id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0810.5308
Kazushi Mimura
Kazushi Mimura
Typical Performance of Irregular Low-Density Generator-Matrix Codes for Lossy Compression
12 pages, 8 figures
J. Phys. A: Math. Theor., 42, 13, 135002 (2009)
10.1088/1751-8113/42/13/135002
null
cond-mat.dis-nn cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We evaluate typical performance of irregular low-density generator-matrix (LDGM) codes, which is defined by sparse matrices with arbitrary irregular bit degree distribution and arbitrary check degree distribution, for lossy compression. We apply the replica method under one-step replica symmetry breaking (1RSB) ansatz to this problem.
[ { "version": "v1", "created": "Wed, 29 Oct 2008 15:47:38 GMT" }, { "version": "v2", "created": "Mon, 16 Feb 2009 10:38:21 GMT" } ]
2009-07-16T00:00:00
[ [ "Mimura", "Kazushi", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.5325
Effrosyni Kokiopoulou
R. Sala Llonch, E. Kokiopoulou, I. Tosic and P. Frossard
3D Face Recognition with Sparse Spherical Representations
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of 3D face recognition using simultaneous sparse approximations on the sphere. The 3D face point clouds are first aligned with a novel and fully automated registration process. They are then represented as signals on the 2D sphere in order to preserve depth and geometry information. Next, we implement a dimensionality reduction process with simultaneous sparse approximations and subspace projection. It permits to represent each 3D face by only a few spherical functions that are able to capture the salient facial characteristics, and hence to preserve the discriminant facial information. We eventually perform recognition by effective matching in the reduced space, where Linear Discriminant Analysis can be further activated for improved recognition performance. The 3D face recognition algorithm is evaluated on the FRGC v.1.0 data set, where it is shown to outperform classical state-of-the-art solutions that work with depth images.
[ { "version": "v1", "created": "Wed, 29 Oct 2008 17:43:54 GMT" } ]
2008-10-30T00:00:00
[ [ "Llonch", "R. Sala", "" ], [ "Kokiopoulou", "E.", "" ], [ "Tosic", "I.", "" ], [ "Frossard", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0810.5351
Alessandro Colantonio
Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello
An Activity-Based Model for Separation of Duty
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper offers several contributions for separation of duty (SoD) administration in role-based access control (RBAC) systems. We first introduce a new formal framework, based on business perspective, where SoD constraints are analyzed introducing the activity concept. This notion helps organizations define SoD constraints in terms of business requirements and reduces management complexity in large-scale RBAC systems. The model enables the definition of a wide taxonomy of conflict types. In particular, object-based SoD is introduced using the SoD domain concept, namely the set of data in which transaction conflicts may occur. Together with the formalization of the above properties, in this paper we also show the effectiveness of our proposal: we have applied the model to a large, existing organization; results highlight the benefits of adopting the proposed model in terms of reduced administration cost.
[ { "version": "v1", "created": "Wed, 29 Oct 2008 20:22:59 GMT" } ]
2008-10-31T00:00:00
[ [ "Colantonio", "Alessandro", "" ], [ "Di Pietro", "Roberto", "" ], [ "Ocello", "Alberto", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0810.5399
Shigeru Furuichi Dr.
Shigeru Furuichi
An axiomatic characterization of a two-parameter extended relative entropy
11 pages
J. Math. Phys. Vol.51 (2010), 123302 (10 pages)
10.1063/1.3525917
null
cond-mat.stat-mech cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The uniqueness theorem for a two-parameter extended relative entropy is proven. This result extends our previous one, the uniqueness theorem for a one-parameter extended relative entropy, to a two-parameter case. In addition, the properties of a two-parameter extended relative entropy are studied.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 01:39:44 GMT" }, { "version": "v2", "created": "Mon, 28 Dec 2009 23:45:51 GMT" }, { "version": "v3", "created": "Sun, 26 Dec 2010 07:13:34 GMT" } ]
2010-12-30T00:00:00
[ [ "Furuichi", "Shigeru", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.5407
Aleksandar Stojmirovi\'c
Aleksandar Stojmirovic
Quasi-metrics, Similarities and Searches: aspects of geometry of protein datasets
299 pages, 44 figures, 10 tables, 9 algorithms. PhD thesis in mathematics defended in May 2005 at the Victoria University of Wellington, Wellington, New Zealand (supervisors: Prof. Vladimir Pestov and Dr. Bill Jordan)
null
null
null
cs.IR math.GN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A quasi-metric is a distance function which satisfies the triangle inequality but is not symmetric: it can be thought of as an asymmetric metric. The central result of this thesis, developed in Chapter 3, is that a natural correspondence exists between similarity measures between biological (nucleotide or protein) sequences and quasi-metrics. Chapter 2 presents basic concepts of the theory of quasi-metric spaces and introduces a new examples of them: the universal countable rational quasi-metric space and its bicompletion, the universal bicomplete separable quasi-metric space. Chapter 4 is dedicated to development of a notion of the quasi-metric space with Borel probability measure, or pq-space. The main result of this chapter indicates that `a high dimensional quasi-metric space is close to being a metric space'. Chapter 5 investigates the geometric aspects of the theory of database similarity search in the context of quasi-metrics. The results about $pq$-spaces are used to produce novel theoretical bounds on performance of indexing schemes. Finally, the thesis presents some biological applications. Chapter 6 introduces FSIndex, an indexing scheme that significantly accelerates similarity searches of short protein fragment datasets. Chapter 7 presents the prototype of the system for discovery of short functional protein motifs called PFMFind, which relies on FSIndex for similarity searches.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 03:14:17 GMT" } ]
2008-10-31T00:00:00
[ [ "Stojmirovic", "Aleksandar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Mathematics", "code": "math.GN", "description": "Continuum theory, point-set topology, spaces with algebraic structure, foundations, dimension theory, local and global properties", "span": "(General Topology)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0810.5428
Amitabha Bagchi
Amitabha Bagchi, Garima Lahoti
Relating Web pages to enable information-gathering tasks
In Proceedings of ACM Hypertext 2009
null
null
null
cs.IR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We argue that relationships between Web pages are functions of the user's intent. We identify a class of Web tasks - information-gathering - that can be facilitated by a search engine that provides links to pages which are related to the page the user is currently viewing. We define three kinds of intentional relationships that correspond to whether the user is a) seeking sources of information, b) reading pages which provide information, or c) surfing through pages as part of an extended information-gathering process. We show that these three relationships can be productively mined using a combination of textual and link information and provide three scoring mechanisms that correspond to them: {\em SeekRel}, {\em FactRel} and {\em SurfRel}. These scoring mechanisms incorporate both textual and link information. We build a set of capacitated subnetworks - each corresponding to a particular keyword - that mirror the interconnection structure of the World Wide Web. The scores are computed by computing flows on these subnetworks. The capacities of the links are derived from the {\em hub} and {\em authority} values of the nodes they connect, following the work of Kleinberg (1998) on assigning authority to pages in hyperlinked environments. We evaluated our scoring mechanism by running experiments on four data sets taken from the Web. We present user evaluations of the relevance of the top results returned by our scoring mechanisms and compare those to the top results returned by Google's Similar Pages feature, and the {\em Companion} algorithm proposed by Dean and Henzinger (1999).
[ { "version": "v1", "created": "Thu, 30 Oct 2008 07:17:49 GMT" }, { "version": "v2", "created": "Wed, 19 May 2010 11:43:29 GMT" } ]
2010-05-20T00:00:00
[ [ "Bagchi", "Amitabha", "" ], [ "Lahoti", "Garima", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.5439
Peter Tr\"oger
Peter Tr\"oger (Blekinge Institute Of Technology)
The Multi-Core Era - Trends and Challenges
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the very beginning of hardware development, computer processors were invented with ever-increasing clock frequencies and sophisticated in-build optimization strategies. Due to physical limitations, this 'free lunch' of speedup has come to an end. The following article gives a summary and bibliography for recent trends and challenges in CMP architectures. It discusses how 40 years of parallel computing research need to be considered in the upcoming multi-core era. We argue that future research must be driven from two sides - a better expression of hardware structures, and a domain-specific understanding of software parallelism.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 08:34:48 GMT" } ]
2008-10-31T00:00:00
[ [ "Tröger", "Peter", "", "Blekinge Institute Of Technology" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0810.5477
Andrew Twigg
Andrew Twigg
Worst-case time decremental connectivity and k-edge witness
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a simple algorithm for decremental graph connectivity that handles edge deletions in worst-case time $O(k \log n)$ and connectivity queries in $O(\log k)$, where $k$ is the number of edges deleted so far, and uses worst-case space $O(m^2)$. We use this to give an algorithm for $k$-edge witness (``does the removal of a given set of $k$ edges disconnect two vertices $u,v$?'') with worst-case time $O(k^2 \log n)$ and space $O(k^2 n^2)$. For $k = o(\sqrt{n})$ these improve the worst-case $O(\sqrt{n})$ bound for deletion due to Eppstein et al. We also give a decremental connectivity algorithm using $O(n^2 \log n / \log \log n)$ space, whose time complexity depends on the toughness and independence number of the input graph. Finally, we show how to construct a distributed data structure for \kvw by giving a labeling scheme. This is the first data structure for \kvw that can efficiently distributed without just giving each vertex a copy of the whole structure. Its complexity depends on being able to construct a linear layout with good properties.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 12:15:33 GMT" } ]
2008-10-31T00:00:00
[ [ "Twigg", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.5482
Adrien Richard
Adrien Richard
On the length of attractors in boolean networks with an interaction graph by layers
7 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a boolean network whose interaction graph has no circuit of length >1. Under this hypothesis, we establish an upper bound on the length of the attractors of the network which only depends on its interaction graph.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 13:21:40 GMT" } ]
2008-10-31T00:00:00
[ [ "Richard", "Adrien", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0810.5484
Qiang Li
Qiang Li, Yan He, Jing-ping Jiang
A Novel Clustering Algorithm Based on a Modified Model of Random Walk
21 pages, 13 figures
null
null
null
cs.LG cs.AI cs.MA
http://creativecommons.org/licenses/by-nc-sa/3.0/
We introduce a modified model of random walk, and then develop two novel clustering algorithms based on it. In the algorithms, each data point in a dataset is considered as a particle which can move at random in space according to the preset rules in the modified model. Further, this data point may be also viewed as a local control subsystem, in which the controller adjusts its transition probability vector in terms of the feedbacks of all data points, and then its transition direction is identified by an event-generating function. Finally, the positions of all data points are updated. As they move in space, data points collect gradually and some separating parts emerge among them automatically. As a consequence, data points that belong to the same class are located at a same position, whereas those that belong to different classes are away from one another. Moreover, the experimental results have demonstrated that data points in the test datasets are clustered reasonably and efficiently, and the comparison with other algorithms also provides an indication of the effectiveness of the proposed algorithms.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 13:26:31 GMT" } ]
2008-10-31T00:00:00
[ [ "Li", "Qiang", "" ], [ "He", "Yan", "" ], [ "Jiang", "Jing-ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0810.5516
Valentin Goranko
Wilmari Bekker and Valentin Goranko
Symbolic model checking of tense logics on rational Kripke models
To appear in: Proceedings of the International Conference on Infinity in Logic and Computation ILC'2007, Springer LNAI
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the class of rational Kripke models and study symbolic model checking of the basic tense logic Kt and some extensions of it in models from that class. Rational Kripke models are based on (generally infinite) rational graphs, with vertices labeled by the words in some regular language and transitions recognized by asynchronous two-head finite automata, also known as rational transducers. Every atomic proposition in a rational Kripke model is evaluated in a regular set of states. We show that every formula of Kt has an effectively computable regular extension in every rational Kripke model, and therefore local model checking and global model checking of Kt in rational Kripke models are decidable. These results are lifted to a number of extensions of Kt. We study and partly determine the complexity of the model checking procedures.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 15:59:53 GMT" } ]
2008-10-31T00:00:00
[ [ "Bekker", "Wilmari", "" ], [ "Goranko", "Valentin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0810.5517
Ranko Lazic
Stephane Demri, Ranko Lazic, Arnaud Sangnier
Model checking memoryful linear-time logics over one-counter automata
Substantially revised and extended version of "Model checking freeze LTL over one-counter automata" by the same authors in FoSSaCS 2008
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study complexity of the model-checking problems for LTL with registers (also known as freeze LTL) and for first-order logic with data equality tests over one-counter automata. We consider several classes of one-counter automata (mainly deterministic vs. nondeterministic) and several logical fragments (restriction on the number of registers or variables and on the use of propositional variables for control locations). The logics have the ability to store a counter value and to test it later against the current counter value. We show that model checking over deterministic one-counter automata is PSPACE-complete with infinite and finite accepting runs. By constrast, we prove that model checking freeze LTL in which the until operator is restricted to the eventually operator over nondeterministic one-counter automata is undecidable even if only one register is used and with no propositional variable. As a corollary of our proof, this also holds for first-order logic with data equality tests restricted to two variables. This makes a difference with the facts that several verification problems for one-counter automata are known to be decidable with relatively low complexity, and that finitary satisfiability for the two logics are decidable. Our results pave the way for model-checking memoryful (linear-time) logics over other classes of operational models, such as reversal-bounded counter machines.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 16:04:06 GMT" }, { "version": "v2", "created": "Mon, 18 Jan 2010 18:19:49 GMT" } ]
2010-01-18T00:00:00
[ [ "Demri", "Stephane", "" ], [ "Lazic", "Ranko", "" ], [ "Sangnier", "Arnaud", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0810.5535
Henryk Borowczyk
Henryk Borowczyk
A Combinatorial-Probabilistic Diagnostic Entropy and Information
Sent to IEEE Transactions on Information Theory (september 2008)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new combinatorial-probabilistic diagnostic entropy has been introduced. It describes the pair-wise sum of probabilities of system conditions that have to be distinguished during the diagnosing process. The proposed measure describes the uncertainty of the system conditions, and at the same time complexity of the diagnosis problem. Treating the assumed combinatorial-diagnostic entropy as a primary notion, the information delivered by the symptoms has been defined. The relationships have been derived to facilitate explicit, quantitative assessment of the information of a single symptom as well as that of a symptoms set. It has been proved that the combinatorial-probabilistic information shows the property of additivity. The presented measures are focused on diagnosis problem, but they can be easily applied to other disciplines such as decision theory and classification.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 18:28:18 GMT" } ]
2009-09-29T00:00:00
[ [ "Borowczyk", "Henryk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.5551
Xinjia Chen
Xinjia Chen
A Theory of Truncated Inverse Sampling
31 pages, no figure, revised proofs
null
null
null
math.ST cs.LG math.PR stat.ME stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we have established a new framework of truncated inverse sampling for estimating mean values of non-negative random variables such as binomial, Poisson, hyper-geometrical, and bounded variables. We have derived explicit formulas and computational methods for designing sampling schemes to ensure prescribed levels of precision and confidence for point estimators. Moreover, we have developed interval estimation methods.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 19:52:55 GMT" }, { "version": "v2", "created": "Tue, 11 Nov 2008 02:38:09 GMT" } ]
2013-11-05T00:00:00
[ [ "Chen", "Xinjia", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0810.5573
David Correa Martins Jr
Marcelo Ris, Junior Barrera, David C. Martins Jr
A branch-and-bound feature selection algorithm for U-shaped cost functions
null
null
null
null
cs.CV cs.DS cs.LG
http://creativecommons.org/licenses/by/3.0/
This paper presents the formulation of a combinatorial optimization problem with the following characteristics: i.the search space is the power set of a finite set structured as a Boolean lattice; ii.the cost function forms a U-shaped curve when applied to any lattice chain. This formulation applies for feature selection in the context of pattern recognition. The known approaches for this problem are branch-and-bound algorithms and heuristics, that explore partially the search space. Branch-and-bound algorithms are equivalent to the full search, while heuristics are not. This paper presents a branch-and-bound algorithm that differs from the others known by exploring the lattice structure and the U-shaped chain curves of the search space. The main contribution of this paper is the architecture of this algorithm that is based on the representation and exploration of the search space by new lattice properties proven here. Several experiments, with well known public data, indicate the superiority of the proposed method to SFFS, which is a popular heuristic that gives good results in very short computational time. In all experiments, the proposed method got better or equal results in similar or even smaller computational time.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 20:24:28 GMT" } ]
2008-11-03T00:00:00
[ [ "Ris", "Marcelo", "" ], [ "Barrera", "Junior", "" ], [ "Martins", "David C.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0810.5575
Renat Nuriyev
R. Nuriyev
Detection of parallel steps in programs with arrays
13 pages, 5 figurers
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of detecting of information and logically independent (DILD) steps in programs is a key for equivalent program transformations. Here we are considering the problem of independence of loop iterations, the concentration of massive data processing and hence the most challenge construction for parallelizing. We introduced a separated form of loops when loop's body is a sequence of procedures each of them are used array's elements selected in a previous procedure. We prove that any loop may be algorithmically represented in this form and number of such procedures is invariant. We show that for this form of loop the steps connections are determined with some integer equations and hence the independence problem is algorithmically unsolvable if index expressions are more complex than cubical. We suggest a modification of index semantics that made connection equations trivial and loops iterations can be executed in parallel.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 20:48:49 GMT" } ]
2008-11-03T00:00:00
[ [ "Nuriyev", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0810.5578
Shubha Nabar
Tomas Feder, Shubha U. Nabar, Evimaria Terzi
Anonymizing Graphs
15 pages, 5 figures
null
null
null
cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by recently discovered privacy attacks on social networks, we study the problem of anonymizing the underlying graph of interactions in a social network. We call a graph (k,l)-anonymous if for every node in the graph there exist at least k other nodes that share at least l of its neighbors. We consider two combinatorial problems arising from this notion of anonymity in graphs. More specifically, given an input graph we ask for the minimum number of edges to be added so that the graph becomes (k,l)-anonymous. We define two variants of this minimization problem and study their properties. We show that for certain values of k and l the problems are polynomial-time solvable, while for others they become NP-hard. Approximation algorithms for the latter cases are also given.
[ { "version": "v1", "created": "Thu, 30 Oct 2008 21:12:25 GMT" } ]
2008-11-03T00:00:00
[ [ "Feder", "Tomas", "" ], [ "Nabar", "Shubha U.", "" ], [ "Terzi", "Evimaria", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.5582
Shubha Nabar
Rajeev Motwani, Shubha U. Nabar
Anonymizing Unstructured Data
9 pages, 1 figure
null
null
null
cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the problem of anonymizing datasets in which each individual is associated with a set of items that constitute private information about the individual. Illustrative datasets include market-basket datasets and search engine query logs. We formalize the notion of k-anonymity for set-valued data as a variant of the k-anonymity model for traditional relational datasets. We define an optimization problem that arises from this definition of anonymity and provide O(klogk) and O(1)-approximation algorithms for the same. We demonstrate applicability of our algorithms to the America Online query log dataset.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 19:25:02 GMT" }, { "version": "v2", "created": "Mon, 3 Nov 2008 23:33:20 GMT" } ]
2008-11-04T00:00:00
[ [ "Motwani", "Rajeev", "" ], [ "Nabar", "Shubha U.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0810.5596
Renat Nuriyev
R. Nuriyev
Programming languages with algorithmically parallelizing problem
57 pages, 8 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The study consists of two parts. Objective of the first part is modern language constructions responsible for algorithmically insolvability of parallelizing problem. Second part contains several ways to modify the constructions to make the problem algorithmically solvable
[ { "version": "v1", "created": "Fri, 31 Oct 2008 00:25:15 GMT" } ]
2008-11-03T00:00:00
[ [ "Nuriyev", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0810.5631
Marcus Hutter
Marcus Hutter and Shane Legg
Temporal Difference Updating without a Learning Rate
12 pages, 6 figures
Advances in Neural Information Processing Systems 20 (NIPS 2008) pages 705-712
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive an equation for temporal difference learning from statistical principles. Specifically, we start with the variational principle and then bootstrap to produce an updating rule for discounted state value estimates. The resulting equation is similar to the standard equation for temporal difference learning with eligibility traces, so called TD(lambda), however it lacks the parameter alpha that specifies the learning rate. In the place of this free parameter there is now an equation for the learning rate that is specific to each state transition. We experimentally test this new learning rule against TD(lambda) and find that it offers superior performance in various settings. Finally, we make some preliminary investigations into how to extend our new temporal difference algorithm to reinforcement learning. To do this we combine our update equation with both Watkins' Q(lambda) and Sarsa(lambda) and find that it again offers superior performance without a learning rate parameter.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 07:15:01 GMT" } ]
2008-11-03T00:00:00
[ [ "Hutter", "Marcus", "" ], [ "Legg", "Shane", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0810.5633
Olli Pottonen
Ivan Yu. Mogilnykh, Patric R. J. \"Osterg{\aa}rd, Olli Pottonen, Faina I. Solov'eva
Reconstructing Extended Perfect Binary One-Error-Correcting Codes from Their Minimum Distance Graphs
4 pages. Accepted for publication in IEEE Transactions on Information Theory
IEEE Trans. Inform. Theory 55 (2009) 2622-2625
10.1109/TIT.2009.2018338
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The minimum distance graph of a code has the codewords as vertices and edges exactly when the Hamming distance between two codewords equals the minimum distance of the code. A constructive proof for reconstructibility of an extended perfect binary one-error-correcting code from its minimum distance graph is presented. Consequently, inequivalent such codes have nonisomorphic minimum distance graphs. Moreover, it is shown that the automorphism group of a minimum distance graph is isomorphic to that of the corresponding code.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 07:32:16 GMT" }, { "version": "v2", "created": "Thu, 12 Feb 2009 12:49:11 GMT" } ]
2009-05-31T00:00:00
[ [ "Mogilnykh", "Ivan Yu.", "" ], [ "Östergård", "Patric R. J.", "" ], [ "Pottonen", "Olli", "" ], [ "Solov'eva", "Faina I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.5636
Marcus Hutter
Daniil Ryabko and Marcus Hutter
On the Possibility of Learning in Reactive Environments with Arbitrary Dependence
20 pages
Theoretical Computer Science, 405:3 (2008) pages 274-284
null
IDSIA-08-08
cs.LG cs.AI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of reinforcement learning in which observations may exhibit an arbitrary form of stochastic dependence on past observations and actions, i.e. environments more general than (PO)MDPs. The task for an agent is to attain the best possible asymptotic reward where the true generating environment is unknown but belongs to a known countable family of environments. We find some sufficient conditions on the class of environments under which an agent exists which attains the best asymptotic reward for any environment in the class. We analyze how tight these conditions are and how they relate to different probabilistic assumptions known in reinforcement learning and related fields, such as Markov Decision Processes and mixing conditions.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 07:58:31 GMT" } ]
2009-12-30T00:00:00
[ [ "Ryabko", "Daniil", "" ], [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.5647
Gilles Villard
Gilles Villard (LIP)
Kaltofen's division-free determinant algorithm differentiated for matrix adjoint computation
null
null
null
null
cs.SC cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Kaltofen has proposed a new approach in 1992 for computing matrix determinants without divisions. The algorithm is based on a baby steps/giant steps construction of Krylov subspaces, and computes the determinant as the constant term of a characteristic polynomial. For matrices over an abstract ring, by the results of Baur and Strassen, the determinant algorithm, actually a straight-line program, leads to an algorithm with the same complexity for computing the adjoint of a matrix. However, the latter adjoint algorithm is obtained by the reverse mode of automatic differentiation, hence somehow is not "explicit". We present an alternative (still closely related) algorithm for the adjoint thatcan be implemented directly, we mean without resorting to an automatic transformation. The algorithm is deduced by applying program differentiation techniques "by hand" to Kaltofen's method, and is completely decribed. As subproblem, we study the differentiation of programs that compute minimum polynomials of lineraly generated sequences, and we use a lazy polynomial evaluation mechanism for reducing the cost of Strassen's avoidance of divisions in our case.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 09:43:48 GMT" } ]
2008-11-03T00:00:00
[ [ "Villard", "Gilles", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0810.5663
Markus Mueller
Nihat Ay, Markus Mueller, Arleta Szkola
Effective Complexity and its Relation to Logical Depth
14 pages, 2 figures
IEEE Trans. Inf. Th., Vol. 56/9 pp. 4593-4607 (2010)
10.1109/TIT.2010.2053892
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Effective complexity measures the information content of the regularities of an object. It has been introduced by M. Gell-Mann and S. Lloyd to avoid some of the disadvantages of Kolmogorov complexity, also known as algorithmic information content. In this paper, we give a precise formal definition of effective complexity and rigorous proofs of its basic properties. In particular, we show that incompressible binary strings are effectively simple, and we prove the existence of strings that have effective complexity close to their lengths. Furthermore, we show that effective complexity is related to Bennett's logical depth: If the effective complexity of a string $x$ exceeds a certain explicit threshold then that string must have astronomically large depth; otherwise, the depth can be arbitrarily small.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 11:32:26 GMT" } ]
2010-11-22T00:00:00
[ [ "Ay", "Nihat", "" ], [ "Mueller", "Markus", "" ], [ "Szkola", "Arleta", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0810.5685
Daniel Roche
Mark Giesbrecht and Daniel S. Roche
Interpolation of Shifted-Lacunary Polynomials
22 pages, to appear in Computational Complexity
Computational Complexity, Vol. 19, No 3., pp. 333-354, 2010
10.1007/s00037-010-0294-0
null
cs.SC cs.DS cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a "black box" function to evaluate an unknown rational polynomial f in Q[x] at points modulo a prime p, we exhibit algorithms to compute the representation of the polynomial in the sparsest shifted power basis. That is, we determine the sparsity t, the shift s (a rational), the exponents 0 <= e1 < e2 < ... < et, and the coefficients c1,...,ct in Q\{0} such that f(x) = c1(x-s)^e1+c2(x-s)^e2+...+ct(x-s)^et. The computed sparsity t is absolutely minimal over any shifted power basis. The novelty of our algorithm is that the complexity is polynomial in the (sparse) representation size, and in particular is logarithmic in deg(f). Our method combines previous celebrated results on sparse interpolation and computing sparsest shifts, and provides a way to handle polynomials with extremely high degree which are, in some sense, sparse in information.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 13:35:08 GMT" }, { "version": "v2", "created": "Tue, 4 Nov 2008 00:39:28 GMT" }, { "version": "v3", "created": "Mon, 10 Nov 2008 18:33:23 GMT" }, { "version": "v4", "created": "Thu, 11 Dec 2008 04:05:14 GMT" }, { "version": "v5", "created": "Fri, 4 Dec 2009 06:10:58 GMT" }, { "version": "v6", "created": "Mon, 23 Aug 2010 16:20:07 GMT" } ]
2010-12-06T00:00:00
[ [ "Giesbrecht", "Mark", "" ], [ "Roche", "Daniel S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0810.5717
Mathias Niepert
Mathias Niepert, Dirk Van Gucht and Marc Gyssens
On the Conditional Independence Implication Problem: A Lattice-Theoretic Approach
null
Proceedings of the 24th Conference on Uncertainty in Artificial Intelligence, 2008, pages 435-443
null
null
cs.AI cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A lattice-theoretic framework is introduced that permits the study of the conditional independence (CI) implication problem relative to the class of discrete probability measures. Semi-lattices are associated with CI statements and a finite, sound and complete inference system relative to semi-lattice inclusions is presented. This system is shown to be (1) sound and complete for saturated CI statements, (2) complete for general CI statements, and (3) sound and complete for stable CI statements. These results yield a criterion that can be used to falsify instances of the implication problem and several heuristics are derived that approximate this "lattice-exclusion" criterion in polynomial time. Finally, we provide experimental results that relate our work to results obtained from other existing inference algorithms.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 15:52:27 GMT" } ]
2008-11-03T00:00:00
[ [ "Niepert", "Mathias", "" ], [ "Van Gucht", "Dirk", "" ], [ "Gyssens", "Marc", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0810.5725
Bart Kuijpers
Sofie Haesevoets, Bart Kuijpers
A triangle-based logic for affine-invariant querying of spatial and spatio-temporal data
43 pages, 11 figures
null
null
null
cs.LO cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In spatial databases, incompatibilities often arise due to different choices of origin or unit of measurement (e.g., centimeters versus inches). By representing and querying the data in an affine-invariant manner, we can avoid these incompatibilities. In practice, spatial (resp., spatio-temporal) data is often represented as a finite union of triangles (resp., moving triangles). As two arbitrary triangles are equal up to a unique affinity of the plane, they seem perfect candidates as basic units for an affine-invariant query language. We propose a so-called "triangle logic", a query language that is affine-generic and has triangles as basic elements. We show that this language has the same expressive power as the affine-generic fragment of first-order logic over the reals on triangle databases. We illustrate that the proposed language is simple and intuitive. It can also serve as a first step towards a "moving-triangle logic" for spatio-temporal data.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 16:16:30 GMT" }, { "version": "v2", "created": "Sat, 1 Nov 2008 07:24:39 GMT" } ]
2008-11-03T00:00:00
[ [ "Haesevoets", "Sofie", "" ], [ "Kuijpers", "Bart", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0810.5728
Kousha Etessami
Kousha Etessami, Marta Kwiatkowska, Moshe Y. Vardi, and Mihalis Yannakakis
Multi-Objective Model Checking of Markov Decision Processes
21 pages, 2 figures
Logical Methods in Computer Science, Volume 4, Issue 4 (November 12, 2008) lmcs:990
10.2168/LMCS-4(4:8)2008
null
cs.LO cs.CC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study and provide efficient algorithms for multi-objective model checking problems for Markov Decision Processes (MDPs). Given an MDP, M, and given multiple linear-time (\omega -regular or LTL) properties \varphi\_i, and probabilities r\_i \epsilon [0,1], i=1,...,k, we ask whether there exists a strategy \sigma for the controller such that, for all i, the probability that a trajectory of M controlled by \sigma satisfies \varphi\_i is at least r\_i. We provide an algorithm that decides whether there exists such a strategy and if so produces it, and which runs in time polynomial in the size of the MDP. Such a strategy may require the use of both randomization and memory. We also consider more general multi-objective \omega -regular queries, which we motivate with an application to assume-guarantee compositional reasoning for probabilistic systems. Note that there can be trade-offs between different properties: satisfying property \varphi\_1 with high probability may necessitate satisfying \varphi\_2 with low probability. Viewing this as a multi-objective optimization problem, we want information about the "trade-off curve" or Pareto curve for maximizing the probabilities of different properties. We show that one can compute an approximate Pareto curve with respect to a set of \omega -regular properties in time polynomial in the size of the MDP. Our quantitative upper bounds use LP methods. We also study qualitative multi-objective model checking problems, and we show that these can be analysed by purely graph-theoretic methods, even though the strategies may still require both randomization and memory.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 16:18:14 GMT" }, { "version": "v2", "created": "Tue, 11 Nov 2008 23:50:54 GMT" } ]
2015-07-01T00:00:00
[ [ "Etessami", "Kousha", "" ], [ "Kwiatkowska", "Marta", "" ], [ "Vardi", "Moshe Y.", "" ], [ "Yannakakis", "Mihalis", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0810.5732
Renat Nuriyev
R. Nuriyev
Practical language based on systems of definitions
10 pages, 2 references
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article suggests a description of a system of tables with a set of special lists absorbing a semantics of data and reflects a fullness of data. It shows how their parallel processing can be constructed based on the descriptions. The approach also might be used for definition intermediate targets for data mining and unstructured data processing.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 16:42:45 GMT" } ]
2008-11-03T00:00:00
[ [ "Nuriyev", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0810.5758
Renat Nuriyev
Renat Nuriyev
Non procedural language for parallel programs
20 pages, will be printed in "Programming" magazine of RAS
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Probably building non procedural languages is the most prospective way for parallel programming just because non procedural means no fixed way for execution. The article consists of 3 parts. In first part we consider formal systems for definition a named datasets and studying an expression power of different subclasses. In the second part we consider a complexity of algorithms of building sets by the definitions. In third part we consider a fullness and flexibility of the class of program based data set definitions.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 18:44:38 GMT" } ]
2008-11-03T00:00:00
[ [ "Nuriyev", "Renat", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0810.5763
Pablo Fierens
Pablo Ignacio Fierens
Number of wireless sensors needed to detect a wildfire
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The lack of extensive research in the application of inexpensive wireless sensor nodes for the early detection of wildfires motivated us to investigate the cost of such a network. As a first step, in this paper we present several results which relate the time to detection and the burned area to the number of sensor nodes in the region which is protected. We prove that the probability distribution of the burned area at the moment of detection is approximately exponential, given that some hypotheses hold: the positions of the sensor nodes are independent random variables uniformly distributed and the number of sensor nodes is large. This conclusion depends neither on the number of ignition points nor on the propagation model of the fire.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 19:11:42 GMT" } ]
2008-11-03T00:00:00
[ [ "Fierens", "Pablo Ignacio", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0810.5770
Sergey Loyka
George Levin, Sergey Loyka
From Multi-Keyholes to Measure of Correlation and Power Imbalance in MIMO Channels: Outage Capacity Analysis
accepted by IEEE IT Trans., 2010
null
10.1109/TIT.2011.2133010
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An information-theoretic analysis of a multi-keyhole channel, which includes a number of statistically independent keyholes with possibly different correlation matrices, is given. When the number of keyholes or/and the number of Tx/Rx antennas is large, there is an equivalent Rayleigh-fading channel such that the outage capacities of both channels are asymptotically equal. In the case of a large number of antennas and for a broad class of fading distributions, the instantaneous capacity is shown to be asymptotically Gaussian in distribution, and compact, closed-form expressions for the mean and variance are given. Motivated by the asymptotic analysis, a simple, full-ordering scalar measure of spatial correlation and power imbalance in MIMO channels is introduced, which quantifies the negative impact of these two factors on the outage capacity in a simple and well-tractable way. It does not require the eigenvalue decomposition, and has the full-ordering property. The size-asymptotic results are used to prove Telatar's conjecture for semi-correlated multi-keyhole and Rayleigh channels. Since the keyhole channel model approximates well the relay channel in the amplify-and-forward mode in certain scenarios, these results also apply to the latter
[ { "version": "v1", "created": "Fri, 31 Oct 2008 19:36:50 GMT" }, { "version": "v2", "created": "Fri, 25 Feb 2011 20:12:59 GMT" } ]
2016-11-18T00:00:00
[ [ "Levin", "George", "" ], [ "Loyka", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0037
Martin Dyer
Martin Dyer, Leslie Ann Goldberg and Mark Jerrum
A complexity dichotomy for hypergraph partition functions
21 pages
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the complexity of counting homomorphisms from an $r$-uniform hypergraph $G$ to a symmetric $r$-ary relation $H$. We give a dichotomy theorem for $r>2$, showing for which $H$ this problem is in FP and for which $H$ it is #P-complete. This generalises a theorem of Dyer and Greenhill (2000) for the case $r=2$, which corresponds to counting graph homomorphisms. Our dichotomy theorem extends to the case in which the relation $H$ is weighted, and the goal is to compute the \emph{partition function}, which is the sum of weights of the homomorphisms. This problem is motivated by statistical physics, where it arises as computing the partition function for particle models in which certain combinations of $r$ sites interact symmetrically. In the weighted case, our dichotomy theorem generalises a result of Bulatov and Grohe (2005) for graphs, where $r=2$. When $r=2$, the polynomial time cases of the dichotomy correspond simply to rank-1 weights. Surprisingly, for all $r>2$ the polynomial time cases of the dichotomy have rather more structure. It turns out that the weights must be superimposed on a combinatorial structure defined by solutions of an equation over an Abelian group. Our result also gives a dichotomy for a closely related constraint satisfaction problem.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 22:42:57 GMT" }, { "version": "v2", "created": "Fri, 1 Jan 2010 15:39:33 GMT" } ]
2010-01-04T00:00:00
[ [ "Dyer", "Martin", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Jerrum", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0811.0048
Yi Su
Yi Su and Mihaela van der Schaar
Conjectural Equilibrium in Water-filling Games
29 pages, 7 figures
null
null
null
cs.GT cs.MA
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper considers a non-cooperative game in which competing users sharing a frequency-selective interference channel selfishly optimize their power allocation in order to improve their achievable rates. Previously, it was shown that a user having the knowledge of its opponents' channel state information can make foresighted decisions and substantially improve its performance compared with the case in which it deploys the conventional iterative water-filling algorithm, which does not exploit such knowledge. This paper discusses how a foresighted user can acquire this knowledge by modeling its experienced interference as a function of its own power allocation. To characterize the outcome of the multi-user interaction, the conjectural equilibrium is introduced, and the existence of this equilibrium for the investigated water-filling game is proved. Interestingly, both the Nash equilibrium and the Stackelberg equilibrium are shown to be special cases of the generalization of conjectural equilibrium. We develop practical algorithms to form accurate beliefs and search desirable power allocation strategies. Numerical simulations indicate that a foresighted user without any a priori knowledge of its competitors' private information can effectively learn the required information, and induce the entire system to an operating point that improves both its own achievable rate as well as the rates of the other participants in the water-filling game.
[ { "version": "v1", "created": "Fri, 31 Oct 2008 23:59:07 GMT" } ]
2008-11-04T00:00:00
[ [ "Su", "Yi", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0811.0063
Andrej Dujella
Andrej Dujella
A variant of Wiener's attack on RSA
9 pages
Computing 85 (2009), 77-83
10.1007/s00607-009-0037-8
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wiener's attack is a well-known polynomial-time attack on a RSA cryptosystem with small secret decryption exponent d, which works if d<n^{0.25}, where n=pq is the modulus of the cryptosystem. Namely, in that case, d is the denominator of some convergent p_m/q_m of the continued fraction expansion of e/n, and therefore d can be computed efficiently from the public key (n,e). There are several extensions of Wiener's attack that allow the RSA cryptosystem to be broken when d is a few bits longer than n^{0.25}. They all have the run-time complexity (at least) O(D^2), where d=Dn^{0.25}. Here we propose a new variant of Wiener's attack, which uses results on Diophantine approximations of the form |\alpha - p/q| < c/q^2, and "meet-in-the-middle" variant for testing the candidates (of the form rq_{m+1} + sq_m) for the secret exponent. This decreases the run-time complexity of the attack to O(D log(D)) (with the space complexity O(D)).
[ { "version": "v1", "created": "Sat, 1 Nov 2008 07:08:23 GMT" } ]
2021-08-30T00:00:00
[ [ "Dujella", "Andrej", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0811.0071
Pierre Lescanne
St\'ephane Le Roux (LIP), Pierre Lescanne (LIP), Ren\'e Vestergaard
Conversion/Preference Games
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the concept of Conversion/Preference Games, or CP games for short. CP games generalize the standard notion of strategic games. First we exemplify the use of CP games. Second we formally introduce and define the CP-games formalism. Then we sketch two `real-life' applications, namely a connection between CP games and gene regulation networks, and the use of CP games to formalize implied information in Chinese Wall security. We end with a study of a particular fixed-point construction over CP games and of the resulting existence of equilibria in possibly infinite games.
[ { "version": "v1", "created": "Mon, 3 Nov 2008 08:12:20 GMT" } ]
2008-11-04T00:00:00
[ [ "Roux", "Stéphane Le", "", "LIP" ], [ "Lescanne", "Pierre", "", "LIP" ], [ "Vestergaard", "René", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0811.0077
Deepyaman Maiti
Deepyaman Maiti, Amit Konar
Approximation of a Fractional Order System by an Integer Order Model Using Particle Swarm Optimization Technique
IEEE Sponsored Conference on Computational Intelligence, Control And Computer Vision In Robotics & Automation
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
System identification is a necessity in control theory. Classical control theory usually considers processes with integer order transfer functions. Real processes are usually of fractional order as opposed to the ideal integral order models. A simple and elegant scheme is presented for approximation of such a real world fractional order process by an ideal integral order model. A population of integral order process models is generated and updated by PSO technique, the fitness function being the sum of squared deviations from the set of observations obtained from the actual fractional order process. Results show that the proposed scheme offers a high degree of accuracy.
[ { "version": "v1", "created": "Sat, 1 Nov 2008 10:02:00 GMT" } ]
2008-11-04T00:00:00
[ [ "Maiti", "Deepyaman", "" ], [ "Konar", "Amit", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0811.0078
Deepyaman Maiti
Deepyaman Maiti, Ayan Acharya, Amit Konar
A Swarm Intelligence Based Scheme for Complete and Fault-tolerant Identification of a Dynamical Fractional Order Process
2008 IEEE Region 10 Colloquium and the Third ICIIS, Kharagpur, INDIA. Paper Identification Number 239
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
System identification refers to estimation of process parameters and is a necessity in control theory. Physical systems usually have varying parameters. For such processes, accurate identification is particularly important. Online identification schemes are also needed for designing adaptive controllers. Real processes are usually of fractional order as opposed to the ideal integral order models. In this paper, we propose a simple and elegant scheme of estimating the parameters for such a fractional order process. A population of process models is generated and updated by particle swarm optimization (PSO) technique, the fitness function being the sum of squared deviations from the actual set of observations. Results show that the proposed scheme offers a high degree of accuracy even when the observations are corrupted to a significant degree. Additional schemes to improve the accuracy still further are also proposed and analyzed.
[ { "version": "v1", "created": "Sat, 1 Nov 2008 10:08:20 GMT" } ]
2008-11-04T00:00:00
[ [ "Maiti", "Deepyaman", "" ], [ "Acharya", "Ayan", "" ], [ "Konar", "Amit", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0811.0079
Deepyaman Maiti
Mithun Chakraborty, Deepyaman Maiti, Amit Konar
The Application of Stochastic Optimization Algorithms to the Design of a Fractional-order PID Controller
2008 IEEE Region 10 Colloquium and the Third ICIIS, Kharagpur, INDIA. Paper Identification Number: 396
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Proportional-Integral-Derivative Controller is widely used in industries for process control applications. Fractional-order PID controllers are known to outperform their integer-order counterparts. In this paper, we propose a new technique of fractional-order PID controller synthesis based on peak overshoot and rise-time specifications. Our approach is to construct an objective function, the optimization of which yields a possible solution to the design problem. This objective function is optimized using two popular bio-inspired stochastic search algorithms, namely Particle Swarm Optimization and Differential Evolution. With the help of a suitable example, the superiority of the designed fractional-order PID controller to an integer-order PID controller is affirmed and a comparative study of the efficacy of the two above algorithms in solving the optimization problem is also presented.
[ { "version": "v1", "created": "Sat, 1 Nov 2008 10:11:21 GMT" } ]
2008-11-04T00:00:00
[ [ "Chakraborty", "Mithun", "" ], [ "Maiti", "Deepyaman", "" ], [ "Konar", "Amit", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0811.0080
Deepyaman Maiti
Ayan Acharya, Deepyaman Maiti, Amit Konar, Ramadoss Janarthanan
A Deterministic Model for Analyzing the Dynamics of Ant System Algorithm and Performance Amelioration through a New Pheromone Deposition Approach
4th IEEE International Conference on Information and Automation for Sustainability, 2008
null
10.1109/ICIAFS.2008.4783979
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ant Colony Optimization (ACO) is a metaheuristic for solving difficult discrete optimization problems. This paper presents a deterministic model based on differential equation to analyze the dynamics of basic Ant System algorithm. Traditionally, the deposition of pheromone on different parts of the tour of a particular ant is always kept unvarying. Thus the pheromone concentration remains uniform throughout the entire path of an ant. This article introduces an exponentially increasing pheromone deposition approach by artificial ants to improve the performance of basic Ant System algorithm. The idea here is to introduce an additional attracting force to guide the ants towards destination more easily by constructing an artificial potential field identified by increasing pheromone concentration towards the goal. Apart from carrying out analysis of Ant System dynamics with both traditional and the newly proposed deposition rules, the paper presents an exhaustive set of experiments performed to find out suitable parameter ranges for best performance of Ant System with the proposed deposition approach. Simulations reveal that the proposed deposition rule outperforms the traditional one by a large extent both in terms of solution quality and algorithm convergence. Thus, the contributions of the article can be presented as follows: i) it introduces differential equation and explores a novel method of analyzing the dynamics of ant system algorithms, ii) it initiates an exponentially increasing pheromone deposition approach by artificial ants to improve the performance of algorithm in terms of solution quality and convergence time, iii) exhaustive experimentation performed facilitates the discovery of an algebraic relationship between the parameter set of the algorithm and feature of the problem environment.
[ { "version": "v1", "created": "Sat, 1 Nov 2008 10:19:10 GMT" } ]
2016-11-15T00:00:00
[ [ "Acharya", "Ayan", "" ], [ "Maiti", "Deepyaman", "" ], [ "Konar", "Amit", "" ], [ "Janarthanan", "Ramadoss", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0811.0083
Deepyaman Maiti
Deepyaman Maiti, Ayan Acharya, Mithun Chakraborty, Amit Konar, Ramadoss Janarthanan
Tuning PID and FOPID Controllers using the Integral Time Absolute Error Criterion
4th IEEE International Conference on Information and Automation for Sustainability, 2008
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Particle swarm optimization (PSO) is extensively used for real parameter optimization in diverse fields of study. This paper describes an application of PSO to the problem of designing a fractional-order proportional-integral-derivative (FOPID) controller whose parameters comprise proportionality constant, integral constant, derivative constant, integral order (lambda) and derivative order (delta). The presence of five optimizable parameters makes the task of designing a FOPID controller more challenging than conventional PID controller design. Our design method focuses on minimizing the Integral Time Absolute Error (ITAE) criterion. The digital realization of the deigned system utilizes the Tustin operator-based continued fraction expansion scheme. We carry out a simulation that illustrates the effectiveness of the proposed approach especially for realizing fractional-order plants. This paper also attempts to study the behavior of fractional PID controller vis-a-vis that of its integer order counterpart and demonstrates the superiority of the former to the latter.
[ { "version": "v1", "created": "Sat, 1 Nov 2008 10:25:08 GMT" } ]
2008-11-04T00:00:00
[ [ "Maiti", "Deepyaman", "" ], [ "Acharya", "Ayan", "" ], [ "Chakraborty", "Mithun", "" ], [ "Konar", "Amit", "" ], [ "Janarthanan", "Ramadoss", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0811.0113
Andr\'e C. R. Martins
Andre C. R. Martins
A Bayesian Framework for Opinion Updates
20 pages; major expansion and detailing
null
null
In Liu Yijun and Zhou Tao, editors, Social Physics Catena (No.3), pages 146-157. Science Press, Beijing
physics.soc-ph cs.MA nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Opinion Dynamics lacks a theoretical basis. In this article, I propose to use a decision-theoretic framework, based on the updating of subjective probabilities, as that basis. We will see we get a basic tool for a better understanding of the interaction between the agents in Opinion Dynamics problems and for creating new models. I will review the few existing applications of Bayesian update rules to both discrete and continuous opinion problems and show that several traditional models can be obtained as special cases or approximations from these Bayesian models. The empirical basis and useful properties of the framework will be discussed and examples of how the framework can be used to describe different problems given.
[ { "version": "v1", "created": "Sat, 1 Nov 2008 20:22:18 GMT" }, { "version": "v2", "created": "Mon, 12 Jul 2010 03:40:49 GMT" } ]
2012-11-21T00:00:00
[ [ "Martins", "Andre C. R.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0811.0123
Mika Turkia
Mika Turkia
A computational model of affects
A pre-print version; final version published in D. Dietrich et al. (Eds.): Simulating the Mind. Springer 2009, see http://www.springer.com/springerwiennewyork/computer+science/book/978-3-211-09450-1 . 7 pages, 2 figures
Dietrich, D.; Fodor, G.; Zucker, G.; Bruckner, D. (Eds.): Simulating the Mind. A Technical Neuropsychoanalytical Approach. Springer 2009, pp. 277-289
null
null
cs.AI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article provides a simple logical structure, in which affective concepts (i.e. concepts related to emotions and feelings) can be defined. The set of affects defined is similar to the set of emotions covered in the OCC model (Ortony A., Collins A., and Clore G. L.: The Cognitive Structure of Emotions. Cambridge University Press, 1988), but the model presented in this article is fully computationally defined.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 03:38:59 GMT" }, { "version": "v2", "created": "Wed, 12 Nov 2008 20:38:01 GMT" } ]
2008-11-12T00:00:00
[ [ "Turkia", "Mika", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0811.0131
Deepyaman Maiti
Ayan Acharya, Deepyaman Maiti, Aritra Banerjee, Amit Konar
Balancing Exploration and Exploitation by an Elitist Ant System with Exponential Pheromone Deposition Rule
2008 IEEE Region 10 Colloquium and the Third ICIIS, Kharagpur, INDIA. Paper ID: 250
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents an exponential pheromone deposition rule to modify the basic ant system algorithm which employs constant deposition rule. A stability analysis using differential equation is carried out to find out the values of parameters that make the ant system dynamics stable for both kinds of deposition rule. A roadmap of connected cities is chosen as the problem environment where the shortest route between two given cities is required to be discovered. Simulations performed with both forms of deposition approach using Elitist Ant System model reveal that the exponential deposition approach outperforms the classical one by a large extent. Exhaustive experiments are also carried out to find out the optimum setting of different controlling parameters for exponential deposition approach and an empirical relationship between the major controlling parameters of the algorithm and some features of problem environment.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 06:07:34 GMT" } ]
2008-11-04T00:00:00
[ [ "Acharya", "Ayan", "" ], [ "Maiti", "Deepyaman", "" ], [ "Banerjee", "Aritra", "" ], [ "Konar", "Amit", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0811.0133
Deepyaman Maiti
Mithun Chakraborty, Deepyaman Maiti, Amit Konar, Ramadoss Janarthanan
A Study of the Grunwald-Letnikov Definition for Minimizing the Effects of Random Noise on Fractional Order Differential Equations
4th IEEE International Conference on Information and Automation for Sustainability, 2008
null
10.1109/ICIAFS.2008.4783931
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Of the many definitions for fractional order differintegral, the Grunwald-Letnikov definition is arguably the most important one. The necessity of this definition for the description and analysis of fractional order systems cannot be overstated. Unfortunately, the Fractional Order Differential Equation (FODE) describing such a systems, in its original form, highly sensitive to the effects of random noise components inevitable in a natural environment. Thus direct application of the definition in a real-life problem can yield erroneous results. In this article, we perform an in-depth mathematical analysis the Grunwald-Letnikov definition in depth and, as far as we know, we are the first to do so. Based on our analysis, we present a transformation scheme which will allow us to accurately analyze generalized fractional order systems in presence of significant quantities of random errors. Finally, by a simple experiment, we demonstrate the high degree of robustness to noise offered by the said transformation and thus validate our scheme.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 06:16:49 GMT" } ]
2016-11-15T00:00:00
[ [ "Chakraborty", "Mithun", "" ], [ "Maiti", "Deepyaman", "" ], [ "Konar", "Amit", "" ], [ "Janarthanan", "Ramadoss", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0811.0134
Deepyaman Maiti
Deepyaman Maiti, Ayan Acharya, Amit Konar, Janarthanan Ramadoss
A Novel Parser Design Algorithm Based on Artificial Ants
4th IEEE International Conference on Information and Automation for Sustainability, 2008
null
10.1109/ICIAFS.2008.4783925
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents a unique design for a parser using the Ant Colony Optimization algorithm. The paper implements the intuitive thought process of human mind through the activities of artificial ants. The scheme presented here uses a bottom-up approach and the parsing program can directly use ambiguous or redundant grammars. We allocate a node corresponding to each production rule present in the given grammar. Each node is connected to all other nodes (representing other production rules), thereby establishing a completely connected graph susceptible to the movement of artificial ants. Each ant tries to modify this sentential form by the production rule present in the node and upgrades its position until the sentential form reduces to the start symbol S. Successful ants deposit pheromone on the links that they have traversed through. Eventually, the optimum path is discovered by the links carrying maximum amount of pheromone concentration. The design is simple, versatile, robust and effective and obviates the calculation of the above mentioned sets and precedence relation tables. Further advantages of our scheme lie in i) ascertaining whether a given string belongs to the language represented by the grammar, and ii) finding out the shortest possible path from the given string to the start symbol S in case multiple routes exist.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 06:22:55 GMT" } ]
2016-11-15T00:00:00
[ [ "Maiti", "Deepyaman", "" ], [ "Acharya", "Ayan", "" ], [ "Konar", "Amit", "" ], [ "Ramadoss", "Janarthanan", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0811.0135
Deepyaman Maiti
Deepyaman Maiti, Ayan Acharya, R. Janarthanan, Amit Konar
Complete Identification of a Dynamic Fractional Order System Under Non-ideal Conditions Using Fractional Differintegral Definitions
16th IEEE International Conference on Advanced Computing and Communication, 2008
null
10.1109/ADCOM.2008.4760462
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This contribution deals with identification of fractional-order dynamical systems. System identification, which refers to estimation of process parameters, is a necessity in control theory. Real processes are usually of fractional order as opposed to the ideal integral order models. A simple and elegant scheme of estimating the parameters for such a fractional order process is proposed. This method employs fractional calculus theory to find equations relating the parameters that are to be estimated, and then estimates the process parameters after solving the simultaneous equations. The data used for the calculations are intentionally corrupted to simulate real-life conditions. Results show that the proposed scheme offers a very high degree of accuracy even for erroneous data.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 06:26:04 GMT" } ]
2016-11-15T00:00:00
[ [ "Maiti", "Deepyaman", "" ], [ "Acharya", "Ayan", "" ], [ "Janarthanan", "R.", "" ], [ "Konar", "Amit", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0811.0136
Deepyaman Maiti
Ayan Acharya, Deepyaman Maiti, Aritra Banerjee, R. Janarthanan, Amit Konar
Extension of Max-Min Ant System with Exponential Pheromone Deposition Rule
16th IEEE International Conference on Advanced Computing and Communication, 2008
null
10.1109/ADCOM.2008.4760419
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents an exponential pheromone deposition approach to improve the performance of classical Ant System algorithm which employs uniform deposition rule. A simplified analysis using differential equations is carried out to study the stability of basic ant system dynamics with both exponential and constant deposition rules. A roadmap of connected cities, where the shortest path between two specified cities are to be found out, is taken as a platform to compare Max-Min Ant System model (an improved and popular model of Ant System algorithm) with exponential and constant deposition rules. Extensive simulations are performed to find the best parameter settings for non-uniform deposition approach and experiments with these parameter settings revealed that the above approach outstripped the traditional one by a large extent in terms of both solution quality and convergence time.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 06:28:50 GMT" } ]
2016-11-15T00:00:00
[ [ "Acharya", "Ayan", "" ], [ "Maiti", "Deepyaman", "" ], [ "Banerjee", "Aritra", "" ], [ "Janarthanan", "R.", "" ], [ "Konar", "Amit", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0811.0137
Deepyaman Maiti
Deepyaman Maiti, Mithun Chakraborty, Amit Konar
A Novel Approach for Complete Identification of Dynamic Fractional Order Systems Using Stochastic Optimization Algorithms and Fractional Calculus
5th IEEE International Conference on Electrical & Computer Engineering, 2008
null
10.1109/ICECE.2008.4769333
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This contribution deals with identification of fractional-order dynamical systems. System identification, which refers to estimation of process parameters, is a necessity in control theory. Real processes are usually of fractional order as opposed to the ideal integral order models. A simple and elegant scheme of estimating the parameters for such a fractional order process is proposed. This method employs fractional calculus theory to find equations relating the parameters that are to be estimated, and then estimates the process parameters after solving the simultaneous equations. The said simultaneous equations are generated and updated using particle swarm optimization (PSO) technique, the fitness function being the sum of squared deviations from the actual set of observations. The data used for the calculations are intentionally corrupted to simulate real-life conditions. Results show that the proposed scheme offers a very high degree of accuracy even for erroneous data.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 06:31:15 GMT" } ]
2016-11-15T00:00:00
[ [ "Maiti", "Deepyaman", "" ], [ "Chakraborty", "Mithun", "" ], [ "Konar", "Amit", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0811.0139
Stefan Jaeger
Stefan Jaeger
Entropy, Perception, and Relativity
null
null
null
LAMP-TR-131/CAR-TR-1012/CS-TR-4799/UMIACS-TR-2006-20
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, I expand Shannon's definition of entropy into a new form of entropy that allows integration of information from different random events. Shannon's notion of entropy is a special case of my more general definition of entropy. I define probability using a so-called performance function, which is de facto an exponential distribution. Assuming that my general notion of entropy reflects the true uncertainty about a probabilistic event, I understand that our perceived uncertainty differs. I claim that our perception is the result of two opposing forces similar to the two famous antagonists in Chinese philosophy: Yin and Yang. Based on this idea, I show that our perceived uncertainty matches the true uncertainty in points determined by the golden ratio. I demonstrate that the well-known sigmoid function, which we typically employ in artificial neural networks as a non-linear threshold function, describes the actual performance. Furthermore, I provide a motivation for the time dilation in Einstein's Special Relativity, basically claiming that although time dilation conforms with our perception, it does not correspond to reality. At the end of the paper, I show how to apply this theoretical framework to practical applications. I present recognition rates for a pattern recognition problem, and also propose a network architecture that can take advantage of general entropy to solve complex decision problems.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 08:02:43 GMT" } ]
2008-11-04T00:00:00
[ [ "Jaeger", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0811.0146
Alain Lifchitz
Alain Lifchitz (LIP6), Sandra Jhean-Larose (LPC), Guy Denhi\`ere (LPC)
Effect of Tuned Parameters on a LSA MCQ Answering Model
9 pages
Behavior Research Methods, 41 (4), p. 1201-1209, November 2009
10.3758/BRM.41.4.1201
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the current state of a work in progress, whose objective is to better understand the effects of factors that significantly influence the performance of Latent Semantic Analysis (LSA). A difficult task, which consists in answering (French) biology Multiple Choice Questions, is used to test the semantic properties of the truncated singular space and to study the relative influence of main parameters. A dedicated software has been designed to fine tune the LSA semantic space for the Multiple Choice Questions task. With optimal parameters, the performances of our simple model are quite surprisingly equal or superior to those of 7th and 8th grades students. This indicates that semantic spaces were quite good despite their low dimensions and the small sizes of training data sets. Besides, we present an original entropy global weighting of answers' terms of each question of the Multiple Choice Questions which was necessary to achieve the model's success.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 09:21:40 GMT" }, { "version": "v2", "created": "Mon, 17 Nov 2008 19:54:50 GMT" }, { "version": "v3", "created": "Thu, 14 May 2009 12:51:44 GMT" } ]
2009-12-10T00:00:00
[ [ "Lifchitz", "Alain", "", "LIP6" ], [ "Jhean-Larose", "Sandra", "", "LPC" ], [ "Denhière", "Guy", "", "LPC" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0811.0152
Lianlin Li Dr
Lianlin Li, Yin Xiang and Fang Li
Theoretical Analysis of Compressive Sensing via Random Filter
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the theoretical analysis of compressive sensing via random filter, firstly outlined by J. Romberg [compressive sensing by random convolution, submitted to SIAM Journal on Imaging Science on July 9, 2008], has been refined or generalized to the design of general random filter used for compressive sensing. This universal CS measurement consists of two parts: one is from the convolution of unknown signal with a random waveform followed by random time-domain subsampling; the other is from the directly time-domain subsampling of the unknown signal. It has been shown that the proposed approach is a universally efficient data acquisition strategy, which means that the n-dimensional signal which is S sparse in any sparse representation can be exactly recovered from Slogn measurements with overwhelming probability.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 10:43:32 GMT" } ]
2008-11-04T00:00:00
[ [ "Li", "Lianlin", "" ], [ "Xiang", "Yin", "" ], [ "Li", "Fang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0166
David Monniaux
David Monniaux (VERIMAG - Imag)
Automatic Modular Abstractions for Linear Constraints
null
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method for automatically generating abstract transformers for static analysis by abstract interpretation. The method focuses on linear constraints on programs operating on rational, real or floating-point variables and containing linear assignments and tests. In addition to loop-free code, the same method also applies for obtaining least fixed points as functions of the precondition, which permits the analysis of loops and recursive functions. Our algorithms are based on new quantifier elimination and symbolic manipulation techniques. Given the specification of an abstract domain, and a program block, our method automatically outputs an implementation of the corresponding abstract transformer. It is thus a form of program transformation. The motivation of our work is data-flow synchronous programming languages, used for building control-command embedded systems, but it also applies to imperative and functional programming.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 14:47:44 GMT" } ]
2008-11-04T00:00:00
[ [ "Monniaux", "David", "", "VERIMAG - Imag" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0811.0174
Yaming Yu
Yaming Yu
A Bit of Information Theory, and the Data Augmentation Algorithm Converges
null
IEEE Transactions on Information Theory 54 (2008) 5186--5188
10.1109/TIT.2008.929918
null
cs.IT math.IT stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The data augmentation (DA) algorithm is a simple and powerful tool in statistical computing. In this note basic information theory is used to prove a nontrivial convergence theorem for the DA algorithm.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 16:22:53 GMT" } ]
2009-09-12T00:00:00
[ [ "Yu", "Yaming", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.CO", "description": "Algorithms, Simulation, Visualization", "span": "(Computation)" } ]
0811.0196
Ning Chen
Ning Chen and Zhiyuan Yan
Reduced-Complexity Reed--Solomon Decoders Based on Cyclotomic FFTs
15 pages, shortened version submitted to IEEE Signal Processing Letters
null
10.1109/LSP.2009.2014292
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we reduce the computational complexities of partial and dual partial cyclotomic FFTs (CFFTs), which are discrete Fourier transforms where spectral and temporal components are constrained, based on their properties as well as a common subexpression elimination algorithm. Our partial CFFTs achieve smaller computational complexities than previously proposed partial CFFTs. Utilizing our CFFTs in both transform- and time-domain Reed--Solomon decoders, we achieve significant complexity reductions.
[ { "version": "v1", "created": "Sun, 2 Nov 2008 22:46:29 GMT" } ]
2009-11-13T00:00:00
[ [ "Chen", "Ning", "" ], [ "Yan", "Zhiyuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0210
Xudong Ma
Xudong Ma
Novel Blind Signal Classification Method Based on Data Compression
Camera ready version, accepted for publication in Proc. the 6th International Conference on Information Technology : New Generations, ITNG 2009, Las Vegas, Nevada, USA. Typos in the reference list have been fixed
Proceeding of the 6th International Conference on Information Technology : New Generations, Las Vegas, Nevada, April 27-29, 2009
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a novel algorithm for signal classification problems. We consider a non-stationary random signal, where samples can be classified into several different classes, and samples in each class are identically independently distributed with an unknown probability distribution. The problem to be solved is to estimate the probability distributions of the classes and the correct membership of the samples to the classes. We propose a signal classification method based on the data compression principle that the accurate estimation in the classification problems induces the optimal signal models for data compression. The method formulates the classification problem as an optimization problem, where a so called {"classification gain"} is maximized. In order to circumvent the difficulties in integer optimization, we propose a continuous relaxation based algorithm. It is proven in this paper that asymptotically vanishing optimality loss is incurred by the continuous relaxation. We show by simulation results that the proposed algorithm is effective, robust and has low computational complexity. The proposed algorithm can be applied to solve various multimedia signal segmentation, analysis, and pattern recognition problems.
[ { "version": "v1", "created": "Mon, 3 Nov 2008 02:47:37 GMT" }, { "version": "v2", "created": "Mon, 2 Mar 2009 20:38:09 GMT" } ]
2009-03-02T00:00:00
[ [ "Ma", "Xudong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0241
Xiaochuan Zhao
P. Ma (1), W. Wang (1), X. Zhao (1) and K. Zheng (1) ((1) Beijing University of Posts and Telecommunications, Beijing, China)
Joint Transmitter-Receiver Design for the Downlink Multiuser Spatial Multiplexing MIMO System
5 pages, 3 figures, Appeared in IEEE ICC'08 WCS
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a joint transmitter-receiver design to minimize the weighted sum power under the post-processing signal-to-interference-and-noise ratio (post-SINR) constraints for all subchannels. Simulation results demonstrate that the algorithm can not only satisfy the post-SINR constraints but also easily adjust the power distribution among the users by changing the weights accordingly. Hence the algorithm can be used to alleviates the adjacent cell interference by reducing the transmitting power to the edge users without performance penalty.
[ { "version": "v1", "created": "Mon, 3 Nov 2008 08:15:32 GMT" }, { "version": "v2", "created": "Tue, 4 Nov 2008 07:15:30 GMT" } ]
2009-09-29T00:00:00
[ [ "Ma", "P.", "" ], [ "Wang", "W.", "" ], [ "Zhao", "X.", "" ], [ "Zheng", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0254
Masud Hasan
Muhammad Abdullah Adnan and Masud Hasan
Characterizing Graphs of Zonohedra
13 pages, 5 figures
null
null
null
cs.CG cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A classic theorem by Steinitz states that a graph G is realizable by a convex polyhedron if and only if G is 3-connected planar. Zonohedra are an important subclass of convex polyhedra having the property that the faces of a zonohedron are parallelograms and are in parallel pairs. In this paper we give characterization of graphs of zonohedra. We also give a linear time algorithm to recognize such a graph. In our quest for finding the algorithm, we prove that in a zonohedron P both the number of zones and the number of faces in each zone is O(square root{n}), where n is the number of vertices of P.
[ { "version": "v1", "created": "Mon, 3 Nov 2008 10:19:10 GMT" } ]
2008-11-04T00:00:00
[ [ "Adnan", "Muhammad Abdullah", "" ], [ "Hasan", "Masud", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0811.0273
Vinay Joseph
Vinod Sharma, Utpal Mukherji and Vinay Joseph
Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes
Keywords: Optimal energy management policies, energy harvesting, sensor networks, MAC protocols
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study sensor networks with energy harvesting nodes. The generated energy at a node can be stored in a buffer. A sensor node periodically senses a random field and generates a packet. These packets are stored in a queue and transmitted using the energy available at that time at the node. For such networks we develop efficient energy management policies. First, for a single node, we obtain policies that are throughput optimal, i.e., the data queue stays stable for the largest possible data rate. Next we obtain energy management policies which minimize the mean delay in the queue. We also compare performance of several easily implementable suboptimal policies. A greedy policy is identified which, in low SNR regime, is throughput optimal and also minimizes mean delay. Next using the results for a single node, we develop efficient MAC policies.
[ { "version": "v1", "created": "Mon, 3 Nov 2008 12:05:01 GMT" } ]
2008-11-04T00:00:00
[ [ "Sharma", "Vinod", "" ], [ "Mukherji", "Utpal", "" ], [ "Joseph", "Vinay", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0811.0285
Brijesh Rai Kumar
Brijesh Kumar Rai, Bikash Kumar Dey, and Abhay Karandikar
Some results on communicating the sum of sources over a network
5 pages, 3 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of communicating the sum of $m$ sources to $n$ terminals in a directed acyclic network. Recently, it was shown that for a network of unit capacity links with either $m=2$ or $n=2$, the sum of the sources can be communicated to the terminals if and only if every source-terminal pair is connected in the network. We show in this paper that for any finite set of primes, there exists a network where the sum of the sources can be communicated to the terminals only over finite fields of characteristic belonging to that set. As a corollary, this gives networks where the sum can not be communicated over any finite field even though every source is connected to every terminal.
[ { "version": "v1", "created": "Mon, 3 Nov 2008 12:56:44 GMT" } ]
2008-11-04T00:00:00
[ [ "Rai", "Brijesh Kumar", "" ], [ "Dey", "Bikash Kumar", "" ], [ "Karandikar", "Abhay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0310
Fadi Badra
Fadi Badra (INRIA Lorraine - LORIA), Mathieu D'Aquin (KMI), Jean Lieber (INRIA Lorraine - LORIA), Thomas Meilender (INRIA Lorraine - LORIA)
Edhibou: a Customizable Interface for Decision Support in a Semantic Portal
ISWC (2008)
null
null
null
cs.AI cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Semantic Web is becoming more and more a reality, as the required technologies have reached an appropriate level of maturity. However, at this stage, it is important to provide tools facilitating the use and deployment of these technologies by end-users. In this paper, we describe EdHibou, an automatically generated, ontology-based graphical user interface that integrates in a semantic portal. The particularity of EdHibou is that it makes use of OWL reasoning capabilities to provide intelligent features, such as decision support, upon the underlying ontology. We present an application of EdHibou to medical decision support based on a formalization of clinical guidelines in OWL and show how it can be customized thanks to an ontology of graphical components.
[ { "version": "v1", "created": "Mon, 3 Nov 2008 14:49:44 GMT" } ]
2008-11-04T00:00:00
[ [ "Badra", "Fadi", "", "INRIA Lorraine - LORIA" ], [ "D'Aquin", "Mathieu", "", "KMI" ], [ "Lieber", "Jean", "", "INRIA Lorraine - LORIA" ], [ "Meilender", "Thomas", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0811.0325
Jasper Goseling
Jasper Goseling and Jos. H. Weber
Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks
null
Proceedings of the Twenty-ninth Symposium on Information Theory in the Benelux (ISBN: 978-90-9023135-8), Leuven, Belgium, pp. 85-91, May 29-30, 2008
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the maximum possible energy benefit of network coding for multiple unicast on wireless networks is at least 3. This improves the previously known lower bound of 2.4 from [1].
[ { "version": "v1", "created": "Mon, 3 Nov 2008 16:14:36 GMT" } ]
2008-11-04T00:00:00
[ [ "Goseling", "Jasper", "" ], [ "Weber", "Jos. H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0335
Sylvie Saget
Sylvie Saget, Francois Legras, Gilles Coppin
Cooperative interface of a swarm of UAVs
First Conference on Humans Operating Unmanned Systems (HUMOUS-08), Brest : France (2008)
null
null
null
cs.AI cs.HC cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
After presenting the broad context of authority sharing, we outline how introducing more natural interaction in the design of the ground operator interface of UV systems should help in allowing a single operator to manage the complexity of his/her task. Introducing new modalities is one one of the means in the realization of our vision of next- generation GOI. A more fundamental aspect resides in the interaction manager which should help balance the workload of the operator between mission and interaction, notably by applying a multi-strategy approach to generation and interpretation. We intend to apply these principles to the context of the Smaart prototype, and in this perspective, we illustrate how to characterize the workload associated with a particular operational situation.
[ { "version": "v1", "created": "Mon, 3 Nov 2008 16:54:10 GMT" } ]
2009-09-29T00:00:00
[ [ "Saget", "Sylvie", "" ], [ "Legras", "Francois", "" ], [ "Coppin", "Gilles", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0811.0340
Patricia Gautier
Alain Lelu (LASELDI), Martine Cadot, Pascal Cuxac (INIST)
Document stream clustering: experimenting an incremental algorithm and AR-based tools for highlighting dynamic trends
null
International Workshop on Webometrics, Informetrics and Scientometrics & Seventh COLLNET Meeting, France (2006)
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address here two major challenges presented by dynamic data mining: 1) the stability challenge: we have implemented a rigorous incremental density-based clustering algorithm, independent from any initial conditions and ordering of the data-vectors stream, 2) the cognitive challenge: we have implemented a stringent selection process of association rules between clusters at time t-1 and time t for directly generating the main conclusions about the dynamics of a data-stream. We illustrate these points with an application to a two years and 2600 documents scientific information database.
[ { "version": "v1", "created": "Mon, 3 Nov 2008 16:56:51 GMT" } ]
2008-11-04T00:00:00
[ [ "Lelu", "Alain", "", "LASELDI" ], [ "Cadot", "Martine", "", "INIST" ], [ "Cuxac", "Pascal", "", "INIST" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0811.0359
Jos de Bruijn Jos de Bruijn
Jos de Bruijn, Thomas Eiter, Axel Polleres, and Hans Tompits
Embedding Non-Ground Logic Programs into Autoepistemic Logic for Knowledge Base Combination
52 pages, submitted
null
null
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the context of the Semantic Web, several approaches to the combination of ontologies, given in terms of theories of classical first-order logic and rule bases, have been proposed. They either cast rules into classical logic or limit the interaction between rules and ontologies. Autoepistemic logic (AEL) is an attractive formalism which allows to overcome these limitations, by serving as a uniform host language to embed ontologies and nonmonotonic logic programs into it. For the latter, so far only the propositional setting has been considered. In this paper, we present three embeddings of normal and three embeddings of disjunctive non-ground logic programs under the stable model semantics into first-order AEL. While the embeddings all correspond with respect to objective ground atoms, differences arise when considering non-atomic formulas and combinations with first-order theories. We compare the embeddings with respect to stable expansions and autoepistemic consequences, considering the embeddings by themselves, as well as combinations with classical theories. Our results reveal differences and correspondences of the embeddings and provide useful guidance in the choice of a particular embedding for knowledge combination.
[ { "version": "v1", "created": "Mon, 3 Nov 2008 18:42:01 GMT" }, { "version": "v2", "created": "Fri, 30 Oct 2009 13:57:07 GMT" }, { "version": "v3", "created": "Fri, 11 Jun 2010 06:38:32 GMT" } ]
2010-06-14T00:00:00
[ [ "de Bruijn", "Jos", "" ], [ "Eiter", "Thomas", "" ], [ "Polleres", "Axel", "" ], [ "Tompits", "Hans", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0811.0381
Gabriel Istrate
Gabriel Istrate
On the dynamics of Social Balance on general networks (with an application to XOR-SAT)
null
Fundamenta Informaticae, 91 (2), pp. 341-356, 2009.
null
null
cs.DM math.CO math.PR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study nondeterministic and probabilistic versions of a discrete dynamical system (due to T. Antal, P. L. Krapivsky, and S. Redner) inspired by Heider's social balance theory. We investigate the convergence time of this dynamics on several classes of graphs. Our contributions include: 1. We point out the connection between the triad dynamics and a generalization of annihilating walks to hypergraphs. In particular, this connection allows us to completely characterize the recurrent states in graphs where each edge belongs to at most two triangles. 2. We also solve the case of hypergraphs that do not contain edges consisting of one or two vertices. 3. We show that on the so-called "triadic cycle" graph, the convergence time is linear. 4. We obtain a cubic upper bound on the convergence time on 2-regular triadic simplexes G. This bound can be further improved to a quantity that depends on the Cheeger constant of G. In particular this provides some rigorous counterparts to previous experimental observations. We also point out an application to the analysis of the random walk algorithm on certain instances of the 3-XOR-SAT problem.
[ { "version": "v1", "created": "Mon, 3 Nov 2008 20:19:57 GMT" } ]
2010-03-18T00:00:00
[ [ "Istrate", "Gabriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0811.0405
Bernardo Huberman
Gabor Szabo and Bernardo A. Huberman
Predicting the popularity of online content
null
null
null
null
cs.CY cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a method for accurately predicting the long time popularity of online content from early measurements of user access. Using two content sharing portals, Youtube and Digg, we show that by modeling the accrual of views and votes on content offered by these services we can predict the long-term dynamics of individual submissions from initial data. In the case of Digg, measuring access to given stories during the first two hours allows us to forecast their popularity 30 days ahead with remarkable accuracy, while downloads of Youtube videos need to be followed for 10 days to attain the same performance. The differing time scales of the predictions are shown to be due to differences in how content is consumed on the two portals: Digg stories quickly become outdated, while Youtube videos are still found long after they are initially submitted to the portal. We show that predictions are more accurate for submissions for which attention decays quickly, whereas predictions for evergreen content will be prone to larger errors.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 05:38:58 GMT" } ]
2008-11-06T00:00:00
[ [ "Szabo", "Gabor", "" ], [ "Huberman", "Bernardo A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0811.0413
Xiaochuan Zhao
Pengfei Ma (1), Xiaochuan Zhao (1), Mugen Peng (1), Wenbo Wang (1) ((1) Beijing University of Posts and Telecommunications, Beijing, China)
Robust Linear Processing for Downlink Multiuser MIMO System With Imperfectly Known Channel
5 pages, 4 figures, Appeared in IEEE WCNC'08
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a roust downlink multiuser MIMO scheme that exploits the channel mean and antenna correlations to alleviate the performance penalty due to the mismatch between the true and estimated CSI.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 02:21:40 GMT" } ]
2008-11-05T00:00:00
[ [ "Ma", "Pengfei", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Zhao", "Xiaochuan", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Peng", "Mugen", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Wang", "Wenbo", "", "Beijing University of Posts and Telecommunications, Beijing, China" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0417
Xiaochuan Zhao
Xiaochuan Zhao (1), Tao Peng (1) and Wenbo Wang (1) ((1) Beijing University of Posts and Telecommunications, Beijing, China)
Parametric Channel Estimation by Exploiting Hopping Pilots in Uplink OFDMA
5 pages, 3 figures, Appeared in IEEE PIMRC'08
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a parametric channel estimation algorithm applicable to uplink of OFDMA systems with pseudo-random subchannelization. It exploits the hopping pilots to facilitate ESPRIT to estimate the delay subspace of the multipath fading channel, and utilizes the global pilot tones to interpolate on data subcarriers. Hence, it outperforms the traditional local channel interpolators considerably.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 03:04:47 GMT" } ]
2008-11-05T00:00:00
[ [ "Zhao", "Xiaochuan", "" ], [ "Peng", "Tao", "" ], [ "Wang", "Wenbo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0419
Xiaochuan Zhao
Xiaochuan Zhao (1), Tao Peng (1), Ming Yang (1) and Wenbo Wang (1) ((1) Beijing University of Posts and Telecommunications, Beijing, China)
Doppler Spread Estimation by Subspace Tracking for OFDM Systems
5 pages, 3 figures, To appear in IEEE GLOBECOM'08
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a novel maximum Doppler spread estimation algorithm for OFDM systems with the comb-type pilot pattern. By tracking the drifting delay subspace of the multipath channel, the time correlation function is measured at a high accuracy, which accordingly improves the estimation accuracy of the maximum Doppler spread considerably.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 03:30:20 GMT" } ]
2008-11-05T00:00:00
[ [ "Zhao", "Xiaochuan", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Peng", "Tao", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Yang", "Ming", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Wang", "Wenbo", "", "Beijing University of Posts and Telecommunications, Beijing, China" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0430
Xiaochuan Zhao
Xiaochuan Zhao (1), Tao Peng (1), Ming Yang (1) and Wenbo Wang (1) ((1) Beijing University of Posts and Telecommunications, Beijing, China)
An Analysis of the Bias-Property of the Sample Auto-Correlation Matrices of Doubly Selective Fading Channels for OFDM Systems
not sufficiently novel
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper derives the analytic expression of the sample auto-correlation matrix from the least-squared channel estimation of doubly selective fading channels for OFDM systems. According to the expression, the sample auto-correlation matrix reveals the bias property which would cause the model mismatch and therefore deteriorate the performance of channel estimation. Numerical results demonstrate the bias property and corresponding analysis.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 05:59:09 GMT" }, { "version": "v2", "created": "Wed, 15 Apr 2015 22:28:18 GMT" } ]
2015-04-17T00:00:00
[ [ "Zhao", "Xiaochuan", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Peng", "Tao", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Yang", "Ming", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Wang", "Wenbo", "", "Beijing University of Posts and Telecommunications, Beijing, China" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0431
Xiaochuan Zhao
Xiaochuan Zhao (1), Ming Yang (1), Tao Peng (1) and Wenbo Wang (1) ((1) Beijing University of Posts and Telecommunications, Beijing, China)
On the Cramer-Rao Lower Bound for Frequency Correlation Matrices of Doubly Selective Fading Channels for OFDM Systems
5 pages, 7 figures, Submitted to IEEE ICC'09
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The analytic expression of CRLB and the maximum likelihood estimator for the sample frequency correlation matrices in doubly selective fading channels for OFDM systems are reported in this paper. According to the analytical and numerical results, the amount of samples affects the average mean square error dominantly while the SNR and the Doppler spread do negligibly.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 06:55:20 GMT" } ]
2008-11-05T00:00:00
[ [ "Zhao", "Xiaochuan", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Yang", "Ming", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Peng", "Tao", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Wang", "Wenbo", "", "Beijing University of Posts and Telecommunications, Beijing, China" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0433
Xiaochuan Zhao
Xiaochuan Zhao (1), Tao Peng (1), Ming Yang (1) and Wenbo Wang (1) ((1) Beijing University of Posts and Telecommunications, Beijing, China)
On the Cramer-Rao Lower Bound for Spatial Correlation Matrices of Doubly Selective Fading Channels for MIMO OFDM Systems
6 pages, 8 figures, Submitted to IEEE WCNC'09
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The analytic expression of CRLB and the maximum likelihood estimator for spatial correlation matrices in time-varying multipath fading channels for MIMO OFDM systems are reported in this paper. The analytical and numerical results reveal that the amount of samples and the order of frequency selectivity have dominant impact on the CRLB. Moreover, the number of pilot tones, SNR as well as the normalized maximum Doppler spread together influence the effective order of frequency selectivity.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 06:51:38 GMT" } ]
2008-11-05T00:00:00
[ [ "Zhao", "Xiaochuan", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Peng", "Tao", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Yang", "Ming", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Wang", "Wenbo", "", "Beijing University of Posts and Telecommunications, Beijing, China" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0436
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Instruction sequences for the production of processes
23 pages; acknowledgement corrected, reference updated
null
null
PRG0814
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Single-pass instruction sequences under execution are considered to produce behaviours to be controlled by some execution environment. Threads as considered in thread algebra model such behaviours: upon each action performed by a thread, a reply from its execution environment determines how the thread proceeds. Threads in turn can be looked upon as producing processes as considered in process algebra. We show that, by apposite choice of basic instructions, all processes that can only be in a finite number of states can be produced by single-pass instruction sequences.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 07:24:12 GMT" }, { "version": "v2", "created": "Tue, 18 Nov 2008 10:08:03 GMT" } ]
2008-11-18T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0811.0452
Xiaochuan Zhao
Xiaochuan Zhao (1), Tao Peng (1), Ming Yang (1) and Wenbo Wang (1) ((1) Beijing University of Posts and Telecommunications, Beijing, China)
Doppler Spread Estimation by Tracking the Delay-Subspace for OFDM Systems in Doubly Selective Fading Channels
4 pages, 2 figures, Appear in IEEE Signal Process. Letters
null
10.1109/LSP.2008.2010812
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel maximum Doppler spread estimation algorithm for OFDM systems with comb-type pilot pattern is presented in this paper. By tracking the drifting delay subspace of time-varying multipath channels, a Doppler dependent parameter can be accurately measured and further expanded and transformed into a non-linear high-order polynomial equation, from which the maximum Doppler spread is readily solved by resorting to the Newton's method. Its performance is demonstrated by simulations.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 09:04:35 GMT" } ]
2009-11-13T00:00:00
[ [ "Zhao", "Xiaochuan", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Peng", "Tao", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Yang", "Ming", "", "Beijing University of Posts and Telecommunications, Beijing, China" ], [ "Wang", "Wenbo", "", "Beijing University of Posts and Telecommunications, Beijing, China" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0453
Cynthia Wagner CW
Cynthia Wagner, and Christoph Schommer
CoZo+ - A Content Zoning Engine for textual documents
4 pages, 4 figures
null
null
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Content zoning can be understood as a segmentation of textual documents into zones. This is inspired by [6] who initially proposed an approach for the argumentative zoning of textual documents. With the prototypical CoZo+ engine, we focus on content zoning towards an automatic processing of textual streams while considering only the actors as the zones. We gain information that can be used to realize an automatic recognition of content for pre-defined actors. We understand CoZo+ as a necessary pre-step towards an automatic generation of summaries and to make intellectual ownership of documents detectable.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 09:08:32 GMT" } ]
2008-11-05T00:00:00
[ [ "Wagner", "Cynthia", "" ], [ "Schommer", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0811.0463
Stefan Jaeger
Stefan Jaeger
Solving the P/NP Problem under Intrinsic Uncertainty
typos corrected, figure added, statements clarified
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Heisenberg's uncertainty principle states that it is not possible to compute both the position and momentum of an electron with absolute certainty. However, this computational limitation, which is central to quantum mechanics, has no counterpart in theoretical computer science. Here, I will show that we can distinguish between the complexity classes P and NP when we consider intrinsic uncertainty in our computations, and take uncertainty about whether a bit belongs to the program code or machine input into account. Given intrinsic uncertainty, every output is uncertain, and computations become meaningful only in combination with a confidence level. In particular, it is impossible to compute solutions with absolute certainty as this requires infinite run-time. Considering intrinsic uncertainty, I will present a function that is in NP but not in P, and thus prove that P is a proper subset of NP. I will also show that all traditional hard decision problems have polynomial-time algorithms that provide solutions with confidence under uncertainty.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 10:08:47 GMT" }, { "version": "v2", "created": "Mon, 10 Nov 2008 07:47:38 GMT" } ]
2008-11-10T00:00:00
[ [ "Jaeger", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0811.0475
Manoj Prabhakaran
Yuval Ishai, Manoj Prabhakaran and Amit Sahai
Secure Arithmetic Computation with No Honest Majority
minor editorial changes
null
null
null
cs.CR cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case of two-party protocols with security against malicious parties, our main goals are to: (1) only make black-box calls to the ring operations and standard cryptographic primitives, and (2) minimize the number of such black-box calls as well as the communication overhead. We present several solutions which differ in their efficiency, generality, and underlying intractability assumptions. These include: 1. An unconditionally secure protocol in the OT-hybrid model which makes a black-box use of an arbitrary ring $R$, but where the number of ring operations grows linearly with (an upper bound on) $\log|R|$. 2. Computationally secure protocols in the OT-hybrid model which make a black-box use of an underlying ring, and in which the number of ring operations does not grow with the ring size. These results extend a previous approach of Naor and Pinkas for secure polynomial evaluation (SIAM J. Comput., 35(5), 2006). 3. A protocol for the rings $\mathbb{Z}_m=\mathbb{Z}/m\mathbb{Z}$ which only makes a black-box use of a homomorphic encryption scheme. When $m$ is prime, the (amortized) number of calls to the encryption scheme for each gate of the circuit is constant. All of our protocols are in fact UC-secure in the OT-hybrid model and can be generalized to multiparty computation with an arbitrary number of malicious parties.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 11:18:06 GMT" }, { "version": "v2", "created": "Wed, 5 Nov 2008 16:40:42 GMT" }, { "version": "v3", "created": "Sat, 8 Nov 2008 17:54:42 GMT" } ]
2008-11-08T00:00:00
[ [ "Ishai", "Yuval", "" ], [ "Prabhakaran", "Manoj", "" ], [ "Sahai", "Amit", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0811.0537
Rajeev Alur
Rajeev Alur (UPenn), Marcelo Arenas (PUC, Chile), Pablo Barcelo (U Chile), Kousha Etessami (U Edinburgh), Neil Immerman (UMass), Leonid Libkin (Edinbugh)
First-Order and Temporal Logics for Nested Words
revised and corrected version of Mar 03, 2011
Logical Methods in Computer Science, Volume 4, Issue 4 (November 25, 2008) lmcs:782
10.2168/LMCS-4(4:11)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nested words are a structured model of execution paths in procedural programs, reflecting their call and return nesting structure. Finite nested words also capture the structure of parse trees and other tree-structured data, such as XML. We provide new temporal logics for finite and infinite nested words, which are natural extensions of LTL, and prove that these logics are first-order expressively-complete. One of them is based on adding a "within" modality, evaluating a formula on a subword, to a logic CaRet previously studied in the context of verifying properties of recursive state machines (RSMs). The other logic, NWTL, is based on the notion of a summary path that uses both the linear and nesting structures. For NWTL we show that satisfiability is EXPTIME-complete, and that model-checking can be done in time polynomial in the size of the RSM model and exponential in the size of the NWTL formula (and is also EXPTIME-complete). Finally, we prove that first-order logic over nested words has the three-variable property, and we present a temporal logic for nested words which is complete for the two-variable fragment of first-order.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 15:30:12 GMT" }, { "version": "v2", "created": "Tue, 25 Nov 2008 00:54:10 GMT" }, { "version": "v3", "created": "Thu, 3 Mar 2011 16:16:19 GMT" } ]
2015-07-01T00:00:00
[ [ "Alur", "Rajeev", "", "UPenn" ], [ "Arenas", "Marcelo", "", "PUC, Chile" ], [ "Barcelo", "Pablo", "", "U\n Chile" ], [ "Etessami", "Kousha", "", "U Edinburgh" ], [ "Immerman", "Neil", "", "UMass" ], [ "Libkin", "Leonid", "", "Edinbugh" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0811.0543
Charlotte Hucher
Charlotte Hucher, Ghaya Rekaya-Ben Othman and Ahmed Saadani
Incomplete decode-and-forward protocol using distributed space-time block codes
21 pages, 12 figures, submitted to Trans. Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we explore the introduction of distributed space-time codes in decode-and-forward (DF) protocols. A first protocol named the Asymmetric DF is presented. It is based on two phases of different lengths, defined so that signals can be fully decoded at relays. This strategy brings full diversity but the symbol rate is not optimal. To solve this problem a second protocol named the Incomplete DF is defined. It is based on an incomplete decoding at the relays reducing the length of the first phase. This last strategy brings both full diversity and full symbol rate. The outage probability and the simulation results show that the Incomplete DF has better performance than any existing DF protocol and than the non-orthogonal amplify-and-forward (NAF) strategy using the same space-time codes. Moreover the diversity-multiplexing gain tradeoff (DMT) of this new DF protocol is proven to be the same as the one of the NAF.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 15:55:15 GMT" } ]
2008-11-05T00:00:00
[ [ "Hucher", "Charlotte", "" ], [ "Othman", "Ghaya Rekaya-Ben", "" ], [ "Saadani", "Ahmed", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0573
Carl Lagoze
Carl Lagoze, Herbert Van de Sompel, Michael Nelson, Simeon Warner, Robert Sanderson, Pete Johnston
A Web-Based Resource Model for eScience: Object Reuse & Exchange
2008 Microsoft eScience Workshop, Indianapolis
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Work in the Open Archives Initiative - Object Reuse and Exchange (OAI-ORE) focuses on an important aspect of infrastructure for eScience: the specification of the data model and a suite of implementation standards to identify and describe compound objects. These are objects that aggregate multiple sources of content including text, images, data, visualization tools, and the like. These aggregations are an essential product of eScience, and will become increasingly common in the age of data-driven scholarship. The OAI-ORE specifications conform to the core concepts of the Web architecture and the semantic Web, ensuring that applications that use them will integrate well into the general Web environment.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 19:07:36 GMT" } ]
2008-11-05T00:00:00
[ [ "Lagoze", "Carl", "" ], [ "Van de Sompel", "Herbert", "" ], [ "Nelson", "Michael", "" ], [ "Warner", "Simeon", "" ], [ "Sanderson", "Robert", "" ], [ "Johnston", "Pete", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0811.0579
Gilles Serasset
Gilles s\'erasset (IMAG, Clips - Imag, Lig), Christian Boitet (IMAG, Clips - Imag, Lig)
UNL-French deconversion as transfer & generation from an interlingua with possible quality enhancement through offline human interaction
null
MACHINE TRANSLATION SUMMIT VII, Singapour : Singapour (1999)
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the architecture of the UNL-French deconverter, which "generates" from the UNL interlingua by first"localizing" the UNL form for French, within UNL, and then applying slightly adapted but classical transfer and generation techniques, implemented in GETA's Ariane-G5 environment, supplemented by some UNL-specific tools. Online interaction can be used during deconversion to enhance output quality and is now used for development purposes. We show how interaction could be delayed and embedded in the postedition phase, which would then interact not directly with the output text, but indirectly with several components of the deconverter. Interacting online or offline can improve the quality not only of the utterance at hand, but also of the utterances processed later, as various preferences may be automatically changed to let the deconverter "learn".
[ { "version": "v1", "created": "Tue, 4 Nov 2008 19:31:58 GMT" } ]
2008-11-05T00:00:00
[ [ "sérasset", "Gilles", "", "IMAG, Clips - Imag, Lig" ], [ "Boitet", "Christian", "", "IMAG,\n Clips - Imag, Lig" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0811.0582
Jean Francois Nezan
Maxime Pelcat (IETR), Slaheddine Aridhi, Jean Fran\c{c}ois Nezan (IETR)
Optimization of automatically generated multi-core code for the LTE RACH-PD algorithm
null
DASIP 2008, Bruxelles : Belgique (2008)
null
null
cs.MM cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Embedded real-time applications in communication systems require high processing power. Manual scheduling devel-oped for single-processor applications is not suited to multi-core architectures. The Algorithm Architecture Matching (AAM) methodology optimizes static application implementation on multi-core architectures. The Random Access Channel Preamble Detection (RACH-PD) is an algorithm for non-synchronized access of Long Term Evolu-tion (LTE) wireless networks. LTE aims to improve the spectral efficiency of the next generation cellular system. This paper de-scribes a complete methodology for implementing the RACH-PD. AAM prototyping is applied to the RACH-PD which is modelled as a Synchronous DataFlow graph (SDF). An efficient implemen-tation of the algorithm onto a multi-core DSP, the TI C6487, is then explained. Benchmarks for the solution are given.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 19:36:16 GMT" } ]
2008-11-05T00:00:00
[ [ "Pelcat", "Maxime", "", "IETR" ], [ "Aridhi", "Slaheddine", "", "IETR" ], [ "Nezan", "Jean François", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0811.0602
Patricia Gautier
Alain Lelu (LASELDI), Pascal Cuxac (INIST), Joel Johansson (INIST)
Classification dynamique d'un flux documentaire : une \'evaluation statique pr\'ealable de l'algorithme GERMEN
null
JADT 2006 : 8es Journ\'ees internationales d'Analyse statistique des Donn\'ees Textuelles, France (2006)
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data-stream clustering is an ever-expanding subdomain of knowledge extraction. Most of the past and present research effort aims at efficient scaling up for the huge data repositories. Our approach focuses on qualitative improvement, mainly for "weak signals" detection and precise tracking of topical evolutions in the framework of information watch - though scalability is intrinsically guaranteed in a possibly distributed implementation. Our GERMEN algorithm exhaustively picks up the whole set of density peaks of the data at time t, by identifying the local perturbations induced by the current document vector, such as changing cluster borders, or new/vanishing clusters. Optimality yields from the uniqueness 1) of the density landscape for any value of our zoom parameter, 2) of the cluster allocation operated by our border propagation rule. This results in a rigorous independence from the data presentation ranking or any initialization parameter. We present here as a first step the only assessment of a static view resulting from one year of the CNRS/INIST Pascal database in the field of geotechnics.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 20:42:52 GMT" } ]
2008-11-05T00:00:00
[ [ "Lelu", "Alain", "", "LASELDI" ], [ "Cuxac", "Pascal", "", "INIST" ], [ "Johansson", "Joel", "", "INIST" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0811.0603
Patricia Gautier
Veronila Lux-Pogodalla (INIST), Eric San Juan
Query Refinement by Multi Word Term expansions and semantic synonymy
null
InSciT2006, medira : Espagne (2006)
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We developed a system, TermWatch (https://stid-bdd.iut.univ-metz.fr/TermWatch/index.pl), which combines a linguistic extraction of terms, their structuring into a terminological network with a clustering algorithm. In this paper we explore its ability in integrating the most promising aspects of the studies on query refinement: choice of meaningful text units to cluster (domain terms), choice of tight semantic relations with which to cluster terms, structuring of terms in a network enabling abetter perception of domain concepts. We have run this experiment on the 367 645 English abstracts of PASCAL 2005-2006 bibliographic database (http://www.inist.fr) and compared the structured terminological resource automatically build by TermWarch to the English segment of TermScience resource (http://termsciences.inist.fr/) containing 88 211 terms.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 20:43:29 GMT" } ]
2008-11-05T00:00:00
[ [ "Lux-Pogodalla", "Veronila", "", "INIST" ], [ "Juan", "Eric San", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0811.0623
Joel Ratsaby
J. Ratsaby and J. Chaskalovic
Algorithmic complexity and randomness in elastic solids
null
null
null
null
cs.CC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A system comprised of an elastic solid and its response to an external random force sequence is shown to behave based on the principles of the theory of algorithmic complexity and randomness. The solid distorts the randomness of an input force sequence in a way proportional to its algorithmic complexity. We demonstrate this by numerical analysis of a one-dimensional vibrating elastic solid (the system) on which we apply a maximally random input force. The level of complexity of the system is controlled via external parameters. The output response is the field of displacements observed at several positions on the body. The algorithmic complexity and stochasticity of the resulting output displacement sequence is measured and compared against the complexity of the system. The results show that the higher the system complexity the more random-deficient the output sequence. This agrees with the theory introduced in [16] which states that physical systems such as this behave as algorithmic selection-rules which act on random actions in their surroundings.
[ { "version": "v1", "created": "Tue, 4 Nov 2008 21:34:54 GMT" } ]
2008-11-06T00:00:00
[ [ "Ratsaby", "J.", "" ], [ "Chaskalovic", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0637
Qing Zhao
Sahand H.A. Ahmad, Mingyan Liu, Tara Javidi, Qing Zhao, Bhaskar Krishnamachari
Optimality of Myopic Sensing in Multi-Channel Opportunistic Access
Revised version
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider opportunistic communications over multiple channels where the state ("good" or "bad") of each channel evolves as independent and identically distributed Markov processes. A user, with limited sensing and access capability, chooses one channel to sense and subsequently access (based on the sensed channel state) in each time slot. A reward is obtained when the user senses and accesses a "good" channel. The objective is to design the optimal channel selection policy that maximizes the expected reward accrued over time. This problem can be generally cast as a Partially Observable Markov Decision Process (POMDP) or a restless multi-armed bandit process, to which optimal solutions are often intractable. We show in this paper that the myopic policy, with a simple and robust structure, achieves optimality under certain conditions. This result finds applications in opportunistic communications in fading environment, cognitive radio networks for spectrum overlay, and resource-constrained jamming and anti-jamming.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 02:21:52 GMT" }, { "version": "v2", "created": "Tue, 10 Mar 2009 22:40:53 GMT" } ]
2009-03-11T00:00:00
[ [ "Ahmad", "Sahand H. A.", "" ], [ "Liu", "Mingyan", "" ], [ "Javidi", "Tara", "" ], [ "Zhao", "Qing", "" ], [ "Krishnamachari", "Bhaskar", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0699
Hiroki Morizumi
Hiroki Morizumi
A Note on the Inversion Complexity of Boolean Functions in Boolean Formulas
5 pages, 1 figures
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, we consider the minimum number of NOT operators in a Boolean formula representing a Boolean function. In circuit complexity theory, the minimum number of NOT gates in a Boolean circuit computing a Boolean function $f$ is called the inversion complexity of $f$. In 1958, Markov determined the inversion complexity of every Boolean function and particularly proved that $\lceil \log_2(n+1) \rceil$ NOT gates are sufficient to compute any Boolean function on $n$ variables. As far as we know, no result is known for inversion complexity in Boolean formulas, i.e., the minimum number of NOT operators in a Boolean formula representing a Boolean function. The aim of this note is showing that we can determine the inversion complexity of every Boolean function in Boolean formulas by arguments based on the study of circuit complexity.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 11:22:15 GMT" } ]
2008-11-06T00:00:00
[ [ "Morizumi", "Hiroki", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0811.0705
Lianlin Li Dr
Lianlin Li, wenji zhang and Fang Li
The Design of Sparse Antenna Array
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of antenna array synthesis is to achieve a desired radiation pattern with the minimum number of antenna elements. In this paper the antenna synthesis problem is studied from a totally new perspective. One of the key principles of compressive sensing is that the signal to be sensed should be sparse or compressible. This coincides with the requirement of minimum number of element in the antenna array synthesis problem. In this paper the antenna element of the array can be efficiently reduced via compressive sensing, which shows a great improvement to the existing antenna synthesis method. Moreover, the desired radiation pattern can be achieved in a very computation time which is even shorter than the existing method. Numerical examples are presented to show the high efficiency of the proposed method.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 12:03:42 GMT" } ]
2008-11-06T00:00:00
[ [ "Li", "Lianlin", "" ], [ "zhang", "wenji", "" ], [ "Li", "Fang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0709
Joost Broekens
Joost Broekens
MMOGs as Social Experiments: the Case of Environmental Laws
null
null
null
null
cs.CY
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper we argue that Massively Multiplayer Online Games (MMOGs), also known as Large Games are an interesting research tool for policy experimentation. One of the major problems with lawmaking is that testing the laws is a difficult enterprise. Here we show that the concept of an MMOG can be used to experiment with environmental laws on a large scale, provided that the MMOG is a real game, i.e., it is fun, addictive, presents challenges that last, etc.. We present a detailed game concept as an initial step.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 12:10:21 GMT" } ]
2008-11-06T00:00:00
[ [ "Broekens", "Joost", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0811.0717
Patricia Gautier
Eric San Juan (INIST), Ivana Roche (INIST)
Visualization of association graphs for assisting the interpretation of classifications
International workshop on Webometrics, informetrics and scientometrics. Seventh collnet meeting, Nancy : France (2005)
null
null
null
stat.AP cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a query on the PASCAL database maintained by the INIST, we design user interfaces to visualize and browse two types of graphs extracted from abstracts: 1) the graph of all associations between authors (co-author graph), 2) the graph of strong associations between authors and terms automatically extracted from abstracts and grouped using linguistic variations. We adapt for this purpose the TermWatch system that comprises a term extractor, a relation identifier which yields the terminological network and a clustering module. The results are output on two interfaces: a graphic one mapping the clusters in a 2D space and a terminological hypertext network allowing the user to interactively explore results and return to source texts.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 12:58:38 GMT" } ]
2008-11-06T00:00:00
[ [ "Juan", "Eric San", "", "INIST" ], [ "Roche", "Ivana", "", "INIST" ] ]
[ { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0811.0719
Patricia Gautier
Xavier Polanco (INIST), Ivana Roche (INIST), Dominique Besagni (INIST)
Web Usage Analysis: New Science Indicators and Co-usage
null
S\'eminaire VSST 2006, Lille : France (2006)
null
null
cs.IR stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new type of statistical analysis of the science and technical information (STI) in the Web context is produced. We propose a set of indicators about Web users, visualized bibliographic records, and e-commercial transactions. In addition, we introduce two Web usage factors. Finally, we give an overview of the co-usage analysis. For these tasks, we introduce a computer based system, called Miri@d, which produces descriptive statistical information about the Web users' searching behaviour, and what is effectively used from a free access digital bibliographical database. The system is conceived as a server of statistical data which are carried out beforehand, and as an interactive server for online statistical work. The results will be made available to analysts, who can use this descriptive statistical information as raw data for their indicator design tasks, and as input for multivariate data analysis, clustering analysis, and mapping. Managers also can exploit the results in order to improve management and decision-making.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 13:00:52 GMT" } ]
2008-11-06T00:00:00
[ [ "Polanco", "Xavier", "", "INIST" ], [ "Roche", "Ivana", "", "INIST" ], [ "Besagni", "Dominique", "", "INIST" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0811.0726
Won-Yong Shin
Won-Yong Shin, Sang-Woon Jeon, Natasha Devroye, Mai H. Vu, Sae-Young Chung, Yong H. Lee, and Vahid Tarokh
Improved Capacity Scaling in Wireless Networks With Infrastructure
26 pages, 10 figures, 1 table, Under revision for IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2158881
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper analyzes the impact and benefits of infrastructure support in improving the throughput scaling in networks of $n$ randomly located wireless nodes. The infrastructure uses multi-antenna base stations (BSs), in which the number of BSs and the number of antennas at each BS can scale at arbitrary rates relative to $n$. Under the model, capacity scaling laws are analyzed for both dense and extended networks. Two BS-based routing schemes are first introduced in this study: an infrastructure-supported single-hop (ISH) routing protocol with multiple-access uplink and broadcast downlink and an infrastructure-supported multi-hop (IMH) routing protocol. Then, their achievable throughput scalings are analyzed. These schemes are compared against two conventional schemes without BSs: the multi-hop (MH) transmission and hierarchical cooperation (HC) schemes. It is shown that a linear throughput scaling is achieved in dense networks, as in the case without help of BSs. In contrast, the proposed BS-based routing schemes can, under realistic network conditions, improve the throughput scaling significantly in extended networks. The gain comes from the following advantages of these BS-based protocols. First, more nodes can transmit simultaneously in the proposed scheme than in the MH scheme if the number of BSs and the number of antennas are large enough. Second, by improving the long-distance signal-to-noise ratio (SNR), the received signal power can be larger than that of the HC, enabling a better throughput scaling under extended networks. Furthermore, by deriving the corresponding information-theoretic cut-set upper bounds, it is shown under extended networks that a combination of four schemes IMH, ISH, MH, and HC is order-optimal in all operating regimes.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 13:56:26 GMT" }, { "version": "v2", "created": "Sun, 4 Apr 2010 04:36:31 GMT" }, { "version": "v3", "created": "Tue, 6 Apr 2010 02:28:49 GMT" } ]
2016-11-18T00:00:00
[ [ "Shin", "Won-Yong", "" ], [ "Jeon", "Sang-Woon", "" ], [ "Devroye", "Natasha", "" ], [ "Vu", "Mai H.", "" ], [ "Chung", "Sae-Young", "" ], [ "Lee", "Yong H.", "" ], [ "Tarokh", "Vahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0731
Romain Couillet
Romain Couillet, Merouane Debbah
Cognitive OFDM network sensing: a free probability approach
12 pages, 10 figures, 2 tables
null
null
null
cs.IT cs.AI math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a practical power detection scheme for OFDM terminals, based on recent free probability tools, is proposed. The objective is for the receiving terminal to determine the transmission power and the number of the surrounding base stations in the network. However, thesystem dimensions of the network model turn energy detection into an under-determined problem. The focus of this paper is then twofold: (i) discuss the maximum amount of information that an OFDM terminal can gather from the surrounding base stations in the network, (ii) propose a practical solution for blind cell detection using the free deconvolution tool. The efficiency of this solution is measured through simulations, which show better performance than the classical power detection methods.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 14:34:23 GMT" }, { "version": "v2", "created": "Tue, 25 Nov 2008 19:05:04 GMT" } ]
2008-11-25T00:00:00
[ [ "Couillet", "Romain", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0811.0741
Jerome Darmont
Hadj Mahboubi (ERIC), J\'er\^ome Darmont (ERIC)
Data Mining-based Fragmentation of XML Data Warehouses
null
ACM 11th International Workshop on Data Warehousing and OLAP (CIKM/DOLAP 08), Napa Valley : \'Etats-Unis d'Am\'erique (2008)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the multiplication of XML data sources, many XML data warehouse models have been proposed to handle data heterogeneity and complexity in a way relational data warehouses fail to achieve. However, XML-native database systems currently suffer from limited performances, both in terms of manageable data volume and response time. Fragmentation helps address both these issues. Derived horizontal fragmentation is typically used in relational data warehouses and can definitely be adapted to the XML context. However, the number of fragments produced by classical algorithms is difficult to control. In this paper, we propose the use of a k-means-based fragmentation approach that allows to master the number of fragments through its $k$ parameter. We experimentally compare its efficiency to classical derived horizontal fragmentation algorithms adapted to XML data warehouses and show its superiority.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 15:00:32 GMT" } ]
2008-11-06T00:00:00
[ [ "Mahboubi", "Hadj", "", "ERIC" ], [ "Darmont", "Jérôme", "", "ERIC" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0811.0764
Romain Couillet
Romain Couillet, Merouane Debbah
A Bayesian Framework for Collaborative Multi-Source Signal Detection
15 pages, 9 pictures, Submitted to IEEE Trans. on Signal Processing
null
null
null
cs.IT cs.AI math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a Bayesian framework to detect multiple signals embedded in noisy observations from a sensor array. For various states of knowledge on the communication channel and the noise at the receiving sensors, a marginalization procedure based on recent tools of finite random matrix theory, in conjunction with the maximum entropy principle, is used to compute the hypothesis selection criterion. Quite remarkably, explicit expressions for the Bayesian detector are derived which enable to decide on the presence of signal sources in a noisy wireless environment. The proposed Bayesian detector is shown to outperform the classical power detector when the noise power is known and provides very good performance for limited knowledge on the noise power. Simulations corroborate the theoretical results and quantify the gain achieved using the proposed Bayesian framework.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 16:11:59 GMT" }, { "version": "v2", "created": "Tue, 8 Sep 2009 12:08:50 GMT" } ]
2009-09-08T00:00:00
[ [ "Couillet", "Romain", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0811.0777
Amin Zia
Amin Zia
A random coding theorem for "modulo-two adder" source network
This paper has been withdrawn
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn by the author, due a crucial error in the proof of the main Theorem (Sec. 3). In particular, in deriving the bound on the probability of error (Eq. 10) the contribution of those pairs (x', y') that are not equal to (x, y) has not been considered. By adding the contribution of these pairs, one can verify that a region of rates similar to the Slepian-Wolf region will emerge. The author would like to acknowledge a critical review of the paper by Mr. Paul Cuff of Stanford University who first pointed out the error.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 20:22:59 GMT" }, { "version": "v2", "created": "Sat, 10 Jan 2009 18:48:38 GMT" } ]
2009-09-29T00:00:00
[ [ "Zia", "Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0811.0778
Romain Couillet
Romain Couillet, Merouane Debbah
A maximum entropy approach to OFDM channel estimation
15 pages, 11 figures
null
null
null
cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, a new Bayesian framework for OFDM channel estimation is proposed. Using Jaynes' maximum entropy principle to derive prior information, we successively tackle the situations when only the channel delay spread is a priori known, then when it is not known. Exploitation of the time-frequency dimensions are also considered in this framework, to derive the optimal channel estimation associated to some performance measure under any state of knowledge. Simulations corroborate the optimality claim and always prove as good or better in performance than classical estimators.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 17:16:34 GMT" } ]
2008-11-06T00:00:00
[ [ "Couillet", "Romain", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0811.0811
Andreas Blass
Andreas Blass (University of Michigan), Nachum Dershowitz (Tel Aviv University), and Yuri Gurevich (Microsoft Research)
When are two algorithms the same?
null
Bulletin of Symbolic Logic, vol. 15, no. 2, pp. 145-168, 2009
null
null
cs.GL cs.DS cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
People usually regard algorithms as more abstract than the programs that implement them. The natural way to formalize this idea is that algorithms are equivalence classes of programs with respect to a suitable equivalence relation. We argue that no such equivalence relation exists.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 20:38:22 GMT" } ]
2020-06-11T00:00:00
[ [ "Blass", "Andreas", "", "University of Michigan" ], [ "Dershowitz", "Nachum", "", "Tel Aviv\n University" ], [ "Gurevich", "Yuri", "", "Microsoft Research" ] ]
[ { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0811.0819
Andreas Blass
Andreas Blass (University of Michigan) and Yuri Gurevich (Microsoft Research)
Persistent Queries
null
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a syntax and semantics for interactive abstract state machines to deal with the following situation. A query is issued during a certain step, but the step ends before any reply is received. Later, a reply arrives, and later yet the algorithm makes use of this reply. By a persistent query, we mean a query for which a late reply might be used. Syntactically, our proposal involves issuing, along with a persistent query, a location where a late reply is to be stored. Semantically, it involves only a minor modification of the existing theory of interactive small-step abstract state machines.
[ { "version": "v1", "created": "Wed, 5 Nov 2008 21:10:33 GMT" } ]
2008-11-07T00:00:00
[ [ "Blass", "Andreas", "", "University of Michigan" ], [ "Gurevich", "Yuri", "", "Microsoft\n Research" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]