytical tools rooted in statistical physics, we derive a single letter expression for error exponents achievable under optimum decoding and demonstrate strict improvement over error exponents obtainable using suboptimal decoding rules, but which are amenable to more conventional analysis.
[ { "version": "v1", "created": "Fri, 10 Oct 2008 22:59:55 GMT" } ]
2008-10-14T00:00:00
[ [ "Etkin", "Raul", "" ], [ "Merhav", "Neri", "" ], [ "Ordentlich", "Erik", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.1981
Heidi Gebauer
Heidi Gebauer
Disproving the Neighborhood Conjecture
14 pages, 3 figures
null
null
null
cs.GT cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the following Maker/Breaker game. Maker and Breaker take turns in choosing vertices from a given n-uniform hypergraph F, with Maker going first. Maker's goal is to completely occupy a hyperedge and Breaker tries to avoid this. Beck conjectures that if the maximum neighborhood size of F is at most 2^(n-1) then Breaker has a winning strategy. We disprove this conjecture by establishing an n-uniform hypergraph with maximum neighborhood size 3*2^(n-3) where Maker has a winning strategy. Moreover, we show how to construct an n-uniform hypergraph with maximum degree 2^(n-1)/n where Maker has a winning strategy. Finally we show that each n-uniform hypergraph with maximum degree at most 2^(n-2)/(en) has a proper halving 2-coloring, which solves another open problem posed by Beck related to the Neighborhood Conjecture.
[ { "version": "v1", "created": "Fri, 10 Oct 2008 23:22:56 GMT" } ]
2008-10-14T00:00:00
[ [ "Gebauer", "Heidi", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0810.1991
Axel Boldt
Axel Boldt and Michael Janich
A global physician-oriented medical information system
8 pages
null
null
null
cs.CY cs.AI cs.DB
http://creativecommons.org/licenses/publicdomain/
We propose to improve medical decision making and reduce global health care costs by employing a free Internet-based medical information system with two main target groups: practicing physicians and medical researchers. After acquiring patients' consent, physicians enter medical histories, physiological data and symptoms or disorders into the system; an integrated expert system can then assist in diagnosis and statistical software provides a list of the most promising treatment options and medications, tailored to the patient. Physicians later enter information about the outcomes of the chosen treatments, data the system uses to optimize future treatment recommendations. Medical researchers can analyze the aggregate data to compare various drugs or treatments in defined patient populations on a large scale.
[ { "version": "v1", "created": "Sat, 11 Oct 2008 02:01:45 GMT" } ]
2008-10-14T00:00:00
[ [ "Boldt", "Axel", "" ], [ "Janich", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0810.1997
Heping Gao
Heping Gao, Meera Sitharam
Characterizing 1-Dof Henneberg-I graphs with efficient configuration spaces
null
null
null
null
cs.CG cs.RO cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define and study exact, efficient representations of realization spaces of a natural class of underconstrained 2D Euclidean Distance Constraint Systems(EDCS) or Frameworks based on 1-dof Henneberg-I graphs. Each representation corresponds to a choice of parameters and yields a different parametrized configuration space. Our notion of efficiency is based on the algebraic complexities of sampling the configuration space and of obtaining a realization from the sample (parametrized) configuration. Significantly, we give purely combinatorial characterizations that capture (i) the class of graphs that have efficient configuration spaces and (ii) the possible choices of representation parameters that yield efficient configuration spaces for a given graph. Our results automatically yield an efficient algorithm for sampling realizations, without missing extreme or boundary realizations. In addition, our results formally show that our definition of efficient configuration space is robust and that our characterizations are tight. We choose the class of 1-dof Henneberg-I graphs in order to take the next step in a systematic and graded program of combinatorial characterizations of efficient configuration spaces. In particular, the results presented here are the first characterizations that go beyond graphs that have connected and convex configuration spaces.
[ { "version": "v1", "created": "Sun, 12 Oct 2008 20:17:21 GMT" }, { "version": "v2", "created": "Thu, 6 Nov 2008 03:48:59 GMT" } ]
2008-11-06T00:00:00
[ [ "Gao", "Heping", "" ], [ "Sitharam", "Meera", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0810.2021
Pedro Moreira
Pedro Miguel Moreira, Lu\'is Paulo Reis and Ant\'onio Augusto de Sousa
Visualization Optimization : Application to the RoboCup Rescue Domain
1+4 pages, 3 Figures
Proceedings SIACG 2006 - Ibero American Symposyum in Computer Graphics, Santiago de Compostela, Spain, 5-7 July 2006
null
null
cs.GR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we demonstrate the use of intelligent optimization methodologies on the visualization optimization of virtual / simulated environments. The problem of automatic selection of an optimized set of views, which better describes an on-going simulation over a virtual environment is addressed in the context of the RoboCup Rescue Simulation domain. A generic architecture for optimization is proposed and described. We outline the possible extensions of this architecture and argue on how several problems within the fields of Interactive Rendering and Visualization can benefit from it.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 12:53:57 GMT" } ]
2008-10-14T00:00:00
[ [ "Moreira", "Pedro Miguel", "" ], [ "Reis", "Luís Paulo", "" ], [ "de Sousa", "António Augusto", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0810.2042
Steven Noble
Andrew J. Goodall, Steven D. Noble
Counting cocircuits and convex two-colourings is #P-complete
5 pages
null
null
null
math.CO cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that the problem of counting the number of colourings of the vertices of a graph with at most two colours, such that the colour classes induce connected subgraphs is #P-complete. We also show that the closely related problem of counting the number of cocircuits of a graph is #P-complete.
[ { "version": "v1", "created": "Sat, 11 Oct 2008 17:11:35 GMT" } ]
2017-01-24T00:00:00
[ [ "Goodall", "Andrew J.", "" ], [ "Noble", "Steven D.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0810.2046
\^Hamed \"Owladeghaffari
Hamed Owladeghaffari, Witold Pedrycz, Mostafa Sharifzadeh
Modeling of Social Transitions Using Intelligent Systems
null
null
10.1109/CANS.2008.8
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this study, we reproduce two new hybrid intelligent systems, involve three prominent intelligent computing and approximate reasoning methods: Self Organizing feature Map (SOM), Neruo-Fuzzy Inference System and Rough Set Theory (RST),called SONFIS and SORST. We show how our algorithms can be construed as a linkage of government-society interactions, where government catches various states of behaviors: solid (absolute) or flexible. So, transition of society, by changing of connectivity parameters (noise) from order to disorder is inferred.
[ { "version": "v1", "created": "Sat, 11 Oct 2008 19:09:22 GMT" } ]
2014-07-29T00:00:00
[ [ "Owladeghaffari", "Hamed", "" ], [ "Pedrycz", "Witold", "" ], [ "Sharifzadeh", "Mostafa", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0810.2061
Daniel Hirschkoff
Daniel Hirschkoff (LIP), Damien Pous (INRIA Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble)
On characterising strong bisimilarity in a fragment of CCS with replication
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a characterisation of strong bisimilarity in a fragment of CCS that contains only prefix, parallel composition, synchronisation and a limited form of replication. The characterisation is not an axiomatisation, but is instead presented as a rewriting system. We discuss how our method allows us to derive a new congruence result in the $\pi$-calculus: congruence holds in the sub-calculus that does not include restriction nor sum, and features a limited form of replication. We have not formalised the latter result in all details.
[ { "version": "v1", "created": "Sun, 12 Oct 2008 18:54:26 GMT" } ]
2008-10-14T00:00:00
[ [ "Hirschkoff", "Daniel", "", "LIP" ], [ "Pous", "Damien", "", "INRIA Rhône-Alpes / LIG\n Laboratoire d'Informatique de Grenoble" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0810.2063
Changjia Chen
Chunxi Li and Changjia Chen
Initial Offset Placement in p2p Live Streaming Systems
12 pages, 8 figures
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Initial offset placement in p2p streaming systems is studied in this paper. Proportional placement (PP) scheme is proposed. In this scheme, peer places the initial offset as the offset reported by other reference peer with a shift proportional to the buffer width or offset lag of this reference peer. This will introduce a stable placement that supports larger buffer width for peers and small buffer width for tracker. Real deployed placement method in PPLive is studied through measurement. It shows that, instead of based on offset lag, the placement is based on buffer width of the reference peer to facilitate the initial chunk fetching. We will prove that, such a PP scheme may not be stable under arbitrary buffer occupation in the reference peer. The required average buffer width then is derived. A simple good peer selection mechanism to check the buffer occupation of reference peer is proposed for a stable PP scheme based on buffer width
[ { "version": "v1", "created": "Sun, 12 Oct 2008 00:15:27 GMT" } ]
2008-10-14T00:00:00
[ [ "Li", "Chunxi", "" ], [ "Chen", "Changjia", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0810.2067
Igor Shparlinski
David Naccache and Igor E. Shparlinski
Divisibility, Smoothness and Cryptographic Applications
null
null
null
null
math.NT cs.CC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with products of moderate-size primes, familiarly known as smooth numbers. Smooth numbers play a crucial role in information theory, signal processing and cryptography. We present various properties of smooth numbers relating to their enumeration, distribution and occurrence in various integer sequences. We then turn our attention to cryptographic applications in which smooth numbers play a pivotal role.
[ { "version": "v1", "created": "Sun, 12 Oct 2008 02:28:07 GMT" }, { "version": "v2", "created": "Fri, 17 Oct 2008 07:57:01 GMT" }, { "version": "v3", "created": "Fri, 2 Jan 2009 03:54:55 GMT" } ]
2009-01-02T00:00:00
[ [ "Naccache", "David", "" ], [ "Shparlinski", "Igor E.", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0810.2133
Salman Avestimehr
Sameer Pawar, Amir Salman Avestimehr and David N. C. Tse
Diversity-Multiplexing Tradeoff of the Half-Duplex Relay Channel
8 pages, 6 figures, appeared in the 46th annual Allerton conference, September 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the diversity-multiplexing tradeoff of a half-duplex single-relay channel with identically distributed Rayleigh fading channel gains meets the 2 by 1 MISO bound. We generalize the result to the case when there are N non-interfering relays and show that the diversity-multiplexing tradeoff is equal to the N + 1 by 1 MISO bound.
[ { "version": "v1", "created": "Sun, 12 Oct 2008 22:34:13 GMT" } ]
2008-10-14T00:00:00
[ [ "Pawar", "Sameer", "" ], [ "Avestimehr", "Amir Salman", "" ], [ "Tse", "David N. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.2134
Changjia Chen
Chunxi Li and Changjia Chen
Fetching Strategy in the Startup Stage of p2p Live Streaming
9 pages, 11 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A protocol named Threshold Bipolar (TB) is proposed as a fetching strategy at the startup stage of p2p live streaming systems. In this protocol, chunks are fetched consecutively from buffer head at the beginning. After the buffer is filled into a threshold, chunks at the buffer tail will be fetched first while keeping the contiguously filled part in the buffer above the threshold even when the buffer is drained at a playback rate. High download rate, small startup latency and natural strategy handover can be reached at the same time by this protocol. Important parameters in this protocol are identified. The buffer progress under this protocol is then expressed as piecewise lines specified by those parameters. Startup traces of peers measured from PPLive are studied to show the real performance of TB protocol in a real system. A simple design model of TB protocol is proposed to reveal important considerations in a practical design.
[ { "version": "v1", "created": "Sun, 12 Oct 2008 22:37:35 GMT" } ]
2008-10-14T00:00:00
[ [ "Li", "Chunxi", "" ], [ "Chen", "Changjia", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.2144
Guangyue Han
Guangyue Han, Brian Marcus
Asymptotics of Entropy Rate in Special Families of Hidden Markov Chains
16 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive an asymptotic formula for entropy rate of a hidden Markov chain around a "weak Black Hole". We also discuss applications of the asymptotic formula to the asymptotic behaviors of certain channels.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 02:09:50 GMT" } ]
2008-10-14T00:00:00
[ [ "Han", "Guangyue", "" ], [ "Marcus", "Brian", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.2150
Christine Task
Christine Task, Arun Chauhan
A Model for Communication in Clusters of Multi-core Machines
This paper has been withdrawn by the author because it was basically a short-hand write-up of an incompletely formed idea from her Masters, and she'd like to start using her ArXiv account for her formal PhD research
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A common paradigm for scientific computing is distributed message-passing systems, and a common approach to these systems is to implement them across clusters of high-performance workstations. As multi-core architectures become increasingly mainstream, these clusters are very likely to include multi-core machines. However, the theoretical models which are currently used to develop communication algorithms across these systems do not take into account the unique properties of processes running on shared-memory architectures, including shared external network connections and communication via shared memory locations. Because of this, existing algorithms are far from optimal for modern clusters. Additionally, recent attempts to adapt these algorithms to multicore systems have proceeded without the introduction of a more accurate formal model and have generally neglected to capitalize on the full power these systems offer. We propose a new model which simply and effectively captures the strengths of multi-core machines in collective communications patterns and suggest how it could be used to properly optimize these patterns.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 04:04:42 GMT" }, { "version": "v2", "created": "Mon, 30 Apr 2012 19:16:37 GMT" } ]
2012-05-01T00:00:00
[ [ "Task", "Christine", "" ], [ "Chauhan", "Arun", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.2164
Neri Merhav
Neri Merhav
Joint source-channel coding via statistical mechanics: thermal equilibrium between the source and the channel
24 pages; submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We examine the classical joint source--channel coding problem from the viewpoint of statistical physics and demonstrate that in the random coding regime, the posterior probability distribution of the source given the channel output is dominated by source sequences, which exhibit a behavior that is highly parallel to that of thermal equilibrium between two systems of particles that exchange energy, where one system corresponds to the source and the other corresponds to the channel. The thermodynamical entopies of the dual physical problem are analogous to conditional and unconditional Shannon entropies of the source, and so, their balance in thermal equilibrium yields a simple formula for the mutual information between the source and the channel output, that is induced by the typical code in an ensemble of joint source--channel codes under certain conditions. We also demonstrate how our results can be used in applications, like the wiretap channel, and how can it be extended to multiuser scenarios, like that of the multiple access channel.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 07:34:51 GMT" } ]
2008-10-14T00:00:00
[ [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.2175
Jukka Suomela
Valentin Polishchuk, Jukka Suomela
A simple local 3-approximation algorithm for vertex cover
6 pages, 1 figure
Information Processing Letters 109 (2009) 642-645
10.1016/j.ipl.2009.02.017
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a local algorithm (constant-time distributed algorithm) for finding a 3-approximate vertex cover in bounded-degree graphs. The algorithm is deterministic, and no auxiliary information besides port numbering is required.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 12:45:15 GMT" } ]
2009-05-02T00:00:00
[ [ "Polishchuk", "Valentin", "" ], [ "Suomela", "Jukka", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0810.2179
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis)
Structural abstract interpretation, A formal study using Coq
null
Dans LERNET Summer School (2008)
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
interpreters are tools to compute approximations for behaviors of a program. These approximations can then be used for optimisation or for error detection. In this paper, we show how to describe an abstract interpreter using the type-theory based theorem prover Coq, using inductive types for syntax and structural recursive programming for the abstract interpreter's kernel. The abstract interpreter can then be proved correct with respect to a Hoare logic for the programming language.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 09:07:38 GMT" }, { "version": "v2", "created": "Mon, 20 Oct 2008 14:23:41 GMT" } ]
2008-10-20T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0810.2208
Tobias Koch
Tobias Koch and Amos Lapidoth
Multipath Channels of Unbounded Capacity
To be presented at the 2008 IEEE 25-th Convention of Electrical and Electronics Engineers in Israel
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity of discrete-time, noncoherent, multipath fading channels is considered. It is shown that if the variances of the path gains decay faster than exponentially, then capacity is unbounded in the transmit power.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 11:21:01 GMT" } ]
2008-10-14T00:00:00
[ [ "Koch", "Tobias", "" ], [ "Lapidoth", "Amos", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.2226
Bogdan Nicolae
Bogdan Nicolae (IRISA), Gabriel Antoniu (IRISA), Luc Boug\'e (IRISA)
Enabling Lock-Free Concurrent Fine-Grain Access to Massive Distributed Data: Application to Supernovae Detection
null
Dans IEEE Cluster 2008 - Poster Session (2008)
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of efficiently managing massive data in a large-scale distributed environment. We consider data strings of size in the order of Terabytes, shared and accessed by concurrent clients. On each individual access, a segment of a string, of the order of Megabytes, is read or modified. Our goal is to provide the clients with efficient fine-grain access the data string as concurrently as possible, without locking the string itself. This issue is crucial in the context of applications in the field of astronomy, databases, data mining and multimedia. We illustrate these requiremens with the case of an application for searching supernovae. Our solution relies on distributed, RAM-based data storage, while leveraging a DHT-based, parallel metadata management scheme. The proposed architecture and algorithms have been validated through a software prototype and evaluated in a cluster environment.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 13:07:18 GMT" } ]
2008-10-14T00:00:00
[ [ "Nicolae", "Bogdan", "", "IRISA" ], [ "Antoniu", "Gabriel", "", "IRISA" ], [ "Bougé", "Luc", "", "IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0810.2227
Bogdan Nicolae
Bogdan Nicolae (IRISA), Gabriel Antoniu (IRISA), Luc Boug\'e (IRISA)
Distributed Management of Massive Data: an Efficient Fine-Grain Data Access Scheme
null
Dans VECPAR 2008 (2008)
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of efficiently storing and accessing massive data blocks in a large-scale distributed environment, while providing efficient fine-grain access to data subsets. This issue is crucial in the context of applications in the field of databases, data mining and multimedia. We propose a data sharing service based on distributed, RAM-based storage of data, while leveraging a DHT-based, natively parallel metadata management scheme. As opposed to the most commonly used grid storage infrastructures that provide mechanisms for explicit data localization and transfer, we provide a transparent access model, where data are accessed through global identifiers. Our proposal has been validated through a prototype implementation whose preliminary evaluation provides promising results.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 13:08:14 GMT" } ]
2008-10-14T00:00:00
[ [ "Nicolae", "Bogdan", "", "IRISA" ], [ "Antoniu", "Gabriel", "", "IRISA" ], [ "Bougé", "Luc", "", "IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0810.2263
Xavier Mora
Rosa Camps, Xavier Mora, Laia Saumell
A continuous rating method for preferential voting
v2: a comment has been added in section 18 about monotonicity
null
null
null
math.OC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A method is given for quantitatively rating the social acceptance of different options which are the matter of a preferential vote. The proposed method is proved to satisfy certain desirable conditions, among which there is a majority principle, a property of clone consistency, and the continuity of the rates with respect to the data. One can view this method as a quantitative complement for a qualitative method introduced in 1997 by Markus Schulze. It is also related to certain methods of one-dimensional scaling or cluster analysis.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 16:34:18 GMT" }, { "version": "v2", "created": "Thu, 18 Dec 2008 18:32:21 GMT" } ]
2009-12-12T00:00:00
[ [ "Camps", "Rosa", "" ], [ "Mora", "Xavier", "" ], [ "Saumell", "Laia", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0810.2279
Slavcho Shtrakov
Slavcho Shtrakov and Joerg Koppitz
On finite functions with non-trivial arity gap
17 pages, Int. Conf. Algebraic and Combinatorial Coding Theory, ACCT2008, June 16 - Sunday 22, 2008, Pamporovo, BULGARIA
null
null
null
cs.DM cs.CC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Given an $n$-ary $k-$valued function $f$, $gap(f)$ denotes the minimal number of essential variables in $f$ which become fictive when identifying any two distinct essential variables in $f$. We particularly solve a problem concerning the explicit determination of $n$-ary $k-$valued functions $f$ with $2\leq gap(f)\leq n\leq k$. Our methods yield new combinatorial results about the number of such functions.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 18:09:27 GMT" }, { "version": "v2", "created": "Sun, 29 Mar 2009 16:22:54 GMT" }, { "version": "v3", "created": "Thu, 13 Aug 2009 18:21:34 GMT" }, { "version": "v4", "created": "Thu, 19 Nov 2009 17:55:53 GMT" }, { "version": "v5", "created": "Thu, 4 Mar 2010 18:51:02 GMT" }, { "version": "v6", "created": "Fri, 5 Mar 2010 12:18:18 GMT" } ]
2010-03-05T00:00:00
[ [ "Shtrakov", "Slavcho", "" ], [ "Koppitz", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0810.2311
Nikolaos Vasiloglou
Nikolaos Vasiloglou, Alexander G. Gray, David V. Anderson
Non-Negative Matrix Factorization, Convexity and Isometry
accpepted in SIAM Data Mining 2009, 12 pages
null
null
null
cs.AI cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper we explore avenues for improving the reliability of dimensionality reduction methods such as Non-Negative Matrix Factorization (NMF) as interpretive exploratory data analysis tools. We first explore the difficulties of the optimization problem underlying NMF, showing for the first time that non-trivial NMF solutions always exist and that the optimization problem is actually convex, by using the theory of Completely Positive Factorization. We subsequently explore four novel approaches to finding globally-optimal NMF solutions using various ideas from convex optimization. We then develop a new method, isometric NMF (isoNMF), which preserves non-negativity while also providing an isometric embedding, simultaneously achieving two properties which are helpful for interpretation. Though it results in a more difficult optimization problem, we show experimentally that the resulting method is scalable and even achieves more compact spectra than standard NMF.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 20:43:24 GMT" }, { "version": "v2", "created": "Wed, 22 Apr 2009 16:05:22 GMT" } ]
2009-04-22T00:00:00
[ [ "Vasiloglou", "Nikolaos", "" ], [ "Gray", "Alexander G.", "" ], [ "Anderson", "David V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0810.2323
Sergey Loyka
Sergey Loyka, Francois Gagnon
On Outage and Error Rate Analysis of the Ordered V-BLAST
accepted by IEEE Transactions on Wireless Communications
null
10.1109/T-WC.2008.070271
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Outage and error rate performance of the ordered BLAST with more than 2 transmit antennas is evaluated for i.i.d. Rayleigh fading channels. A number of lower and upper bounds on the 1st step outage probability at any SNR are derived, which are further used to obtain accurate approximations to average block and total error rates. For m Tx antennas, the effect of the optimal ordering at the first step is an m-fold SNR gain. As m increases to infinity, the BLER decreases to zero, which is a manifestation of the space-time autocoding effect in the V-BLAST. While the sub-optimal ordering (based on the before-projection SNR) suffers a few dB SNR penalty compared to the optimal one, it has a lower computational complexity and a 3 dB SNR gain compared to the unordered V-BLAST and can be an attractive solution for low-complexity/low-energy systems. Uncoded D-BLAST exhibits the same outage and error rate performance as that of the V-BLAST. An SNR penalty of the linear receiver interfaces compared to the BLAST is also evaluated.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 21:55:27 GMT" } ]
2016-11-17T00:00:00
[ [ "Loyka", "Sergey", "" ], [ "Gagnon", "Francois", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.2336
Stephanie Vance
Stephanie Vance
A Mordell Inequality for Lattices over Maximal Orders
13 pages
Trans. Amer. Math. Soc. 362 (2010), no. 7, 3827-3839
null
null
math.MG cs.IT math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we prove an analogue of Mordell's inequality for lattices in finite-dimensional complex or quaternionic Hermitian space that are modules over a maximal order in an imaginary quadratic number field or a totally definite rational quaternion algebra. This inequality implies that the 16-dimensional Barnes-Wall lattice has optimal density among all 16-dimensional lattices with Hurwitz structures.
[ { "version": "v1", "created": "Tue, 14 Oct 2008 00:24:34 GMT" }, { "version": "v2", "created": "Sat, 7 Feb 2009 00:53:22 GMT" }, { "version": "v3", "created": "Sun, 1 Mar 2009 23:05:10 GMT" }, { "version": "v4", "created": "Wed, 1 Apr 2009 17:46:15 GMT" }, { "version": "v5", "created": "Fri, 30 Jul 2010 19:42:56 GMT" } ]
2010-08-02T00:00:00
[ [ "Vance", "Stephanie", "" ] ]
[ { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0810.2352
Deniz Gunduz
Nan Liu, Deniz Gunduz, Andrea J. Goldsmith, H. Vincent Poor
Interference Channels with Correlated Receiver Side Information
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of joint source-channel coding in transmitting independent sources over interference channels with correlated receiver side information is studied. When each receiver has side information correlated with its own desired source, it is shown that source-channel code separation is optimal. When each receiver has side information correlated with the interfering source, sufficient conditions for reliable transmission are provided based on a joint source-channel coding scheme using the superposition encoding and partial decoding idea of Han and Kobayashi. When the receiver side information is a deterministic function of the interfering source, source-channel code separation is again shown to be optimal. As a special case, for a class of Z-interference channels, when the side information of the receiver facing interference is a deterministic function of the interfering source, necessary and sufficient conditions for reliable transmission are provided in the form of single letter expressions. As a byproduct of these joint source-channel coding results, the capacity region of a class of Z-channels with degraded message sets is also provided.
[ { "version": "v1", "created": "Tue, 14 Oct 2008 03:57:30 GMT" } ]
2008-10-15T00:00:00
[ [ "Liu", "Nan", "" ], [ "Gunduz", "Deniz", "" ], [ "Goldsmith", "Andrea J.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.2390
Simone Faro
Simone Faro and Thierry Lecroq
Efficient Pattern Matching on Binary Strings
12 pages
null
null
null
cs.DS cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The binary string matching problem consists in finding all the occurrences of a pattern in a text where both strings are built on a binary alphabet. This is an interesting problem in computer science, since binary data are omnipresent in telecom and computer network applications. Moreover the problem finds applications also in the field of image processing and in pattern matching on compressed texts. Recently it has been shown that adaptations of classical exact string matching algorithms are not very efficient on binary data. In this paper we present two efficient algorithms for the problem adapted to completely avoid any reference to bits allowing to process pattern and text byte by byte. Experimental results show that the new algorithms outperform existing solutions in most cases.
[ { "version": "v1", "created": "Tue, 14 Oct 2008 08:44:27 GMT" }, { "version": "v2", "created": "Wed, 15 Oct 2008 12:15:24 GMT" } ]
2008-10-15T00:00:00
[ [ "Faro", "Simone", "" ], [ "Lecroq", "Thierry", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0810.2434
Edward Rosten
Edward Rosten, Reid Porter, Tom Drummond
Faster and better: a machine learning approach to corner detection
35 pages, 11 figures
IEEE Trans. PAMI, 32 (2010), 105--119
10.1109/TPAMI.2008.275
07-3912
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The repeatability and efficiency of a corner detector determines how likely it is to be useful in a real-world application. The repeatability is importand because the same scene viewed from different positions should yield features which correspond to the same real-world 3D locations [Schmid et al 2000]. The efficiency is important because this determines whether the detector combined with further processing can operate at frame rate. Three advances are described in this paper. First, we present a new heuristic for feature detection, and using machine learning we derive a feature detector from this which can fully process live PAL video using less than 5% of the available processing time. By comparison, most other detectors cannot even operate at frame rate (Harris detector 115%, SIFT 195%). Second, we generalize the detector, allowing it to be optimized for repeatability, with little loss of efficiency. Third, we carry out a rigorous comparison of corner detectors based on the above repeatability criterion applied to 3D scenes. We show that despite being principally constructed for speed, on these stringent tests, our heuristic detector significantly outperforms existing feature detectors. Finally, the comparison demonstrates that using machine learning produces significant improvements in repeatability, yielding a detector that is both very fast and very high quality.
[ { "version": "v1", "created": "Tue, 14 Oct 2008 14:22:05 GMT" } ]
2010-07-09T00:00:00
[ [ "Rosten", "Edward", "" ], [ "Porter", "Reid", "" ], [ "Drummond", "Tom", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0810.2486
Fr\'ed\'eric Meunier
Fr\'ed\'eric Meunier and Nicolas Wagner
Dynamic assignment: there is an equilibrium !
13 pages
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a network with a continuum of users at some origins, suppose that the users wish to reach specific destinations, but that they are not indifferent to the time needed to reach their destination. They may have several possibilities (of routes or deparure time), but their choices modify the travel times on the network. Hence, each user faces the following problem: given a pattern of travel times for the different possible routes that reach the destination, find a shortest path. The situation in a context of perfect information is a so-called Nash equilibrium, and the question whether there is such an equilibrium and of finding it if it exists is the so-called equilibrium assignment problem. It arises for various kind of networks, such as computers, communication or transportation network. When each user occupies permanently the whole route from the origin to its destination, we call it the static assignment problem, which has been extensively studied with pioneers works by Wardrop or Beckmann. A less studied, but more realistic, and maybe more difficult, problem is when the time needed to reach an arc is taken into account. We speak then of a dynamic assignment problem. Several models have been proposed. For some of them, the existence of an equilibrium has been proved, but always under some technical assumptions or in a very special case (a network with one arc for the case when the users may chose their departure time). The present paper proposes a compact model, with minimal and natural assumptions. For this model, we prove that there is always an equilibrium. To our knowledge, this imply all previous results about existence of an equilibrium for the dynamic assignment problem.
[ { "version": "v1", "created": "Tue, 14 Oct 2008 16:37:24 GMT" } ]
2008-10-15T00:00:00
[ [ "Meunier", "Frédéric", "" ], [ "Wagner", "Nicolas", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0810.2513
Anand Sarwate
Anand D. Sarwate, Alexandros G. Dimakis
The Impact of Mobility on Gossip Algorithms
Revised version submitted to IEEE Transactions on Information Theory
null
null
null
cs.NI cs.DC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The influence of node mobility on the convergence time of averaging gossip algorithms in networks is studied. It is shown that a small number of fully mobile nodes can yield a significant decrease in convergence time. A method is developed for deriving lower bounds on the convergence time by merging nodes according to their mobility pattern. This method is used to show that if the agents have one-dimensional mobility in the same direction the convergence time is improved by at most a constant. Upper bounds are obtained on the convergence time using techniques from the theory of Markov chains and show that simple models of mobility can dramatically accelerate gossip as long as the mobility paths significantly overlap. Simulations verify that different mobility patterns can have significantly different effects on the convergence of distributed algorithms.
[ { "version": "v1", "created": "Tue, 14 Oct 2008 18:24:52 GMT" }, { "version": "v2", "created": "Tue, 29 Dec 2009 23:57:51 GMT" }, { "version": "v3", "created": "Tue, 21 Jun 2011 17:05:33 GMT" } ]
2011-06-22T00:00:00
[ [ "Sarwate", "Anand D.", "" ], [ "Dimakis", "Alexandros G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.2529
Alireza Bayesteh
Jamshid Abouei, Alireza Bayesteh, Masoud Ebrahimi, and Amir K. Khandani
On the Throughput Maximization in Dencentralized Wireless Networks
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A distributed single-hop wireless network with $K$ links is considered, where the links are partitioned into a fixed number ($M$) of clusters each operating in a subchannel with bandwidth $\frac{W}{M}$. The subchannels are assumed to be orthogonal to each other. A general shadow-fading model, described by parameters $(\alpha,\varpi)$, is considered where $\alpha$ denotes the probability of shadowing and $\varpi$ ($\varpi \leq 1$) represents the average cross-link gains. The main goal of this paper is to find the maximum network throughput in the asymptotic regime of $K \to \infty$, which is achieved by: i) proposing a distributed and non-iterative power allocation strategy, where the objective of each user is to maximize its best estimate (based on its local information, i.e., direct channel gain) of the average network throughput, and ii) choosing the optimum value for $M$. In the first part of the paper, the network hroughput is defined as the \textit{average sum-rate} of the network, which is shown to scale as $\Theta (\log K)$. Moreover, it is proved that in the strong interference scenario, the optimum power allocation strategy for each user is a threshold-based on-off scheme. In the second part, the network throughput is defined as the \textit{guaranteed sum-rate}, when the outage probability approaches zero. In this scenario, it is demonstrated that the on-off power allocation scheme maximizes the throughput, which scales as $\frac{W}{\alpha \varpi} \log K$. Moreover, the optimum spectrum sharing for maximizing the average sum-rate and the guaranteed sum-rate is achieved at M=1.
[ { "version": "v1", "created": "Tue, 14 Oct 2008 19:40:22 GMT" } ]
2008-10-15T00:00:00
[ [ "Abouei", "Jamshid", "" ], [ "Bayesteh", "Alireza", "" ], [ "Ebrahimi", "Masoud", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.2598
Heli Honkanen
J. Carnahan, H. Honkanen, S. Liuti, Y. Loitiere, P. R. Reynolds
New avenue to the Parton Distribution Functions: Self-Organizing Maps
34 pages, 17 figures, minor revisions, 2 figures updated
Phys.Rev.D79:034022,2009
10.1103/PhysRevD.79.034022
null
hep-ph cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neural network algorithms have been recently applied to construct Parton Distribution Function (PDF) parametrizations which provide an alternative to standard global fitting procedures. We propose a technique based on an interactive neural network algorithm using Self-Organizing Maps (SOMs). SOMs are a class of clustering algorithms based on competitive learning among spatially-ordered neurons. Our SOMs are trained on selections of stochastically generated PDF samples. The selection criterion for every optimization iteration is based on the features of the clustered PDFs. Our main goal is to provide a fitting procedure that, at variance with the standard neural network approaches, allows for an increased control of the systematic bias by enabling user interaction in the various stages of the process.
[ { "version": "v1", "created": "Wed, 15 Oct 2008 05:41:51 GMT" }, { "version": "v2", "created": "Sun, 2 Nov 2008 23:56:06 GMT" } ]
2009-04-30T00:00:00
[ [ "Carnahan", "J.", "" ], [ "Honkanen", "H.", "" ], [ "Liuti", "S.", "" ], [ "Loitiere", "Y.", "" ], [ "Reynolds", "P. R.", "" ] ]
[ { "class": "Physics", "code": "hep-ph", "description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.", "span": "(High Energy Physics - Phenomenology)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0810.2653
Viorica Sofronie-Stokkermans
Viorica Sofronie-Stokkermans
On combinations of local theory extensions
22 pages, no figure
null
null
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study possibilities of efficient reasoning in combinations of theories over possibly non-disjoint signatures. We first present a class of theory extensions (called local extensions) in which hierarchical reasoning is possible, and give several examples from computer science and mathematics in which such extensions occur in a natural way. We then identify situations in which combinations of local extensions of a theory are again local extensions of that theory. We thus obtain criteria both for recognizing wider classes of local theory extensions, and for modular reasoning in combinations of theories over non-disjoint signatures.
[ { "version": "v1", "created": "Wed, 15 Oct 2008 10:26:02 GMT" } ]
2008-10-16T00:00:00
[ [ "Sofronie-Stokkermans", "Viorica", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0810.2659
Pannir Selvam Elamvazhuthi
P.S. Elamvazhuthi (1 and 2), P.S. Kulkarni (1 and 3), and B.K. Dey (1) ((1) Indian Institute of Technology Bombay, Mumbai, India, (2) Cognizant Technology Solutions India Pvt. Ltd., Chennai, India, (3) Juniper Networks Inc., Bengaluru, India)
DSTC Layering Protocols in Wireless Cooperative Networks
39 pages, 20 figures. Part of this paper is submitted to IEEE 70th Vehicular Technology Conference: VTC2009-Fall for publication
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a radio network with single source-destination pair and some relays, a link between any two nodes is considered to have same or zero path loss. However in practice some links may have considerably high path loss than others but still being useful. In this report, we take into account signals received from these links also. \indent Our system model consists of a source-destination pair with two layers of relays in which weaker links between source and second layer and between the first layer and destination are also considered. We propose some protocols in this system model, run simulations under optimum power allocation, and compare these protocols. We show that under reasonable channel strength of these weaker links, the proposed protocols perform ($ \approx 2$ dB) better than the existing basic protocol. As expected, the degree of improvement increases with the strength of the weaker links. We also show that with the receive channel knowledge in relays, the reliability and data rate are improved.
[ { "version": "v1", "created": "Wed, 15 Oct 2008 10:57:55 GMT" }, { "version": "v2", "created": "Fri, 6 Mar 2009 09:29:59 GMT" }, { "version": "v3", "created": "Sat, 7 Mar 2009 17:02:26 GMT" } ]
2009-03-07T00:00:00
[ [ "Elamvazhuthi", "P. S.", "", "1 and 2" ], [ "Kulkarni", "P. S.", "", "1 and 3" ], [ "Dey", "B. K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.2665
Damien Chablat
Damien Chablat (IRCCyN)
Path Planner for Objects, Robots and Mannequins by Multi-Agents Systems or Motion Captures
null
International Conference on Digital Enterprise Technology, Nantes : France (2008)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to optimise the costs and time of design of the new products while improving their quality, concurrent engineering is based on the digital model of these products. However, in order to be able to avoid definitively physical model without loss of information, new tools must be available. Especially, a tool making it possible to check simply and quickly the maintainability of complex mechanical sets using the numerical model is necessary. Since one decade, the MCM team of IRCCyN works on the creation of tools for the generation and the analysis of trajectories of virtual mannequins. The simulation of human tasks can be carried out either by robot-like simulation or by simulation by motion capture. This paper presents some results on the both two methods. The first method is based on a multi-agent system and on a digital mock-up technology, to assess an efficient path planner for a manikin or a robot for access and visibility task taking into account ergonomic constraints or joint limits. The human operator is integrated in the process optimisation to contribute to a global perception of the environment. This operator cooperates, in real-time, with several automatic local elementary agents. In the second method, we worked with the CEA and EADS/CCR to solve the constraints related to the evolution of human virtual in its environment on the basis of data resulting from motion capture system. An approach using of the virtual guides was developed to allow to the user the realization of precise trajectory in absence of force feedback.
[ { "version": "v1", "created": "Wed, 15 Oct 2008 11:13:12 GMT" }, { "version": "v2", "created": "Wed, 22 Oct 2008 09:27:31 GMT" } ]
2008-10-22T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0810.2666
Damien Chablat
Flavien Paccot (LASMEA), Philippe Lemoine (IRCCyN), Nicolas Andreff (LASMEA), Damien Chablat (IRCCyN), Philippe Martinet (LASMEA)
A Vision-based Computed Torque Control for Parallel Kinematic Machines
null
IEEE International Conference on Robotics and Automation, Pasadena : \'Etats-Unis d'Am\'erique (2008)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a novel approach for parallel kinematic machine control relying on a fast exteroceptive measure is implemented and validated on the Orthoglide robot. This approach begins with rewriting the robot models as a function of the only end-effector pose. It is shown that such an operation reduces the model complexity. Then, this approach uses a classical Cartesian space computed torque control with a fast exteroceptive measure, reducing the control schemes complexity. Simulation results are given to show the expected performance improvements and experiments prove the practical feasibility of the approach.
[ { "version": "v1", "created": "Wed, 15 Oct 2008 11:14:15 GMT" } ]
2008-10-16T00:00:00
[ [ "Paccot", "Flavien", "", "LASMEA" ], [ "Lemoine", "Philippe", "", "IRCCyN" ], [ "Andreff", "Nicolas", "", "LASMEA" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Martinet", "Philippe", "", "LASMEA" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0810.2697
Anita Das
L. Sunil Chandran, Anita Das, Naveen Sivadasan
On the cubicity of bipartite graphs
7 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
{\it A unit cube in $k$-dimension (or a $k$-cube) is defined as the cartesian product $R_1 \times R_2 \times ... \times R_k$, where each $R_i$ is a closed interval on the real line of the form $[a_i, a_i+1]$. The {\it cubicity} of $G$, denoted as $cub(G)$, is the minimum $k$ such that $G$ is the intersection graph of a collection of $k$-cubes. Many NP-complete graph problems can be solved efficiently or have good approximation ratios in graphs of low cubicity. In most of these cases the first step is to get a low dimensional cube representation of the given graph. It is known that for a graph $G$, $cub(G) \leq \lfloor\frac{2n}{3}\rfloor$. Recently it has been shown that for a graph $G$, $cub(G) \leq 4(\Delta + 1)\ln n$, where $n$ and $\Delta$ are the number of vertices and maximum degree of $G$, respectively. In this paper, we show that for a bipartite graph $G = (A \cup B, E)$ with $|A| = n_1$, $|B| = n_2$, $n_1 \leq n_2$, and $\Delta' = \min\{\Delta_A, \Delta_B\}$, where $\Delta_A = {max}_{a \in A}d(a)$ and $\Delta_B = {max}_{b \in B}d(b)$, $d(a)$ and $d(b)$ being the degree of $a$ and $b$ in $G$ respectively, $cub(G) \leq 2(\Delta'+2) \lceil \ln n_2 \rceil$. We also give an efficient randomized algorithm to construct the cube representation of $G$ in $3(\Delta'+2)\lceil \ln n_2 \rceil$ dimensions. The reader may note that in general $\Delta'$ can be much smaller than $\Delta$.}
[ { "version": "v1", "created": "Wed, 15 Oct 2008 13:44:56 GMT" } ]
2008-10-16T00:00:00
[ [ "Chandran", "L. Sunil", "" ], [ "Das", "Anita", "" ], [ "Sivadasan", "Naveen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0810.2717
Pavel Chebotarev
Pavel Chebotarev
A Class of Graph-Geodetic Distances Generalizing the Shortest-Path and the Resistance Distances
14 pages. Discrete Applied Mathematics
Discrete Applied Mathematics 159(2011) No. 5. 295-302
10.1016/j.dam.2010.11.017
null
math.CO cs.DM math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new class of distances for graph vertices is proposed. This class contains parametric families of distances which reduce to the shortest-path, weighted shortest-path, and the resistance distances at the limiting values of the family parameters. The main property of the class is that all distances it comprises are graph-geodetic: $d(i,j)+d(j,k)=d(i,k)$ if and only if every path from $i$ to $k$ passes through $j$. The construction of the class is based on the matrix forest theorem and the transition inequality.
[ { "version": "v1", "created": "Wed, 15 Oct 2008 16:07:04 GMT" }, { "version": "v2", "created": "Fri, 17 Oct 2008 12:32:29 GMT" }, { "version": "v3", "created": "Wed, 20 May 2009 20:38:16 GMT" }, { "version": "v4", "created": "Fri, 22 May 2009 12:51:23 GMT" }, { "version": "v5", "created": "Sun, 23 Aug 2009 10:26:47 GMT" }, { "version": "v6", "created": "Sun, 6 Dec 2009 20:29:31 GMT" }, { "version": "v7", "created": "Thu, 23 Sep 2010 12:15:11 GMT" }, { "version": "v8", "created": "Tue, 18 Jan 2011 20:27:07 GMT" } ]
2011-01-25T00:00:00
[ [ "Chebotarev", "Pavel", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
0810.2746
Zhihang Yi
Zhihang Yi and Il-Min Kim
Finite-SNR Diversity-Multiplexing Tradeoff and Optimum Power Allocation in Bidirectional Cooperative Networks
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper focuses on analog network coding (ANC) and time division broadcasting (TDBC) which are two major protocols used in bidirectional cooperative networks. Lower bounds of the outage probabilities of those two protocols are derived first. Those lower bounds are extremely tight in the whole signal-to-noise ratio (SNR) range irrespective of the values of channel variances. Based on those lower bounds, finite-SNR diversity-multiplexing tradeoffs of the ANC and TDBC protocols are obtained. Secondly, we investigate how to efficiently use channel state information (CSI) in those two protocols. Specifically, an optimum power allocation scheme is proposed for the ANC protocol. It simultaneously minimizes the outage probability and maximizes the total mutual information of this protocol. For the TDBC protocol, an optimum method to combine the received signals at the relay terminal is developed under an equal power allocation assumption. This method minimizes the outage probability and maximizes the total mutual information of the TDBC protocol at the same time.
[ { "version": "v1", "created": "Wed, 15 Oct 2008 17:32:43 GMT" } ]
2008-10-16T00:00:00
[ [ "Yi", "Zhihang", "" ], [ "Kim", "Il-Min", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.2764
Nir Ailon
Nir Ailon
A Simple Linear Ranking Algorithm Using Query Dependent Intercept Variables
5 pages
null
null
null
cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The LETOR website contains three information retrieval datasets used as a benchmark for testing machine learning ideas for ranking. Algorithms participating in the challenge are required to assign score values to search results for a collection of queries, and are measured using standard IR ranking measures (NDCG, precision, MAP) that depend only the relative score-induced order of the results. Similarly to many of the ideas proposed in the participating algorithms, we train a linear classifier. In contrast with other participating algorithms, we define an additional free variable (intercept, or benchmark) for each query. This allows expressing the fact that results for different queries are incomparable for the purpose of determining relevance. The cost of this idea is the addition of relatively few nuisance parameters. Our approach is simple, and we used a standard logistic regression library to test it. The results beat the reported participating algorithms. Hence, it seems promising to combine our approach with other more complex ideas.
[ { "version": "v1", "created": "Wed, 15 Oct 2008 19:03:10 GMT" } ]
2008-10-16T00:00:00
[ [ "Ailon", "Nir", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0810.2781
Jin Lu
Jin Lu, Jos\'e M. F. Moura
Linear Time Encoding of LDPC Codes
36 pages, 13 figures, submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2034823
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, we propose a linear complexity encoding method for arbitrary LDPC codes. We start from a simple graph-based encoding method ``label-and-decide.'' We prove that the ``label-and-decide'' method is applicable to Tanner graphs with a hierarchical structure--pseudo-trees-- and that the resulting encoding complexity is linear with the code block length. Next, we define a second type of Tanner graphs--the encoding stopping set. The encoding stopping set is encoded in linear complexity by a revised label-and-decide algorithm--the ``label-decide-recompute.'' Finally, we prove that any Tanner graph can be partitioned into encoding stopping sets and pseudo-trees. By encoding each encoding stopping set or pseudo-tree sequentially, we develop a linear complexity encoding method for general LDPC codes where the encoding complexity is proved to be less than $4 \cdot M \cdot (\overline{k} - 1)$, where $M$ is the number of independent rows in the parity check matrix and $\overline{k}$ represents the mean row weight of the parity check matrix.
[ { "version": "v1", "created": "Wed, 15 Oct 2008 19:32:48 GMT" } ]
2016-11-18T00:00:00
[ [ "Lu", "Jin", "" ], [ "Moura", "José M. F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.2837
Martin Levesque
Martin Levesque, Halima Elbiaze, Wael Hosny Fouad Aly
Adaptive Hybrid Deflection and Retransmission Routing for Optical Burst-Switched Networks
4 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Burst contention is a well known challenging problem in Optical Burst Switching (OBS) networks. Deflection routing is used to resolve contention. Burst retransmission is used to reduce the Burst Loss Ratio (BLR) by retransmitting dropped bursts. Previous works show that combining deflection and retransmission outperforms both pure deflection and pure retransmission approaches. This paper proposes a new Adaptive Hybrid Deflection and Retransmission (AHDR) approach that dynamically combines deflection and retransmission approaches based on network conditions such as BLR and link utilization. Network Simulator 2 (ns-2) is used to simulate the proposed approach on different network topologies. Simulation results show that the proposed approach outperforms static approaches in terms of BLR and goodput.
[ { "version": "v1", "created": "Thu, 16 Oct 2008 02:12:54 GMT" } ]
2008-10-17T00:00:00
[ [ "Levesque", "Martin", "" ], [ "Elbiaze", "Halima", "" ], [ "Aly", "Wael Hosny Fouad", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.2861
Krzysztof R. Apt
Krzysztof R. Apt, Francesca Rossi, and K. Brent Venable
A comparison of the notions of optimality in soft constraints and graphical games
18 pages. To appear in Recent Advances in Constraints, (F. Fages, S. Soliman and F. Rossi, eds.) Springer Lecture Notes in Artificial Intelligence 5129, 2008
null
null
null
cs.AI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notion of optimality naturally arises in many areas of applied mathematics and computer science concerned with decision making. Here we consider this notion in the context of two formalisms used for different purposes and in different research areas: graphical games and soft constraints. We relate the notion of optimality used in the area of soft constraint satisfaction problems (SCSPs) to that used in graphical games, showing that for a large class of SCSPs that includes weighted constraints every optimal solution corresponds to a Nash equilibrium that is also a Pareto efficient joint strategy.
[ { "version": "v1", "created": "Thu, 16 Oct 2008 07:53:50 GMT" } ]
2008-10-17T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Rossi", "Francesca", "" ], [ "Venable", "K. Brent", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0810.2865
Krzysztof R. Apt
Krzysztof R. Apt, Vincent Conitzer, Mingyu Guo and Evangelos Markakis
Welfare Undominated Groves Mechanisms
12 pages. To appear in Proceedings of the 4th International Workshop On Internet And Network Economics (WINE 2008). Springer Lecture Notes in Computer Science, 2008
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A common objective in mechanism design is to choose the outcome (for example, allocation of resources) that maximizes the sum of the agents' valuations, without introducing incentives for agents to misreport their preferences. The class of Groves mechanisms achieves this; however, these mechanisms require the agents to make payments, thereby reducing the agents' total welfare. In this paper we introduce a measure for comparing two mechanisms with respect to the final welfare they generate. This measure induces a partial order on mechanisms and we study the question of finding minimal elements with respect to this partial order. In particular, we say a non-deficit Groves mechanism is welfare undominated if there exists no other non-deficit Groves mechanism that always has a smaller or equal sum of payments. We focus on two domains: (i) auctions with multiple identical units and unit-demand bidders, and (ii) mechanisms for public project problems. In the first domain we analytically characterize all welfare undominated Groves mechanisms that are anonymous and have linear payment functions, by showing that the family of optimal-in-expectation linear redistribution mechanisms, which were introduced in [6] and include the Bailey-Cavallo mechanism [1,2], coincides with the family of welfare undominated Groves mechanisms that are anonymous and linear in the setting we study. In the second domain we show that the classic VCG (Clarke) mechanism is welfare undominated for the class of public project problems with equal participation costs, but is not undominated for a more general class.
[ { "version": "v1", "created": "Thu, 16 Oct 2008 08:25:11 GMT" } ]
2008-10-17T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Conitzer", "Vincent", "" ], [ "Guo", "Mingyu", "" ], [ "Markakis", "Evangelos", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0810.2877
Viorica Sofronie-Stokkermans
Viorica Sofronie-Stokkermans
Sheaves and geometric logic and applications to the modular verification of complex systems
30 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we show that states, transitions and behavior of concurrent systems can often be modeled as sheaves over a suitable topological space. In this context, geometric logic can be used to describe which local properties (i.e. properties of individual systems) are preserved, at a global level, when interconnecting the systems. The main area of application is to modular verification of complex systems. We illustrate the ideas by means of an example involving a family of interacting controllers for trains on a rail track.
[ { "version": "v1", "created": "Thu, 16 Oct 2008 09:38:51 GMT" } ]
2008-10-17T00:00:00
[ [ "Sofronie-Stokkermans", "Viorica", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0810.2891
Luca Roversi
Ugo Dal Lago, Luca Roversi, Luca Vercelli
Taming Modal Impredicativity: Superlazy Reduction
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pure, or type-free, Linear Logic proof nets are Turing complete once cut-elimination is considered as computation. We introduce modal impredicativity as a new form of impredicativity causing the complexity of cut-elimination to be problematic from a complexity point of view. Modal impredicativity occurs when, during reduction, the conclusion of a residual of a box b interacts with a node that belongs to the proof net inside another residual of b. Technically speaking, superlazy reduction is a new notion of reduction that allows to control modal impredicativity. More specifically, superlazy reduction replicates a box only when all its copies are opened. This makes the overall cost of reducing a proof net finite and predictable. Specifically, superlazy reduction applied to any pure proof nets takes primitive recursive time. Moreover, any primitive recursive function can be computed by a pure proof net via superlazy reduction.
[ { "version": "v1", "created": "Thu, 16 Oct 2008 12:37:26 GMT" }, { "version": "v2", "created": "Fri, 17 Oct 2008 08:25:16 GMT" } ]
2008-10-17T00:00:00
[ [ "Lago", "Ugo Dal", "" ], [ "Roversi", "Luca", "" ], [ "Vercelli", "Luca", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0810.2924
Kammoun Abla
Abla Kammoun, Malika Kharouf, Walid Hachem, Jamal Najim
BER and Outage Probability Approximations for LMMSE Detectors on Correlated MIMO Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is devoted to the study of the performance of the Linear Minimum Mean-Square Error receiver for (receive) correlated Multiple-Input Multiple-Output systems. By the random matrix theory, it is well-known that the Signal-to-Noise Ratio (SNR) at the output of this receiver behaves asymptotically like a Gaussian random variable as the number of receive and transmit antennas converge to +$\infty$ at the same rate. However, this approximation being inaccurate for the estimation of some performance metrics such as the Bit Error Rate and the outage probability, especially for small system dimensions, Li et al. proposed convincingly to assume that the SNR follows a generalized Gamma distribution which parameters are tuned by computing the first three asymptotic moments of the SNR. In this article, this technique is generalized to (receive) correlated channels, and closed-form expressions for the first three asymptotic moments of the SNR are provided. To obtain these results, a random matrix theory technique adapted to matrices with Gaussian elements is used. This technique is believed to be simple, efficient, and of broad interest in wireless communications. Simulations are provided, and show that the proposed technique yields in general a good accuracy, even for small system dimensions.
[ { "version": "v1", "created": "Thu, 16 Oct 2008 14:50:54 GMT" } ]
2008-10-17T00:00:00
[ [ "Kammoun", "Abla", "" ], [ "Kharouf", "Malika", "" ], [ "Hachem", "Walid", "" ], [ "Najim", "Jamal", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.2953
Onur Ozan Koyluoglu
Onur Ozan Koyluoglu and Hesham El Gamal
On Power Control and Frequency Reuse in the Two User Cognitive Channel
Submitted to IEEE Transactions on Wireless Communications (revised on October 16, 2008)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the generalized cognitive radio channel where the secondary user is allowed to reuse the frequency during both the idle and active periods of the primary user, as long as the primary rate remains the same. In this setting, the optimal power allocation policy with single-input single-output (SISO) primary and secondary channels is explored. Interestingly, the offered gain resulting from the frequency reuse during the active periods of the spectrum is shown to disappear in both the low and high signal-to-noise ratio (SNR) regimes. We then argue that this drawback in the high SNR region can be avoided by equipping both the primary and secondary transmitters with multiple antennas. Finally, the scenario consisting of SISO primary and multi-input multi-output (MIMO) secondary channels is investigated. Here, a simple Zero-Forcing approach is shown to significantly outperform the celebrated Decoding-Forwarding-Dirty Paper Coding strategy (especially in the high SNR regime).
[ { "version": "v1", "created": "Thu, 16 Oct 2008 16:06:01 GMT" } ]
2008-10-17T00:00:00
[ [ "Koyluoglu", "Onur Ozan", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.3023
Rafael Pass
Joseph Y. Halpern and Rafael Pass
Iterated Regret Minimization: A More Realistic Solution Concept
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For some well-known games, such as the Traveler's Dilemma or the Centipede Game, traditional game-theoretic solution concepts--and most notably Nash equilibrium--predict outcomes that are not consistent with empirical observations. In this paper, we introduce a new solution concept, iterated regret minimization, which exhibits the same qualitative behavior as that observed in experiments in many games of interest, including Traveler's Dilemma, the Centipede Game, Nash bargaining, and Bertrand competition. As the name suggests, iterated regret minimization involves the iterated deletion of strategies that do not minimize regret.
[ { "version": "v1", "created": "Thu, 16 Oct 2008 20:49:34 GMT" } ]
2008-10-20T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Pass", "Rafael", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0810.3058
Dimitrios Tsolis Dr
Dimitrios K. Tsolis, Spyros Sioutas and Theodore S. Papatheodorou
Watermarking Digital Images Based on a Content Based Image Retrieval Technique
18 pages, 4 figures, 4 tables, submitted to Multimedia Tools and Applications Journal, Springer
null
null
null
cs.DS cs.CR
http://creativecommons.org/licenses/by/3.0/
The current work is focusing on the implementation of a robust watermarking algorithm for digital images, which is based on an innovative spread spectrum analysis algorithm for watermark embedding and on a content-based image retrieval technique for watermark detection. The highly robust watermark algorithms are applying "detectable watermarks" for which a detection mechanism checks if the watermark exists or no (a Boolean decision) based on a watermarking key. The problem is that the detection of a watermark in a digital image library containing thousands of images means that the watermark detection algorithm is necessary to apply all the keys to the digital images. This application is non-efficient for very large image databases. On the other hand "readable" watermarks may prove weaker but easier to detect as only the detection mechanism is required. The proposed watermarking algorithm combine's the advantages of both "detectable" and "readable" watermarks. The result is a fast and robust watermarking algorithm.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 04:22:01 GMT" } ]
2009-09-29T00:00:00
[ [ "Tsolis", "Dimitrios K.", "" ], [ "Sioutas", "Spyros", "" ], [ "Papatheodorou", "Theodore S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0810.3076
Tobias Kuhn
Tobias Kuhn
Combining Semantic Wikis and Controlled Natural Language
null
In Proceedings of the Poster and Demonstration Session at the 7th International Semantic Web Conference (ISWC2008), CEUR Workshop Proceedings, Volume 401, 2008
null
null
cs.HC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We demonstrate AceWiki that is a semantic wiki using the controlled natural language Attempto Controlled English (ACE). The goal is to enable easy creation and modification of ontologies through the web. Texts in ACE can automatically be translated into first-order logic and other languages, for example OWL. Previous evaluation showed that ordinary people are able to use AceWiki without being instructed.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 07:19:39 GMT" } ]
2008-10-20T00:00:00
[ [ "Kuhn", "Tobias", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0810.3093
Huawei Shen
Huawei Shen, Xueqi Cheng, Kai Cai, Mao-Bin Hu
Detect overlapping and hierarchical community structure in networks
7 pages, 5 figures
Physica A 388 (2009) 1706-1712
10.1016/j.physa.2008.12.021
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clustering and community structure is crucial for many network systems and the related dynamic processes. It has been shown that communities are usually overlapping and hierarchical. However, previous methods investigate these two properties of community structure separately. This paper proposes an algorithm (EAGLE) to detect both the overlapping and hierarchical properties of complex community structure together. This algorithm deals with the set of maximal cliques and adopts an agglomerative framework. The quality function of modularity is extended to evaluate the goodness of a cover. The examples of application to real world networks give excellent results.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 08:55:49 GMT" }, { "version": "v2", "created": "Mon, 20 Oct 2008 13:30:40 GMT" }, { "version": "v3", "created": "Mon, 3 Nov 2008 11:26:54 GMT" } ]
2009-02-20T00:00:00
[ [ "Shen", "Huawei", "" ], [ "Cheng", "Xueqi", "" ], [ "Cai", "Kai", "" ], [ "Hu", "Mao-Bin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0810.3125
{\L}ukasz D{\ke}bowski
{\L}ukasz D\k{e}bowski
On the Vocabulary of Grammar-Based Codes and the Logical Consistency of Texts
24 pages, no figures
IEEE Transactions on Information Theory 57:4589-4599, 2011
10.1109/TIT.2011.2145170
null
cs.IT cs.CL math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article presents a new interpretation for Zipf-Mandelbrot's law in natural language which rests on two areas of information theory. Firstly, we construct a new class of grammar-based codes and, secondly, we investigate properties of strongly nonergodic stationary processes. The motivation for the joint discussion is to prove a proposition with a simple informal statement: If a text of length $n$ describes $n^\beta$ independent facts in a repetitive way then the text contains at least $n^\beta/\log n$ different words, under suitable conditions on $n$. In the formal statement, two modeling postulates are adopted. Firstly, the words are understood as nonterminal symbols of the shortest grammar-based encoding of the text. Secondly, the text is assumed to be emitted by a finite-energy strongly nonergodic source whereas the facts are binary IID variables predictable in a shift-invariant way.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 16:32:17 GMT" }, { "version": "v2", "created": "Fri, 31 Oct 2008 11:57:34 GMT" }, { "version": "v3", "created": "Fri, 6 Nov 2009 20:47:24 GMT" }, { "version": "v4", "created": "Tue, 26 Oct 2010 15:47:45 GMT" }, { "version": "v5", "created": "Mon, 7 Feb 2011 16:48:23 GMT" } ]
2020-03-11T00:00:00
[ [ "Dębowski", "Łukasz", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.3136
Francesco Scarcello
Gianluigi Greco, Enrico Malizia, Luigi Palopoli, Francesco Scarcello
On the Complexity of Core, Kernel, and Bargaining Set
30 pages, 6 figures
Artif. Intell. 175(12-13): 1877-1910 (2011)
10.1016/j.artint.2011.06.002
null
cs.GT cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coalitional games are mathematical models suited to analyze scenarios where players can collaborate by forming coalitions in order to obtain higher worths than by acting in isolation. A fundamental problem for coalitional games is to single out the most desirable outcomes in terms of appropriate notions of worth distributions, which are usually called solution concepts. Motivated by the fact that decisions taken by realistic players cannot involve unbounded resources, recent computer science literature reconsidered the definition of such concepts by advocating the relevance of assessing the amount of resources needed for their computation in terms of their computational complexity. By following this avenue of research, the paper provides a complete picture of the complexity issues arising with three prominent solution concepts for coalitional games with transferable utility, namely, the core, the kernel, and the bargaining set, whenever the game worth-function is represented in some reasonable compact form (otherwise, if the worths of all coalitions are explicitly listed, the input sizes are so large that complexity problems are---artificially---trivial). The starting investigation point is the setting of graph games, about which various open questions were stated in the literature. The paper gives an answer to these questions, and in addition provides new insights on the setting, by characterizing the computational complexity of the three concepts in some relevant generalizations and specializations.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 11:53:30 GMT" }, { "version": "v2", "created": "Sat, 7 Aug 2010 16:27:27 GMT" }, { "version": "v3", "created": "Mon, 6 Sep 2010 11:38:03 GMT" } ]
2013-07-19T00:00:00
[ [ "Greco", "Gianluigi", "" ], [ "Malizia", "Enrico", "" ], [ "Palopoli", "Luigi", "" ], [ "Scarcello", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0810.3150
Jean B. Lasserre
Rida Laraki (CECO), Jean B. Lasserre (LAAS)
Semidefinite Programming for Min-Max Problems and Games
21 pages
null
null
Rapport LAAS 08582
math.OC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce two min-max problems: the first problem is to minimize the supremum of finitely many rational functions over a compact basic semi-algebraic set whereas the second problem is a 2-player zero-sum polynomial game in randomized strategies and with compact basic semi-algebraic pure strategy sets. It is proved that their optimal solution can be approximated by solving a hierarchy of semidefinite relaxations, in the spirit of the moment approach developed in Lasserre. This provides a unified approach and a class of algorithms to approximate all Nash equilibria and min-max strategies of many static and dynamic games. Each semidefinite relaxation can be solved in time which is polynomial in its input size and practice from global optimization suggests that very often few relaxations are needed for a good approximation (and sometimes even finite convergence).
[ { "version": "v1", "created": "Fri, 17 Oct 2008 12:58:10 GMT" }, { "version": "v2", "created": "Wed, 16 Dec 2009 13:03:41 GMT" } ]
2009-12-16T00:00:00
[ [ "Laraki", "Rida", "", "CECO" ], [ "Lasserre", "Jean B.", "", "LAAS" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0810.3162
Zhaohua Luo
Zhaohua Luo
Clone Theory: Its Syntax and Semantics, Applications to Universal Algebra, Lambda Calculus and Algebraic Logic
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The primary goal of this paper is to present a unified way to transform the syntax of a logic system into certain initial algebraic structure so that it can be studied algebraically. The algebraic structures which one may choose for this purpose are various clones over a full subcategory of a category. We show that the syntax of equational logic, lambda calculus and first order logic can be represented as clones or right algebras of clones over the set of positive integers. The semantics is then represented by structures derived from left algebras of these clones.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 17:46:14 GMT" } ]
2008-10-20T00:00:00
[ [ "Luo", "Zhaohua", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0810.3163
Emmanuel Briand
Emmanuel Briand (Universidad de Sevilla), Rosa Orellana (Darmouth College), Mercedes Rosas (Universidad de Sevilla)
Reduced Kronecker coefficients and counter-examples to Mulmuley's strong saturation conjecture SH
25 pages. With an appendix by Ketan Mulmuley. To appear in Computational Complexity. See also http://emmanuel.jean.briand.free.fr/publications/
Computational Complexity, vol. 18(4) pp. 577-600 (2009)
10.1007/s00037-009-0279-z
null
math.CO cs.CC math.RT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide counter-examples to Mulmuley's strong saturation conjecture (strong SH) for the Kronecker coefficients. This conjecture was proposed in the setting of Geometric Complexity Theory to show that deciding whether or not a Kronecker coefficient is zero can be done in polynomial time. We also provide a short proof of the #P-hardness of computing the Kronecker coefficients. Both results rely on the connections between the Kronecker coefficients and another family of structural constants in the representation theory of the symmetric groups: Murnaghan's reduced Kronecker coefficients. An appendix by Mulmuley introduces a relaxed form of the saturation hypothesis SH, still strong enough for the aims of Geometric Complexity Theory.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 14:09:04 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2008 23:57:36 GMT" }, { "version": "v3", "created": "Thu, 14 May 2009 21:17:27 GMT" } ]
2022-05-16T00:00:00
[ [ "Briand", "Emmanuel", "", "Universidad de Sevilla" ], [ "Orellana", "Rosa", "", "Darmouth\n College" ], [ "Rosas", "Mercedes", "", "Universidad de Sevilla" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.RT", "description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra", "span": "(Representation Theory)" } ]
0810.3182
Krzysztof R. Apt
Krzysztof R. Apt, Vangelis Markakis
Optimal Strategies in Sequential Bidding
26 pages
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are interested in mechanisms that maximize social welfare. In [1] this problem was studied for multi-unit auctions with unit demand bidders and for the public project problem, and in each case social welfare undominated mechanisms in the class of feasible and incentive compatible mechanisms were identified. One way to improve upon these optimality results is by allowing the players to move sequentially. With this in mind, we study here sequential versions of two feasible Groves mechanisms used for single item auctions: the Vickrey auction and the Bailey-Cavallo mechanism. Because of the absence of dominant strategies in this sequential setting, we focus on a weaker concept of an optimal strategy. For each mechanism we introduce natural optimal strategies and observe that in each mechanism these strategies exhibit different behaviour. However, we then show that among all optimal strategies, the one we introduce for each mechanism maximizes the social welfare when each player follows it. The resulting social welfare can be larger than the one obtained in the simultaneous setting. Finally, we show that, when interpreting both mechanisms as simultaneous ones, the vectors of the proposed strategies form a Pareto optimal Nash equilibrium in the class of optimal strategies.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 15:53:02 GMT" } ]
2008-10-20T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Markakis", "Vangelis", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0810.3199
Krzysztof R. Apt
Krzysztof R. Apt, Farhad Arbab, Huiye Ma
A Distributed Platform for Mechanism Design
6 pages. To appear in the Proc. of International Conference on Computational Intelligence for Modelling, Control and Automation, IEEE Society
null
10.1109/CIMCA.2008.9
null
cs.GT cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a structured system for distributed mechanism design. It consists of a sequence of layers. The lower layers deal with the operations relevant for distributed computing only, while the upper layers are concerned only with communication among players, including broadcasting and multicasting, and distributed decision making. This yields a highly flexible distributed system whose specific applications are realized as instances of its top layer. This design supports fault-tolerance, prevents manipulations and makes it possible to implement distributed policing. The system is implemented in Java. We illustrate it by discussing a number of implemented examples.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 17:19:54 GMT" } ]
2016-11-15T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Arbab", "Farhad", "" ], [ "Ma", "Huiye", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0810.3203
David Harvey
David Harvey
A cache-friendly truncated FFT
14 pages, 11 figures, uses algorithm2e package
null
null
null
cs.SC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a cache-friendly version of van der Hoeven's truncated FFT and inverse truncated FFT, focusing on the case of `large' coefficients, such as those arising in the Schonhage--Strassen algorithm for multiplication in Z[x]. We describe two implementations and examine their performance.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 17:36:27 GMT" } ]
2008-10-20T00:00:00
[ [ "Harvey", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.3226
Bike Xie
Bike Xie, Miguel Griot, Andres I. Vila Casado, and Richard D. Wesel
Optimal Transmission Strategy and Explicit Capacity Region for Broadcast Z Channels
9 pages, 14 figures, published in IEEE Transactions on Information Theory, Vol. 53, No. 9, pp 4296-4304, September 2008
IEEE Transactions on Information Theory, Vol. 53, No. 9, pp 4296-4304, September 2008
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides an explicit expression for the capacity region of the two-user broadcast Z channel and proves that the optimal boundary can be achieved by independent encoding of each user. Specifically, the information messages corresponding to each user are encoded independently and the OR of these two encoded streams is transmitted. Nonlinear turbo codes that provide a controlled distribution of ones and zeros are used to demonstrate a low-complexity scheme that operates close to the optimal boundary.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 19:21:01 GMT" } ]
2008-10-20T00:00:00
[ [ "Xie", "Bike", "" ], [ "Griot", "Miguel", "" ], [ "Casado", "Andres I. Vila", "" ], [ "Wesel", "Richard D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.3227
Oliver Kennedy
Oliver Kennedy, Christoph Koch, Al Demers
Dynamic Approaches to In-Network Aggregation
null
null
null
null
cs.DC cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collaboration between small-scale wireless devices hinges on their ability to infer properties shared across multiple nearby nodes. Wireless-enabled mobile devices in particular create a highly dynamic environment not conducive to distributed reasoning about such global properties. This paper addresses a specific instance of this problem: distributed aggregation. We present extensions to existing unstructured aggregation protocols that enable estimation of count, sum, and average aggregates in highly dynamic environments. With the modified protocols, devices with only limited connectivity can maintain estimates of the aggregate, despite \textit{unexpected} peer departures and arrivals. Our analysis of these aggregate maintenance extensions demonstrates their effectiveness in unstructured environments despite high levels of node mobility.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 19:48:38 GMT" } ]
2008-10-20T00:00:00
[ [ "Kennedy", "Oliver", "" ], [ "Koch", "Christoph", "" ], [ "Demers", "Al", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.3283
Daoyi Dong
Daoyi Dong, Chunlin Chen, Chenbin Zhang, Zonghai Chen
Quantum robot: structure, algorithms and applications
This paper has been withdrawn
null
null
null
cs.RO cs.AI quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn.
[ { "version": "v1", "created": "Sat, 18 Oct 2008 01:18:03 GMT" }, { "version": "v2", "created": "Sat, 25 Oct 2008 12:42:07 GMT" } ]
2010-09-02T00:00:00
[ [ "Dong", "Daoyi", "" ], [ "Chen", "Chunlin", "" ], [ "Zhang", "Chenbin", "" ], [ "Chen", "Zonghai", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0810.3294
Jan Bergstra
Jan A. Bergstra and Mark Burgess
A static theory of promises
36 pages. Revision of v4. In v5 some remarks about the institution of promising in the philosophy of Law have been included as well as a comment concerning the anthropology of promising. Several minor mistakes were found and remedied
null
null
null
cs.MA cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss for the concept of promises within a framework that can be applied to either humans or technology. We compare promises to the more established notion of obligations and find promises to be both simpler and more effective at reducing uncertainty in behavioural outcomes.
[ { "version": "v1", "created": "Sat, 18 Oct 2008 07:41:26 GMT" }, { "version": "v2", "created": "Tue, 28 May 2013 21:01:37 GMT" }, { "version": "v3", "created": "Wed, 13 Nov 2013 07:21:44 GMT" }, { "version": "v4", "created": "Sat, 14 Dec 2013 14:16:24 GMT" }, { "version": "v5", "created": "Thu, 30 Jan 2014 11:46:50 GMT" } ]
2014-01-31T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Burgess", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0810.3332
Gheorghe Stefanescu
Cezara Dragoi and Gheorghe Stefanescu
A sound spatio-temporal Hoare logic for the verification of structured interactive programs with registers and voices
21 pages, 8 figures, Invited submission for WADT'08 LNCS Proceedings
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interactive systems with registers and voices (shortly, "rv-systems") are a model for interactive computing obtained closing register machines with respect to a space-time duality transformation ("voices" are the time-dual counterparts of "registers"). In the same vain, AGAPIA v0.1, a structured programming language for rv-systems, is the space-time dual closure of classical while programs (over a specific type of data). Typical AGAPIA programs describe open processes located at various sites and having their temporal windows of adequate reaction to the environment. The language naturally supports process migration, structured interaction, and deployment of components on heterogeneous machines. In this paper a sound Hoare-like spatio-temporal logic for the verification of AGAPIA v0.1 programs is introduced. As a case study, a formal verification proof of a popular distributed termination detection protocol is presented.
[ { "version": "v1", "created": "Sun, 19 Oct 2008 00:05:20 GMT" } ]
2008-10-21T00:00:00
[ [ "Dragoi", "Cezara", "" ], [ "Stefanescu", "Gheorghe", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0810.3345
Xiaowen Zhang
Xiaowen Zhang, Zhanyang Zhang, Xinzhou Wei
Enhancements to A Lightweight RFID Authentication Protocol
9 pages, 2 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vajda and Buttyan (VB) proposed a set of five lightweight RFID authentication protocols. Defend, Fu, and Juels (DFJ) did cryptanalysis on two of them - XOR and SUBSET. To the XOR protocol, DFJ proposed repeated keys attack and nibble attack. In this paper, we identify the vulnerability existed in the original VB's successive session key permutation algorithm. We propose three enhancements to prevent DFJ's attacks and make XOR protocol stronger without introducing extra resource cost.
[ { "version": "v1", "created": "Sat, 18 Oct 2008 20:13:39 GMT" }, { "version": "v2", "created": "Tue, 21 Oct 2008 03:48:54 GMT" }, { "version": "v3", "created": "Sat, 25 Oct 2008 21:29:03 GMT" } ]
2008-10-26T00:00:00
[ [ "Zhang", "Xiaowen", "" ], [ "Zhang", "Zhanyang", "" ], [ "Wei", "Xinzhou", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]