id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0810.5308 | Kazushi Mimura | Kazushi Mimura | Typical Performance of Irregular Low-Density Generator-Matrix Codes for
Lossy Compression | 12 pages, 8 figures | J. Phys. A: Math. Theor., 42, 13, 135002 (2009) | 10.1088/1751-8113/42/13/135002 | null | cond-mat.dis-nn cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We evaluate typical performance of irregular low-density generator-matrix
(LDGM) codes, which is defined by sparse matrices with arbitrary irregular bit
degree distribution and arbitrary check degree distribution, for lossy
compression. We apply the replica method under one-step replica symmetry
breaking (1RSB) ansatz to this problem.
| [
{
"version": "v1",
"created": "Wed, 29 Oct 2008 15:47:38 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Feb 2009 10:38:21 GMT"
}
]
| 2009-07-16T00:00:00 | [
[
"Mimura",
"Kazushi",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.5325 | Effrosyni Kokiopoulou | R. Sala Llonch, E. Kokiopoulou, I. Tosic and P. Frossard | 3D Face Recognition with Sparse Spherical Representations | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the problem of 3D face recognition using simultaneous
sparse approximations on the sphere. The 3D face point clouds are first aligned
with a novel and fully automated registration process. They are then
represented as signals on the 2D sphere in order to preserve depth and geometry
information. Next, we implement a dimensionality reduction process with
simultaneous sparse approximations and subspace projection. It permits to
represent each 3D face by only a few spherical functions that are able to
capture the salient facial characteristics, and hence to preserve the
discriminant facial information. We eventually perform recognition by effective
matching in the reduced space, where Linear Discriminant Analysis can be
further activated for improved recognition performance. The 3D face recognition
algorithm is evaluated on the FRGC v.1.0 data set, where it is shown to
outperform classical state-of-the-art solutions that work with depth images.
| [
{
"version": "v1",
"created": "Wed, 29 Oct 2008 17:43:54 GMT"
}
]
| 2008-10-30T00:00:00 | [
[
"Llonch",
"R. Sala",
""
],
[
"Kokiopoulou",
"E.",
""
],
[
"Tosic",
"I.",
""
],
[
"Frossard",
"P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0810.5351 | Alessandro Colantonio | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello | An Activity-Based Model for Separation of Duty | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper offers several contributions for separation of duty (SoD)
administration in role-based access control (RBAC) systems. We first introduce
a new formal framework, based on business perspective, where SoD constraints
are analyzed introducing the activity concept. This notion helps organizations
define SoD constraints in terms of business requirements and reduces management
complexity in large-scale RBAC systems. The model enables the definition of a
wide taxonomy of conflict types. In particular, object-based SoD is introduced
using the SoD domain concept, namely the set of data in which transaction
conflicts may occur. Together with the formalization of the above properties,
in this paper we also show the effectiveness of our proposal: we have applied
the model to a large, existing organization; results highlight the benefits of
adopting the proposed model in terms of reduced administration cost.
| [
{
"version": "v1",
"created": "Wed, 29 Oct 2008 20:22:59 GMT"
}
]
| 2008-10-31T00:00:00 | [
[
"Colantonio",
"Alessandro",
""
],
[
"Di Pietro",
"Roberto",
""
],
[
"Ocello",
"Alberto",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0810.5399 | Shigeru Furuichi Dr. | Shigeru Furuichi | An axiomatic characterization of a two-parameter extended relative
entropy | 11 pages | J. Math. Phys. Vol.51 (2010), 123302 (10 pages) | 10.1063/1.3525917 | null | cond-mat.stat-mech cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The uniqueness theorem for a two-parameter extended relative entropy is
proven. This result extends our previous one, the uniqueness theorem for a
one-parameter extended relative entropy, to a two-parameter case. In addition,
the properties of a two-parameter extended relative entropy are studied.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 01:39:44 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Dec 2009 23:45:51 GMT"
},
{
"version": "v3",
"created": "Sun, 26 Dec 2010 07:13:34 GMT"
}
]
| 2010-12-30T00:00:00 | [
[
"Furuichi",
"Shigeru",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.5407 | Aleksandar Stojmirovi\'c | Aleksandar Stojmirovic | Quasi-metrics, Similarities and Searches: aspects of geometry of protein
datasets | 299 pages, 44 figures, 10 tables, 9 algorithms. PhD thesis in
mathematics defended in May 2005 at the Victoria University of Wellington,
Wellington, New Zealand (supervisors: Prof. Vladimir Pestov and Dr. Bill
Jordan) | null | null | null | cs.IR math.GN q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A quasi-metric is a distance function which satisfies the triangle inequality
but is not symmetric: it can be thought of as an asymmetric metric. The central
result of this thesis, developed in Chapter 3, is that a natural correspondence
exists between similarity measures between biological (nucleotide or protein)
sequences and quasi-metrics.
Chapter 2 presents basic concepts of the theory of quasi-metric spaces and
introduces a new examples of them: the universal countable rational
quasi-metric space and its bicompletion, the universal bicomplete separable
quasi-metric space. Chapter 4 is dedicated to development of a notion of the
quasi-metric space with Borel probability measure, or pq-space. The main result
of this chapter indicates that `a high dimensional quasi-metric space is close
to being a metric space'.
Chapter 5 investigates the geometric aspects of the theory of database
similarity search in the context of quasi-metrics. The results about
$pq$-spaces are used to produce novel theoretical bounds on performance of
indexing schemes.
Finally, the thesis presents some biological applications. Chapter 6
introduces FSIndex, an indexing scheme that significantly accelerates
similarity searches of short protein fragment datasets. Chapter 7 presents the
prototype of the system for discovery of short functional protein motifs called
PFMFind, which relies on FSIndex for similarity searches.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 03:14:17 GMT"
}
]
| 2008-10-31T00:00:00 | [
[
"Stojmirovic",
"Aleksandar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Mathematics",
"code": "math.GN",
"description": "Continuum theory, point-set topology, spaces with algebraic structure, foundations, dimension theory, local and global properties",
"span": "(General Topology)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0810.5428 | Amitabha Bagchi | Amitabha Bagchi, Garima Lahoti | Relating Web pages to enable information-gathering tasks | In Proceedings of ACM Hypertext 2009 | null | null | null | cs.IR cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We argue that relationships between Web pages are functions of the user's
intent. We identify a class of Web tasks - information-gathering - that can be
facilitated by a search engine that provides links to pages which are related
to the page the user is currently viewing. We define three kinds of intentional
relationships that correspond to whether the user is a) seeking sources of
information, b) reading pages which provide information, or c) surfing through
pages as part of an extended information-gathering process. We show that these
three relationships can be productively mined using a combination of textual
and link information and provide three scoring mechanisms that correspond to
them: {\em SeekRel}, {\em FactRel} and {\em SurfRel}. These scoring mechanisms
incorporate both textual and link information. We build a set of capacitated
subnetworks - each corresponding to a particular keyword - that mirror the
interconnection structure of the World Wide Web. The scores are computed by
computing flows on these subnetworks. The capacities of the links are derived
from the {\em hub} and {\em authority} values of the nodes they connect,
following the work of Kleinberg (1998) on assigning authority to pages in
hyperlinked environments. We evaluated our scoring mechanism by running
experiments on four data sets taken from the Web. We present user evaluations
of the relevance of the top results returned by our scoring mechanisms and
compare those to the top results returned by Google's Similar Pages feature,
and the {\em Companion} algorithm proposed by Dean and Henzinger (1999).
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 07:17:49 GMT"
},
{
"version": "v2",
"created": "Wed, 19 May 2010 11:43:29 GMT"
}
]
| 2010-05-20T00:00:00 | [
[
"Bagchi",
"Amitabha",
""
],
[
"Lahoti",
"Garima",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.5439 | Peter Tr\"oger | Peter Tr\"oger (Blekinge Institute Of Technology) | The Multi-Core Era - Trends and Challenges | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Since the very beginning of hardware development, computer processors were
invented with ever-increasing clock frequencies and sophisticated in-build
optimization strategies. Due to physical limitations, this 'free lunch' of
speedup has come to an end.
The following article gives a summary and bibliography for recent trends and
challenges in CMP architectures. It discusses how 40 years of parallel
computing research need to be considered in the upcoming multi-core era. We
argue that future research must be driven from two sides - a better expression
of hardware structures, and a domain-specific understanding of software
parallelism.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 08:34:48 GMT"
}
]
| 2008-10-31T00:00:00 | [
[
"Tröger",
"Peter",
"",
"Blekinge Institute Of Technology"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0810.5477 | Andrew Twigg | Andrew Twigg | Worst-case time decremental connectivity and k-edge witness | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a simple algorithm for decremental graph connectivity that handles
edge deletions in worst-case time $O(k \log n)$ and connectivity queries in
$O(\log k)$, where $k$ is the number of edges deleted so far, and uses
worst-case space $O(m^2)$. We use this to give an algorithm for $k$-edge
witness (``does the removal of a given set of $k$ edges disconnect two vertices
$u,v$?'') with worst-case time $O(k^2 \log n)$ and space $O(k^2 n^2)$. For $k =
o(\sqrt{n})$ these improve the worst-case $O(\sqrt{n})$ bound for deletion due
to Eppstein et al. We also give a decremental connectivity algorithm using
$O(n^2 \log n / \log \log n)$ space, whose time complexity depends on the
toughness and independence number of the input graph. Finally, we show how to
construct a distributed data structure for \kvw by giving a labeling scheme.
This is the first data structure for \kvw that can efficiently distributed
without just giving each vertex a copy of the whole structure. Its complexity
depends on being able to construct a linear layout with good properties.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 12:15:33 GMT"
}
]
| 2008-10-31T00:00:00 | [
[
"Twigg",
"Andrew",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.5482 | Adrien Richard | Adrien Richard | On the length of attractors in boolean networks with an interaction
graph by layers | 7 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a boolean network whose interaction graph has no circuit of
length >1. Under this hypothesis, we establish an upper bound on the length of
the attractors of the network which only depends on its interaction graph.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 13:21:40 GMT"
}
]
| 2008-10-31T00:00:00 | [
[
"Richard",
"Adrien",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0810.5484 | Qiang Li | Qiang Li, Yan He, Jing-ping Jiang | A Novel Clustering Algorithm Based on a Modified Model of Random Walk | 21 pages, 13 figures | null | null | null | cs.LG cs.AI cs.MA | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We introduce a modified model of random walk, and then develop two novel
clustering algorithms based on it. In the algorithms, each data point in a
dataset is considered as a particle which can move at random in space according
to the preset rules in the modified model. Further, this data point may be also
viewed as a local control subsystem, in which the controller adjusts its
transition probability vector in terms of the feedbacks of all data points, and
then its transition direction is identified by an event-generating function.
Finally, the positions of all data points are updated. As they move in space,
data points collect gradually and some separating parts emerge among them
automatically. As a consequence, data points that belong to the same class are
located at a same position, whereas those that belong to different classes are
away from one another. Moreover, the experimental results have demonstrated
that data points in the test datasets are clustered reasonably and efficiently,
and the comparison with other algorithms also provides an indication of the
effectiveness of the proposed algorithms.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 13:26:31 GMT"
}
]
| 2008-10-31T00:00:00 | [
[
"Li",
"Qiang",
""
],
[
"He",
"Yan",
""
],
[
"Jiang",
"Jing-ping",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0810.5516 | Valentin Goranko | Wilmari Bekker and Valentin Goranko | Symbolic model checking of tense logics on rational Kripke models | To appear in: Proceedings of the International Conference on Infinity
in Logic and Computation ILC'2007, Springer LNAI | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the class of rational Kripke models and study symbolic model
checking of the basic tense logic Kt and some extensions of it in models from
that class. Rational Kripke models are based on (generally infinite) rational
graphs, with vertices labeled by the words in some regular language and
transitions recognized by asynchronous two-head finite automata, also known as
rational transducers. Every atomic proposition in a rational Kripke model is
evaluated in a regular set of states. We show that every formula of Kt has an
effectively computable regular extension in every rational Kripke model, and
therefore local model checking and global model checking of Kt in rational
Kripke models are decidable. These results are lifted to a number of extensions
of Kt. We study and partly determine the complexity of the model checking
procedures.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 15:59:53 GMT"
}
]
| 2008-10-31T00:00:00 | [
[
"Bekker",
"Wilmari",
""
],
[
"Goranko",
"Valentin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0810.5517 | Ranko Lazic | Stephane Demri, Ranko Lazic, Arnaud Sangnier | Model checking memoryful linear-time logics over one-counter automata | Substantially revised and extended version of "Model checking freeze
LTL over one-counter automata" by the same authors in FoSSaCS 2008 | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study complexity of the model-checking problems for LTL with registers
(also known as freeze LTL) and for first-order logic with data equality tests
over one-counter automata. We consider several classes of one-counter automata
(mainly deterministic vs. nondeterministic) and several logical fragments
(restriction on the number of registers or variables and on the use of
propositional variables for control locations). The logics have the ability to
store a counter value and to test it later against the current counter value.
We show that model checking over deterministic one-counter automata is
PSPACE-complete with infinite and finite accepting runs. By constrast, we prove
that model checking freeze LTL in which the until operator is restricted to the
eventually operator over nondeterministic one-counter automata is undecidable
even if only one register is used and with no propositional variable. As a
corollary of our proof, this also holds for first-order logic with data
equality tests restricted to two variables. This makes a difference with the
facts that several verification problems for one-counter automata are known to
be decidable with relatively low complexity, and that finitary satisfiability
for the two logics are decidable. Our results pave the way for model-checking
memoryful (linear-time) logics over other classes of operational models, such
as reversal-bounded counter machines.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 16:04:06 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Jan 2010 18:19:49 GMT"
}
]
| 2010-01-18T00:00:00 | [
[
"Demri",
"Stephane",
""
],
[
"Lazic",
"Ranko",
""
],
[
"Sangnier",
"Arnaud",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0810.5535 | Henryk Borowczyk | Henryk Borowczyk | A Combinatorial-Probabilistic Diagnostic Entropy and Information | Sent to IEEE Transactions on Information Theory (september 2008) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new combinatorial-probabilistic diagnostic entropy has been introduced. It
describes the pair-wise sum of probabilities of system conditions that have to
be distinguished during the diagnosing process. The proposed measure describes
the uncertainty of the system conditions, and at the same time complexity of
the diagnosis problem. Treating the assumed combinatorial-diagnostic entropy as
a primary notion, the information delivered by the symptoms has been defined.
The relationships have been derived to facilitate explicit, quantitative
assessment of the information of a single symptom as well as that of a symptoms
set. It has been proved that the combinatorial-probabilistic information shows
the property of additivity. The presented measures are focused on diagnosis
problem, but they can be easily applied to other disciplines such as decision
theory and classification.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 18:28:18 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Borowczyk",
"Henryk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.5551 | Xinjia Chen | Xinjia Chen | A Theory of Truncated Inverse Sampling | 31 pages, no figure, revised proofs | null | null | null | math.ST cs.LG math.PR stat.ME stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we have established a new framework of truncated inverse
sampling for estimating mean values of non-negative random variables such as
binomial, Poisson, hyper-geometrical, and bounded variables. We have derived
explicit formulas and computational methods for designing sampling schemes to
ensure prescribed levels of precision and confidence for point estimators.
Moreover, we have developed interval estimation methods.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 19:52:55 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Nov 2008 02:38:09 GMT"
}
]
| 2013-11-05T00:00:00 | [
[
"Chen",
"Xinjia",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0810.5573 | David Correa Martins Jr | Marcelo Ris, Junior Barrera, David C. Martins Jr | A branch-and-bound feature selection algorithm for U-shaped cost
functions | null | null | null | null | cs.CV cs.DS cs.LG | http://creativecommons.org/licenses/by/3.0/ | This paper presents the formulation of a combinatorial optimization problem
with the following characteristics: i.the search space is the power set of a
finite set structured as a Boolean lattice; ii.the cost function forms a
U-shaped curve when applied to any lattice chain. This formulation applies for
feature selection in the context of pattern recognition. The known approaches
for this problem are branch-and-bound algorithms and heuristics, that explore
partially the search space. Branch-and-bound algorithms are equivalent to the
full search, while heuristics are not. This paper presents a branch-and-bound
algorithm that differs from the others known by exploring the lattice structure
and the U-shaped chain curves of the search space. The main contribution of
this paper is the architecture of this algorithm that is based on the
representation and exploration of the search space by new lattice properties
proven here. Several experiments, with well known public data, indicate the
superiority of the proposed method to SFFS, which is a popular heuristic that
gives good results in very short computational time. In all experiments, the
proposed method got better or equal results in similar or even smaller
computational time.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 20:24:28 GMT"
}
]
| 2008-11-03T00:00:00 | [
[
"Ris",
"Marcelo",
""
],
[
"Barrera",
"Junior",
""
],
[
"Martins",
"David C.",
"Jr"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0810.5575 | Renat Nuriyev | R. Nuriyev | Detection of parallel steps in programs with arrays | 13 pages, 5 figurers | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of detecting of information and logically independent (DILD)
steps in programs is a key for equivalent program transformations. Here we are
considering the problem of independence of loop iterations, the concentration
of massive data processing and hence the most challenge construction for
parallelizing. We introduced a separated form of loops when loop's body is a
sequence of procedures each of them are used array's elements selected in a
previous procedure. We prove that any loop may be algorithmically represented
in this form and number of such procedures is invariant. We show that for this
form of loop the steps connections are determined with some integer equations
and hence the independence problem is algorithmically unsolvable if index
expressions are more complex than cubical. We suggest a modification of index
semantics that made connection equations trivial and loops iterations can be
executed in parallel.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 20:48:49 GMT"
}
]
| 2008-11-03T00:00:00 | [
[
"Nuriyev",
"R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0810.5578 | Shubha Nabar | Tomas Feder, Shubha U. Nabar, Evimaria Terzi | Anonymizing Graphs | 15 pages, 5 figures | null | null | null | cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by recently discovered privacy attacks on social networks, we study
the problem of anonymizing the underlying graph of interactions in a social
network. We call a graph (k,l)-anonymous if for every node in the graph there
exist at least k other nodes that share at least l of its neighbors. We
consider two combinatorial problems arising from this notion of anonymity in
graphs. More specifically, given an input graph we ask for the minimum number
of edges to be added so that the graph becomes (k,l)-anonymous. We define two
variants of this minimization problem and study their properties. We show that
for certain values of k and l the problems are polynomial-time solvable, while
for others they become NP-hard. Approximation algorithms for the latter cases
are also given.
| [
{
"version": "v1",
"created": "Thu, 30 Oct 2008 21:12:25 GMT"
}
]
| 2008-11-03T00:00:00 | [
[
"Feder",
"Tomas",
""
],
[
"Nabar",
"Shubha U.",
""
],
[
"Terzi",
"Evimaria",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.5582 | Shubha Nabar | Rajeev Motwani, Shubha U. Nabar | Anonymizing Unstructured Data | 9 pages, 1 figure | null | null | null | cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider the problem of anonymizing datasets in which each
individual is associated with a set of items that constitute private
information about the individual. Illustrative datasets include market-basket
datasets and search engine query logs. We formalize the notion of k-anonymity
for set-valued data as a variant of the k-anonymity model for traditional
relational datasets. We define an optimization problem that arises from this
definition of anonymity and provide O(klogk) and O(1)-approximation algorithms
for the same. We demonstrate applicability of our algorithms to the America
Online query log dataset.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 19:25:02 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Nov 2008 23:33:20 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Motwani",
"Rajeev",
""
],
[
"Nabar",
"Shubha U.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0810.5596 | Renat Nuriyev | R. Nuriyev | Programming languages with algorithmically parallelizing problem | 57 pages, 8 figures | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The study consists of two parts. Objective of the first part is modern
language constructions responsible for algorithmically insolvability of
parallelizing problem. Second part contains several ways to modify the
constructions to make the problem algorithmically solvable
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 00:25:15 GMT"
}
]
| 2008-11-03T00:00:00 | [
[
"Nuriyev",
"R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0810.5631 | Marcus Hutter | Marcus Hutter and Shane Legg | Temporal Difference Updating without a Learning Rate | 12 pages, 6 figures | Advances in Neural Information Processing Systems 20 (NIPS 2008)
pages 705-712 | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We derive an equation for temporal difference learning from statistical
principles. Specifically, we start with the variational principle and then
bootstrap to produce an updating rule for discounted state value estimates. The
resulting equation is similar to the standard equation for temporal difference
learning with eligibility traces, so called TD(lambda), however it lacks the
parameter alpha that specifies the learning rate. In the place of this free
parameter there is now an equation for the learning rate that is specific to
each state transition. We experimentally test this new learning rule against
TD(lambda) and find that it offers superior performance in various settings.
Finally, we make some preliminary investigations into how to extend our new
temporal difference algorithm to reinforcement learning. To do this we combine
our update equation with both Watkins' Q(lambda) and Sarsa(lambda) and find
that it again offers superior performance without a learning rate parameter.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 07:15:01 GMT"
}
]
| 2008-11-03T00:00:00 | [
[
"Hutter",
"Marcus",
""
],
[
"Legg",
"Shane",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0810.5633 | Olli Pottonen | Ivan Yu. Mogilnykh, Patric R. J. \"Osterg{\aa}rd, Olli Pottonen, Faina
I. Solov'eva | Reconstructing Extended Perfect Binary One-Error-Correcting Codes from
Their Minimum Distance Graphs | 4 pages. Accepted for publication in IEEE Transactions on Information
Theory | IEEE Trans. Inform. Theory 55 (2009) 2622-2625 | 10.1109/TIT.2009.2018338 | null | cs.IT math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The minimum distance graph of a code has the codewords as vertices and edges
exactly when the Hamming distance between two codewords equals the minimum
distance of the code. A constructive proof for reconstructibility of an
extended perfect binary one-error-correcting code from its minimum distance
graph is presented. Consequently, inequivalent such codes have nonisomorphic
minimum distance graphs. Moreover, it is shown that the automorphism group of a
minimum distance graph is isomorphic to that of the corresponding code.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 07:32:16 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Feb 2009 12:49:11 GMT"
}
]
| 2009-05-31T00:00:00 | [
[
"Mogilnykh",
"Ivan Yu.",
""
],
[
"Östergård",
"Patric R. J.",
""
],
[
"Pottonen",
"Olli",
""
],
[
"Solov'eva",
"Faina I.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.5636 | Marcus Hutter | Daniil Ryabko and Marcus Hutter | On the Possibility of Learning in Reactive Environments with Arbitrary
Dependence | 20 pages | Theoretical Computer Science, 405:3 (2008) pages 274-284 | null | IDSIA-08-08 | cs.LG cs.AI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of reinforcement learning in which observations may
exhibit an arbitrary form of stochastic dependence on past observations and
actions, i.e. environments more general than (PO)MDPs. The task for an agent is
to attain the best possible asymptotic reward where the true generating
environment is unknown but belongs to a known countable family of environments.
We find some sufficient conditions on the class of environments under which an
agent exists which attains the best asymptotic reward for any environment in
the class. We analyze how tight these conditions are and how they relate to
different probabilistic assumptions known in reinforcement learning and related
fields, such as Markov Decision Processes and mixing conditions.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 07:58:31 GMT"
}
]
| 2009-12-30T00:00:00 | [
[
"Ryabko",
"Daniil",
""
],
[
"Hutter",
"Marcus",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.5647 | Gilles Villard | Gilles Villard (LIP) | Kaltofen's division-free determinant algorithm differentiated for matrix
adjoint computation | null | null | null | null | cs.SC cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Kaltofen has proposed a new approach in 1992 for computing matrix
determinants without divisions. The algorithm is based on a baby steps/giant
steps construction of Krylov subspaces, and computes the determinant as the
constant term of a characteristic polynomial. For matrices over an abstract
ring, by the results of Baur and Strassen, the determinant algorithm, actually
a straight-line program, leads to an algorithm with the same complexity for
computing the adjoint of a matrix. However, the latter adjoint algorithm is
obtained by the reverse mode of automatic differentiation, hence somehow is not
"explicit". We present an alternative (still closely related) algorithm for the
adjoint thatcan be implemented directly, we mean without resorting to an
automatic transformation. The algorithm is deduced by applying program
differentiation techniques "by hand" to Kaltofen's method, and is completely
decribed. As subproblem, we study the differentiation of programs that compute
minimum polynomials of lineraly generated sequences, and we use a lazy
polynomial evaluation mechanism for reducing the cost of Strassen's avoidance
of divisions in our case.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 09:43:48 GMT"
}
]
| 2008-11-03T00:00:00 | [
[
"Villard",
"Gilles",
"",
"LIP"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0810.5663 | Markus Mueller | Nihat Ay, Markus Mueller, Arleta Szkola | Effective Complexity and its Relation to Logical Depth | 14 pages, 2 figures | IEEE Trans. Inf. Th., Vol. 56/9 pp. 4593-4607 (2010) | 10.1109/TIT.2010.2053892 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Effective complexity measures the information content of the regularities of
an object. It has been introduced by M. Gell-Mann and S. Lloyd to avoid some of
the disadvantages of Kolmogorov complexity, also known as algorithmic
information content. In this paper, we give a precise formal definition of
effective complexity and rigorous proofs of its basic properties. In
particular, we show that incompressible binary strings are effectively simple,
and we prove the existence of strings that have effective complexity close to
their lengths. Furthermore, we show that effective complexity is related to
Bennett's logical depth: If the effective complexity of a string $x$ exceeds a
certain explicit threshold then that string must have astronomically large
depth; otherwise, the depth can be arbitrarily small.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 11:32:26 GMT"
}
]
| 2010-11-22T00:00:00 | [
[
"Ay",
"Nihat",
""
],
[
"Mueller",
"Markus",
""
],
[
"Szkola",
"Arleta",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0810.5685 | Daniel Roche | Mark Giesbrecht and Daniel S. Roche | Interpolation of Shifted-Lacunary Polynomials | 22 pages, to appear in Computational Complexity | Computational Complexity, Vol. 19, No 3., pp. 333-354, 2010 | 10.1007/s00037-010-0294-0 | null | cs.SC cs.DS cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a "black box" function to evaluate an unknown rational polynomial f in
Q[x] at points modulo a prime p, we exhibit algorithms to compute the
representation of the polynomial in the sparsest shifted power basis. That is,
we determine the sparsity t, the shift s (a rational), the exponents 0 <= e1 <
e2 < ... < et, and the coefficients c1,...,ct in Q\{0} such that f(x) =
c1(x-s)^e1+c2(x-s)^e2+...+ct(x-s)^et. The computed sparsity t is absolutely
minimal over any shifted power basis. The novelty of our algorithm is that the
complexity is polynomial in the (sparse) representation size, and in particular
is logarithmic in deg(f). Our method combines previous celebrated results on
sparse interpolation and computing sparsest shifts, and provides a way to
handle polynomials with extremely high degree which are, in some sense, sparse
in information.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 13:35:08 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Nov 2008 00:39:28 GMT"
},
{
"version": "v3",
"created": "Mon, 10 Nov 2008 18:33:23 GMT"
},
{
"version": "v4",
"created": "Thu, 11 Dec 2008 04:05:14 GMT"
},
{
"version": "v5",
"created": "Fri, 4 Dec 2009 06:10:58 GMT"
},
{
"version": "v6",
"created": "Mon, 23 Aug 2010 16:20:07 GMT"
}
]
| 2010-12-06T00:00:00 | [
[
"Giesbrecht",
"Mark",
""
],
[
"Roche",
"Daniel S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0810.5717 | Mathias Niepert | Mathias Niepert, Dirk Van Gucht and Marc Gyssens | On the Conditional Independence Implication Problem: A Lattice-Theoretic
Approach | null | Proceedings of the 24th Conference on Uncertainty in Artificial
Intelligence, 2008, pages 435-443 | null | null | cs.AI cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A lattice-theoretic framework is introduced that permits the study of the
conditional independence (CI) implication problem relative to the class of
discrete probability measures. Semi-lattices are associated with CI statements
and a finite, sound and complete inference system relative to semi-lattice
inclusions is presented. This system is shown to be (1) sound and complete for
saturated CI statements, (2) complete for general CI statements, and (3) sound
and complete for stable CI statements. These results yield a criterion that can
be used to falsify instances of the implication problem and several heuristics
are derived that approximate this "lattice-exclusion" criterion in polynomial
time. Finally, we provide experimental results that relate our work to results
obtained from other existing inference algorithms.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 15:52:27 GMT"
}
]
| 2008-11-03T00:00:00 | [
[
"Niepert",
"Mathias",
""
],
[
"Van Gucht",
"Dirk",
""
],
[
"Gyssens",
"Marc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0810.5725 | Bart Kuijpers | Sofie Haesevoets, Bart Kuijpers | A triangle-based logic for affine-invariant querying of spatial and
spatio-temporal data | 43 pages, 11 figures | null | null | null | cs.LO cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In spatial databases, incompatibilities often arise due to different choices
of origin or unit of measurement (e.g., centimeters versus inches). By
representing and querying the data in an affine-invariant manner, we can avoid
these incompatibilities.
In practice, spatial (resp., spatio-temporal) data is often represented as a
finite union of triangles (resp., moving triangles). As two arbitrary triangles
are equal up to a unique affinity of the plane, they seem perfect candidates as
basic units for an affine-invariant query language.
We propose a so-called "triangle logic", a query language that is
affine-generic and has triangles as basic elements. We show that this language
has the same expressive power as the affine-generic fragment of first-order
logic over the reals on triangle databases. We illustrate that the proposed
language is simple and intuitive. It can also serve as a first step towards a
"moving-triangle logic" for spatio-temporal data.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 16:16:30 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Nov 2008 07:24:39 GMT"
}
]
| 2008-11-03T00:00:00 | [
[
"Haesevoets",
"Sofie",
""
],
[
"Kuijpers",
"Bart",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0810.5728 | Kousha Etessami | Kousha Etessami, Marta Kwiatkowska, Moshe Y. Vardi, and Mihalis
Yannakakis | Multi-Objective Model Checking of Markov Decision Processes | 21 pages, 2 figures | Logical Methods in Computer Science, Volume 4, Issue 4 (November
12, 2008) lmcs:990 | 10.2168/LMCS-4(4:8)2008 | null | cs.LO cs.CC cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study and provide efficient algorithms for multi-objective model checking
problems for Markov Decision Processes (MDPs). Given an MDP, M, and given
multiple linear-time (\omega -regular or LTL) properties \varphi\_i, and
probabilities r\_i \epsilon [0,1], i=1,...,k, we ask whether there exists a
strategy \sigma for the controller such that, for all i, the probability that a
trajectory of M controlled by \sigma satisfies \varphi\_i is at least r\_i. We
provide an algorithm that decides whether there exists such a strategy and if
so produces it, and which runs in time polynomial in the size of the MDP. Such
a strategy may require the use of both randomization and memory. We also
consider more general multi-objective \omega -regular queries, which we
motivate with an application to assume-guarantee compositional reasoning for
probabilistic systems.
Note that there can be trade-offs between different properties: satisfying
property \varphi\_1 with high probability may necessitate satisfying \varphi\_2
with low probability. Viewing this as a multi-objective optimization problem,
we want information about the "trade-off curve" or Pareto curve for maximizing
the probabilities of different properties. We show that one can compute an
approximate Pareto curve with respect to a set of \omega -regular properties in
time polynomial in the size of the MDP.
Our quantitative upper bounds use LP methods. We also study qualitative
multi-objective model checking problems, and we show that these can be analysed
by purely graph-theoretic methods, even though the strategies may still require
both randomization and memory.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 16:18:14 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Nov 2008 23:50:54 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Etessami",
"Kousha",
""
],
[
"Kwiatkowska",
"Marta",
""
],
[
"Vardi",
"Moshe Y.",
""
],
[
"Yannakakis",
"Mihalis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0810.5732 | Renat Nuriyev | R. Nuriyev | Practical language based on systems of definitions | 10 pages, 2 references | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The article suggests a description of a system of tables with a set of
special lists absorbing a semantics of data and reflects a fullness of data. It
shows how their parallel processing can be constructed based on the
descriptions. The approach also might be used for definition intermediate
targets for data mining and unstructured data processing.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 16:42:45 GMT"
}
]
| 2008-11-03T00:00:00 | [
[
"Nuriyev",
"R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0810.5758 | Renat Nuriyev | Renat Nuriyev | Non procedural language for parallel programs | 20 pages, will be printed in "Programming" magazine of RAS | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Probably building non procedural languages is the most prospective way for
parallel programming just because non procedural means no fixed way for
execution. The article consists of 3 parts. In first part we consider formal
systems for definition a named datasets and studying an expression power of
different subclasses. In the second part we consider a complexity of algorithms
of building sets by the definitions. In third part we consider a fullness and
flexibility of the class of program based data set definitions.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 18:44:38 GMT"
}
]
| 2008-11-03T00:00:00 | [
[
"Nuriyev",
"Renat",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0810.5763 | Pablo Fierens | Pablo Ignacio Fierens | Number of wireless sensors needed to detect a wildfire | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The lack of extensive research in the application of inexpensive wireless
sensor nodes for the early detection of wildfires motivated us to investigate
the cost of such a network. As a first step, in this paper we present several
results which relate the time to detection and the burned area to the number of
sensor nodes in the region which is protected. We prove that the probability
distribution of the burned area at the moment of detection is approximately
exponential, given that some hypotheses hold: the positions of the sensor nodes
are independent random variables uniformly distributed and the number of sensor
nodes is large. This conclusion depends neither on the number of ignition
points nor on the propagation model of the fire.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 19:11:42 GMT"
}
]
| 2008-11-03T00:00:00 | [
[
"Fierens",
"Pablo Ignacio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0810.5770 | Sergey Loyka | George Levin, Sergey Loyka | From Multi-Keyholes to Measure of Correlation and Power Imbalance in
MIMO Channels: Outage Capacity Analysis | accepted by IEEE IT Trans., 2010 | null | 10.1109/TIT.2011.2133010 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An information-theoretic analysis of a multi-keyhole channel, which includes
a number of statistically independent keyholes with possibly different
correlation matrices, is given. When the number of keyholes or/and the number
of Tx/Rx antennas is large, there is an equivalent Rayleigh-fading channel such
that the outage capacities of both channels are asymptotically equal. In the
case of a large number of antennas and for a broad class of fading
distributions, the instantaneous capacity is shown to be asymptotically
Gaussian in distribution, and compact, closed-form expressions for the mean and
variance are given. Motivated by the asymptotic analysis, a simple,
full-ordering scalar measure of spatial correlation and power imbalance in MIMO
channels is introduced, which quantifies the negative impact of these two
factors on the outage capacity in a simple and well-tractable way. It does not
require the eigenvalue decomposition, and has the full-ordering property. The
size-asymptotic results are used to prove Telatar's conjecture for
semi-correlated multi-keyhole and Rayleigh channels. Since the keyhole channel
model approximates well the relay channel in the amplify-and-forward mode in
certain scenarios, these results also apply to the latter
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 19:36:50 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Feb 2011 20:12:59 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Levin",
"George",
""
],
[
"Loyka",
"Sergey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0037 | Martin Dyer | Martin Dyer, Leslie Ann Goldberg and Mark Jerrum | A complexity dichotomy for hypergraph partition functions | 21 pages | null | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the complexity of counting homomorphisms from an $r$-uniform
hypergraph $G$ to a symmetric $r$-ary relation $H$. We give a dichotomy theorem
for $r>2$, showing for which $H$ this problem is in FP and for which $H$ it is
#P-complete. This generalises a theorem of Dyer and Greenhill (2000) for the
case $r=2$, which corresponds to counting graph homomorphisms. Our dichotomy
theorem extends to the case in which the relation $H$ is weighted, and the goal
is to compute the \emph{partition function}, which is the sum of weights of the
homomorphisms. This problem is motivated by statistical physics, where it
arises as computing the partition function for particle models in which certain
combinations of $r$ sites interact symmetrically. In the weighted case, our
dichotomy theorem generalises a result of Bulatov and Grohe (2005) for graphs,
where $r=2$. When $r=2$, the polynomial time cases of the dichotomy correspond
simply to rank-1 weights. Surprisingly, for all $r>2$ the polynomial time cases
of the dichotomy have rather more structure. It turns out that the weights must
be superimposed on a combinatorial structure defined by solutions of an
equation over an Abelian group. Our result also gives a dichotomy for a closely
related constraint satisfaction problem.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 22:42:57 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Jan 2010 15:39:33 GMT"
}
]
| 2010-01-04T00:00:00 | [
[
"Dyer",
"Martin",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Jerrum",
"Mark",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0811.0048 | Yi Su | Yi Su and Mihaela van der Schaar | Conjectural Equilibrium in Water-filling Games | 29 pages, 7 figures | null | null | null | cs.GT cs.MA | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper considers a non-cooperative game in which competing users sharing
a frequency-selective interference channel selfishly optimize their power
allocation in order to improve their achievable rates. Previously, it was shown
that a user having the knowledge of its opponents' channel state information
can make foresighted decisions and substantially improve its performance
compared with the case in which it deploys the conventional iterative
water-filling algorithm, which does not exploit such knowledge. This paper
discusses how a foresighted user can acquire this knowledge by modeling its
experienced interference as a function of its own power allocation. To
characterize the outcome of the multi-user interaction, the conjectural
equilibrium is introduced, and the existence of this equilibrium for the
investigated water-filling game is proved. Interestingly, both the Nash
equilibrium and the Stackelberg equilibrium are shown to be special cases of
the generalization of conjectural equilibrium. We develop practical algorithms
to form accurate beliefs and search desirable power allocation strategies.
Numerical simulations indicate that a foresighted user without any a priori
knowledge of its competitors' private information can effectively learn the
required information, and induce the entire system to an operating point that
improves both its own achievable rate as well as the rates of the other
participants in the water-filling game.
| [
{
"version": "v1",
"created": "Fri, 31 Oct 2008 23:59:07 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Su",
"Yi",
""
],
[
"van der Schaar",
"Mihaela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0811.0063 | Andrej Dujella | Andrej Dujella | A variant of Wiener's attack on RSA | 9 pages | Computing 85 (2009), 77-83 | 10.1007/s00607-009-0037-8 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wiener's attack is a well-known polynomial-time attack on a RSA cryptosystem
with small secret decryption exponent d, which works if d<n^{0.25}, where n=pq
is the modulus of the cryptosystem. Namely, in that case, d is the denominator
of some convergent p_m/q_m of the continued fraction expansion of e/n, and
therefore d can be computed efficiently from the public key (n,e).
There are several extensions of Wiener's attack that allow the RSA
cryptosystem to be broken when d is a few bits longer than n^{0.25}. They all
have the run-time complexity (at least) O(D^2), where d=Dn^{0.25}. Here we
propose a new variant of Wiener's attack, which uses results on Diophantine
approximations of the form |\alpha - p/q| < c/q^2, and "meet-in-the-middle"
variant for testing the candidates (of the form rq_{m+1} + sq_m) for the secret
exponent. This decreases the run-time complexity of the attack to O(D log(D))
(with the space complexity O(D)).
| [
{
"version": "v1",
"created": "Sat, 1 Nov 2008 07:08:23 GMT"
}
]
| 2021-08-30T00:00:00 | [
[
"Dujella",
"Andrej",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0811.0071 | Pierre Lescanne | St\'ephane Le Roux (LIP), Pierre Lescanne (LIP), Ren\'e Vestergaard | Conversion/Preference Games | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the concept of Conversion/Preference Games, or CP games for
short. CP games generalize the standard notion of strategic games. First we
exemplify the use of CP games. Second we formally introduce and define the
CP-games formalism. Then we sketch two `real-life' applications, namely a
connection between CP games and gene regulation networks, and the use of CP
games to formalize implied information in Chinese Wall security. We end with a
study of a particular fixed-point construction over CP games and of the
resulting existence of equilibria in possibly infinite games.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2008 08:12:20 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Roux",
"Stéphane Le",
"",
"LIP"
],
[
"Lescanne",
"Pierre",
"",
"LIP"
],
[
"Vestergaard",
"René",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0811.0077 | Deepyaman Maiti | Deepyaman Maiti, Amit Konar | Approximation of a Fractional Order System by an Integer Order Model
Using Particle Swarm Optimization Technique | IEEE Sponsored Conference on Computational Intelligence, Control And
Computer Vision In Robotics & Automation | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | System identification is a necessity in control theory. Classical control
theory usually considers processes with integer order transfer functions. Real
processes are usually of fractional order as opposed to the ideal integral
order models. A simple and elegant scheme is presented for approximation of
such a real world fractional order process by an ideal integral order model. A
population of integral order process models is generated and updated by PSO
technique, the fitness function being the sum of squared deviations from the
set of observations obtained from the actual fractional order process. Results
show that the proposed scheme offers a high degree of accuracy.
| [
{
"version": "v1",
"created": "Sat, 1 Nov 2008 10:02:00 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Maiti",
"Deepyaman",
""
],
[
"Konar",
"Amit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0811.0078 | Deepyaman Maiti | Deepyaman Maiti, Ayan Acharya, Amit Konar | A Swarm Intelligence Based Scheme for Complete and Fault-tolerant
Identification of a Dynamical Fractional Order Process | 2008 IEEE Region 10 Colloquium and the Third ICIIS, Kharagpur, INDIA.
Paper Identification Number 239 | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | System identification refers to estimation of process parameters and is a
necessity in control theory. Physical systems usually have varying parameters.
For such processes, accurate identification is particularly important. Online
identification schemes are also needed for designing adaptive controllers. Real
processes are usually of fractional order as opposed to the ideal integral
order models. In this paper, we propose a simple and elegant scheme of
estimating the parameters for such a fractional order process. A population of
process models is generated and updated by particle swarm optimization (PSO)
technique, the fitness function being the sum of squared deviations from the
actual set of observations. Results show that the proposed scheme offers a high
degree of accuracy even when the observations are corrupted to a significant
degree. Additional schemes to improve the accuracy still further are also
proposed and analyzed.
| [
{
"version": "v1",
"created": "Sat, 1 Nov 2008 10:08:20 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Maiti",
"Deepyaman",
""
],
[
"Acharya",
"Ayan",
""
],
[
"Konar",
"Amit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0811.0079 | Deepyaman Maiti | Mithun Chakraborty, Deepyaman Maiti, Amit Konar | The Application of Stochastic Optimization Algorithms to the Design of a
Fractional-order PID Controller | 2008 IEEE Region 10 Colloquium and the Third ICIIS, Kharagpur, INDIA.
Paper Identification Number: 396 | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Proportional-Integral-Derivative Controller is widely used in industries
for process control applications. Fractional-order PID controllers are known to
outperform their integer-order counterparts. In this paper, we propose a new
technique of fractional-order PID controller synthesis based on peak overshoot
and rise-time specifications. Our approach is to construct an objective
function, the optimization of which yields a possible solution to the design
problem. This objective function is optimized using two popular bio-inspired
stochastic search algorithms, namely Particle Swarm Optimization and
Differential Evolution. With the help of a suitable example, the superiority of
the designed fractional-order PID controller to an integer-order PID controller
is affirmed and a comparative study of the efficacy of the two above algorithms
in solving the optimization problem is also presented.
| [
{
"version": "v1",
"created": "Sat, 1 Nov 2008 10:11:21 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Chakraborty",
"Mithun",
""
],
[
"Maiti",
"Deepyaman",
""
],
[
"Konar",
"Amit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0811.0080 | Deepyaman Maiti | Ayan Acharya, Deepyaman Maiti, Amit Konar, Ramadoss Janarthanan | A Deterministic Model for Analyzing the Dynamics of Ant System Algorithm
and Performance Amelioration through a New Pheromone Deposition Approach | 4th IEEE International Conference on Information and Automation for
Sustainability, 2008 | null | 10.1109/ICIAFS.2008.4783979 | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ant Colony Optimization (ACO) is a metaheuristic for solving difficult
discrete optimization problems. This paper presents a deterministic model based
on differential equation to analyze the dynamics of basic Ant System algorithm.
Traditionally, the deposition of pheromone on different parts of the tour of a
particular ant is always kept unvarying. Thus the pheromone concentration
remains uniform throughout the entire path of an ant. This article introduces
an exponentially increasing pheromone deposition approach by artificial ants to
improve the performance of basic Ant System algorithm. The idea here is to
introduce an additional attracting force to guide the ants towards destination
more easily by constructing an artificial potential field identified by
increasing pheromone concentration towards the goal. Apart from carrying out
analysis of Ant System dynamics with both traditional and the newly proposed
deposition rules, the paper presents an exhaustive set of experiments performed
to find out suitable parameter ranges for best performance of Ant System with
the proposed deposition approach. Simulations reveal that the proposed
deposition rule outperforms the traditional one by a large extent both in terms
of solution quality and algorithm convergence. Thus, the contributions of the
article can be presented as follows: i) it introduces differential equation and
explores a novel method of analyzing the dynamics of ant system algorithms, ii)
it initiates an exponentially increasing pheromone deposition approach by
artificial ants to improve the performance of algorithm in terms of solution
quality and convergence time, iii) exhaustive experimentation performed
facilitates the discovery of an algebraic relationship between the parameter
set of the algorithm and feature of the problem environment.
| [
{
"version": "v1",
"created": "Sat, 1 Nov 2008 10:19:10 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Acharya",
"Ayan",
""
],
[
"Maiti",
"Deepyaman",
""
],
[
"Konar",
"Amit",
""
],
[
"Janarthanan",
"Ramadoss",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0811.0083 | Deepyaman Maiti | Deepyaman Maiti, Ayan Acharya, Mithun Chakraborty, Amit Konar,
Ramadoss Janarthanan | Tuning PID and FOPID Controllers using the Integral Time Absolute Error
Criterion | 4th IEEE International Conference on Information and Automation for
Sustainability, 2008 | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Particle swarm optimization (PSO) is extensively used for real parameter
optimization in diverse fields of study. This paper describes an application of
PSO to the problem of designing a fractional-order
proportional-integral-derivative (FOPID) controller whose parameters comprise
proportionality constant, integral constant, derivative constant, integral
order (lambda) and derivative order (delta). The presence of five optimizable
parameters makes the task of designing a FOPID controller more challenging than
conventional PID controller design. Our design method focuses on minimizing the
Integral Time Absolute Error (ITAE) criterion. The digital realization of the
deigned system utilizes the Tustin operator-based continued fraction expansion
scheme. We carry out a simulation that illustrates the effectiveness of the
proposed approach especially for realizing fractional-order plants. This paper
also attempts to study the behavior of fractional PID controller vis-a-vis that
of its integer order counterpart and demonstrates the superiority of the former
to the latter.
| [
{
"version": "v1",
"created": "Sat, 1 Nov 2008 10:25:08 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Maiti",
"Deepyaman",
""
],
[
"Acharya",
"Ayan",
""
],
[
"Chakraborty",
"Mithun",
""
],
[
"Konar",
"Amit",
""
],
[
"Janarthanan",
"Ramadoss",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0811.0113 | Andr\'e C. R. Martins | Andre C. R. Martins | A Bayesian Framework for Opinion Updates | 20 pages; major expansion and detailing | null | null | In Liu Yijun and Zhou Tao, editors, Social Physics Catena (No.3),
pages 146-157. Science Press, Beijing | physics.soc-ph cs.MA nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Opinion Dynamics lacks a theoretical basis. In this article, I propose to use
a decision-theoretic framework, based on the updating of subjective
probabilities, as that basis. We will see we get a basic tool for a better
understanding of the interaction between the agents in Opinion Dynamics
problems and for creating new models. I will review the few existing
applications of Bayesian update rules to both discrete and continuous opinion
problems and show that several traditional models can be obtained as special
cases or approximations from these Bayesian models. The empirical basis and
useful properties of the framework will be discussed and examples of how the
framework can be used to describe different problems given.
| [
{
"version": "v1",
"created": "Sat, 1 Nov 2008 20:22:18 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jul 2010 03:40:49 GMT"
}
]
| 2012-11-21T00:00:00 | [
[
"Martins",
"Andre C. R.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
]
|
0811.0123 | Mika Turkia | Mika Turkia | A computational model of affects | A pre-print version; final version published in D. Dietrich et al.
(Eds.): Simulating the Mind. Springer 2009, see
http://www.springer.com/springerwiennewyork/computer+science/book/978-3-211-09450-1
. 7 pages, 2 figures | Dietrich, D.; Fodor, G.; Zucker, G.; Bruckner, D. (Eds.):
Simulating the Mind. A Technical Neuropsychoanalytical Approach. Springer
2009, pp. 277-289 | null | null | cs.AI cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article provides a simple logical structure, in which affective concepts
(i.e. concepts related to emotions and feelings) can be defined. The set of
affects defined is similar to the set of emotions covered in the OCC model
(Ortony A., Collins A., and Clore G. L.: The Cognitive Structure of Emotions.
Cambridge University Press, 1988), but the model presented in this article is
fully computationally defined.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 03:38:59 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Nov 2008 20:38:01 GMT"
}
]
| 2008-11-12T00:00:00 | [
[
"Turkia",
"Mika",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0811.0131 | Deepyaman Maiti | Ayan Acharya, Deepyaman Maiti, Aritra Banerjee, Amit Konar | Balancing Exploration and Exploitation by an Elitist Ant System with
Exponential Pheromone Deposition Rule | 2008 IEEE Region 10 Colloquium and the Third ICIIS, Kharagpur, INDIA.
Paper ID: 250 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents an exponential pheromone deposition rule to modify the
basic ant system algorithm which employs constant deposition rule. A stability
analysis using differential equation is carried out to find out the values of
parameters that make the ant system dynamics stable for both kinds of
deposition rule. A roadmap of connected cities is chosen as the problem
environment where the shortest route between two given cities is required to be
discovered. Simulations performed with both forms of deposition approach using
Elitist Ant System model reveal that the exponential deposition approach
outperforms the classical one by a large extent. Exhaustive experiments are
also carried out to find out the optimum setting of different controlling
parameters for exponential deposition approach and an empirical relationship
between the major controlling parameters of the algorithm and some features of
problem environment.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 06:07:34 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Acharya",
"Ayan",
""
],
[
"Maiti",
"Deepyaman",
""
],
[
"Banerjee",
"Aritra",
""
],
[
"Konar",
"Amit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0811.0133 | Deepyaman Maiti | Mithun Chakraborty, Deepyaman Maiti, Amit Konar, Ramadoss Janarthanan | A Study of the Grunwald-Letnikov Definition for Minimizing the Effects
of Random Noise on Fractional Order Differential Equations | 4th IEEE International Conference on Information and Automation for
Sustainability, 2008 | null | 10.1109/ICIAFS.2008.4783931 | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Of the many definitions for fractional order differintegral, the
Grunwald-Letnikov definition is arguably the most important one. The necessity
of this definition for the description and analysis of fractional order systems
cannot be overstated. Unfortunately, the Fractional Order Differential Equation
(FODE) describing such a systems, in its original form, highly sensitive to the
effects of random noise components inevitable in a natural environment. Thus
direct application of the definition in a real-life problem can yield erroneous
results. In this article, we perform an in-depth mathematical analysis the
Grunwald-Letnikov definition in depth and, as far as we know, we are the first
to do so. Based on our analysis, we present a transformation scheme which will
allow us to accurately analyze generalized fractional order systems in presence
of significant quantities of random errors. Finally, by a simple experiment, we
demonstrate the high degree of robustness to noise offered by the said
transformation and thus validate our scheme.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 06:16:49 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Chakraborty",
"Mithun",
""
],
[
"Maiti",
"Deepyaman",
""
],
[
"Konar",
"Amit",
""
],
[
"Janarthanan",
"Ramadoss",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0811.0134 | Deepyaman Maiti | Deepyaman Maiti, Ayan Acharya, Amit Konar, Janarthanan Ramadoss | A Novel Parser Design Algorithm Based on Artificial Ants | 4th IEEE International Conference on Information and Automation for
Sustainability, 2008 | null | 10.1109/ICIAFS.2008.4783925 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article presents a unique design for a parser using the Ant Colony
Optimization algorithm. The paper implements the intuitive thought process of
human mind through the activities of artificial ants. The scheme presented here
uses a bottom-up approach and the parsing program can directly use ambiguous or
redundant grammars. We allocate a node corresponding to each production rule
present in the given grammar. Each node is connected to all other nodes
(representing other production rules), thereby establishing a completely
connected graph susceptible to the movement of artificial ants. Each ant tries
to modify this sentential form by the production rule present in the node and
upgrades its position until the sentential form reduces to the start symbol S.
Successful ants deposit pheromone on the links that they have traversed
through. Eventually, the optimum path is discovered by the links carrying
maximum amount of pheromone concentration. The design is simple, versatile,
robust and effective and obviates the calculation of the above mentioned sets
and precedence relation tables. Further advantages of our scheme lie in i)
ascertaining whether a given string belongs to the language represented by the
grammar, and ii) finding out the shortest possible path from the given string
to the start symbol S in case multiple routes exist.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 06:22:55 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Maiti",
"Deepyaman",
""
],
[
"Acharya",
"Ayan",
""
],
[
"Konar",
"Amit",
""
],
[
"Ramadoss",
"Janarthanan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0811.0135 | Deepyaman Maiti | Deepyaman Maiti, Ayan Acharya, R. Janarthanan, Amit Konar | Complete Identification of a Dynamic Fractional Order System Under
Non-ideal Conditions Using Fractional Differintegral Definitions | 16th IEEE International Conference on Advanced Computing and
Communication, 2008 | null | 10.1109/ADCOM.2008.4760462 | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This contribution deals with identification of fractional-order dynamical
systems. System identification, which refers to estimation of process
parameters, is a necessity in control theory. Real processes are usually of
fractional order as opposed to the ideal integral order models. A simple and
elegant scheme of estimating the parameters for such a fractional order process
is proposed. This method employs fractional calculus theory to find equations
relating the parameters that are to be estimated, and then estimates the
process parameters after solving the simultaneous equations. The data used for
the calculations are intentionally corrupted to simulate real-life conditions.
Results show that the proposed scheme offers a very high degree of accuracy
even for erroneous data.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 06:26:04 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Maiti",
"Deepyaman",
""
],
[
"Acharya",
"Ayan",
""
],
[
"Janarthanan",
"R.",
""
],
[
"Konar",
"Amit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0811.0136 | Deepyaman Maiti | Ayan Acharya, Deepyaman Maiti, Aritra Banerjee, R. Janarthanan, Amit
Konar | Extension of Max-Min Ant System with Exponential Pheromone Deposition
Rule | 16th IEEE International Conference on Advanced Computing and
Communication, 2008 | null | 10.1109/ADCOM.2008.4760419 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents an exponential pheromone deposition approach to improve
the performance of classical Ant System algorithm which employs uniform
deposition rule. A simplified analysis using differential equations is carried
out to study the stability of basic ant system dynamics with both exponential
and constant deposition rules. A roadmap of connected cities, where the
shortest path between two specified cities are to be found out, is taken as a
platform to compare Max-Min Ant System model (an improved and popular model of
Ant System algorithm) with exponential and constant deposition rules. Extensive
simulations are performed to find the best parameter settings for non-uniform
deposition approach and experiments with these parameter settings revealed that
the above approach outstripped the traditional one by a large extent in terms
of both solution quality and convergence time.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 06:28:50 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Acharya",
"Ayan",
""
],
[
"Maiti",
"Deepyaman",
""
],
[
"Banerjee",
"Aritra",
""
],
[
"Janarthanan",
"R.",
""
],
[
"Konar",
"Amit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0811.0137 | Deepyaman Maiti | Deepyaman Maiti, Mithun Chakraborty, Amit Konar | A Novel Approach for Complete Identification of Dynamic Fractional Order
Systems Using Stochastic Optimization Algorithms and Fractional Calculus | 5th IEEE International Conference on Electrical & Computer
Engineering, 2008 | null | 10.1109/ICECE.2008.4769333 | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This contribution deals with identification of fractional-order dynamical
systems. System identification, which refers to estimation of process
parameters, is a necessity in control theory. Real processes are usually of
fractional order as opposed to the ideal integral order models. A simple and
elegant scheme of estimating the parameters for such a fractional order process
is proposed. This method employs fractional calculus theory to find equations
relating the parameters that are to be estimated, and then estimates the
process parameters after solving the simultaneous equations. The said
simultaneous equations are generated and updated using particle swarm
optimization (PSO) technique, the fitness function being the sum of squared
deviations from the actual set of observations. The data used for the
calculations are intentionally corrupted to simulate real-life conditions.
Results show that the proposed scheme offers a very high degree of accuracy
even for erroneous data.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 06:31:15 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Maiti",
"Deepyaman",
""
],
[
"Chakraborty",
"Mithun",
""
],
[
"Konar",
"Amit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0811.0139 | Stefan Jaeger | Stefan Jaeger | Entropy, Perception, and Relativity | null | null | null | LAMP-TR-131/CAR-TR-1012/CS-TR-4799/UMIACS-TR-2006-20 | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, I expand Shannon's definition of entropy into a new form of
entropy that allows integration of information from different random events.
Shannon's notion of entropy is a special case of my more general definition of
entropy. I define probability using a so-called performance function, which is
de facto an exponential distribution. Assuming that my general notion of
entropy reflects the true uncertainty about a probabilistic event, I understand
that our perceived uncertainty differs. I claim that our perception is the
result of two opposing forces similar to the two famous antagonists in Chinese
philosophy: Yin and Yang. Based on this idea, I show that our perceived
uncertainty matches the true uncertainty in points determined by the golden
ratio. I demonstrate that the well-known sigmoid function, which we typically
employ in artificial neural networks as a non-linear threshold function,
describes the actual performance. Furthermore, I provide a motivation for the
time dilation in Einstein's Special Relativity, basically claiming that
although time dilation conforms with our perception, it does not correspond to
reality. At the end of the paper, I show how to apply this theoretical
framework to practical applications. I present recognition rates for a pattern
recognition problem, and also propose a network architecture that can take
advantage of general entropy to solve complex decision problems.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 08:02:43 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Jaeger",
"Stefan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0811.0146 | Alain Lifchitz | Alain Lifchitz (LIP6), Sandra Jhean-Larose (LPC), Guy Denhi\`ere (LPC) | Effect of Tuned Parameters on a LSA MCQ Answering Model | 9 pages | Behavior Research Methods, 41 (4), p. 1201-1209, November 2009 | 10.3758/BRM.41.4.1201 | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the current state of a work in progress, whose objective
is to better understand the effects of factors that significantly influence the
performance of Latent Semantic Analysis (LSA). A difficult task, which consists
in answering (French) biology Multiple Choice Questions, is used to test the
semantic properties of the truncated singular space and to study the relative
influence of main parameters. A dedicated software has been designed to fine
tune the LSA semantic space for the Multiple Choice Questions task. With
optimal parameters, the performances of our simple model are quite surprisingly
equal or superior to those of 7th and 8th grades students. This indicates that
semantic spaces were quite good despite their low dimensions and the small
sizes of training data sets. Besides, we present an original entropy global
weighting of answers' terms of each question of the Multiple Choice Questions
which was necessary to achieve the model's success.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 09:21:40 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Nov 2008 19:54:50 GMT"
},
{
"version": "v3",
"created": "Thu, 14 May 2009 12:51:44 GMT"
}
]
| 2009-12-10T00:00:00 | [
[
"Lifchitz",
"Alain",
"",
"LIP6"
],
[
"Jhean-Larose",
"Sandra",
"",
"LPC"
],
[
"Denhière",
"Guy",
"",
"LPC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
]
|
0811.0152 | Lianlin Li Dr | Lianlin Li, Yin Xiang and Fang Li | Theoretical Analysis of Compressive Sensing via Random Filter | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the theoretical analysis of compressive sensing via random
filter, firstly outlined by J. Romberg [compressive sensing by random
convolution, submitted to SIAM Journal on Imaging Science on July 9, 2008], has
been refined or generalized to the design of general random filter used for
compressive sensing. This universal CS measurement consists of two parts: one
is from the convolution of unknown signal with a random waveform followed by
random time-domain subsampling; the other is from the directly time-domain
subsampling of the unknown signal. It has been shown that the proposed approach
is a universally efficient data acquisition strategy, which means that the
n-dimensional signal which is S sparse in any sparse representation can be
exactly recovered from Slogn measurements with overwhelming probability.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 10:43:32 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Li",
"Lianlin",
""
],
[
"Xiang",
"Yin",
""
],
[
"Li",
"Fang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0166 | David Monniaux | David Monniaux (VERIMAG - Imag) | Automatic Modular Abstractions for Linear Constraints | null | null | null | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a method for automatically generating abstract transformers for
static analysis by abstract interpretation. The method focuses on linear
constraints on programs operating on rational, real or floating-point variables
and containing linear assignments and tests. In addition to loop-free code, the
same method also applies for obtaining least fixed points as functions of the
precondition, which permits the analysis of loops and recursive functions. Our
algorithms are based on new quantifier elimination and symbolic manipulation
techniques. Given the specification of an abstract domain, and a program block,
our method automatically outputs an implementation of the corresponding
abstract transformer. It is thus a form of program transformation. The
motivation of our work is data-flow synchronous programming languages, used for
building control-command embedded systems, but it also applies to imperative
and functional programming.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 14:47:44 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Monniaux",
"David",
"",
"VERIMAG - Imag"
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0811.0174 | Yaming Yu | Yaming Yu | A Bit of Information Theory, and the Data Augmentation Algorithm
Converges | null | IEEE Transactions on Information Theory 54 (2008) 5186--5188 | 10.1109/TIT.2008.929918 | null | cs.IT math.IT stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The data augmentation (DA) algorithm is a simple and powerful tool in
statistical computing. In this note basic information theory is used to prove a
nontrivial convergence theorem for the DA algorithm.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 16:22:53 GMT"
}
]
| 2009-09-12T00:00:00 | [
[
"Yu",
"Yaming",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
}
]
|
0811.0196 | Ning Chen | Ning Chen and Zhiyuan Yan | Reduced-Complexity Reed--Solomon Decoders Based on Cyclotomic FFTs | 15 pages, shortened version submitted to IEEE Signal Processing
Letters | null | 10.1109/LSP.2009.2014292 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we reduce the computational complexities of partial and dual
partial cyclotomic FFTs (CFFTs), which are discrete Fourier transforms where
spectral and temporal components are constrained, based on their properties as
well as a common subexpression elimination algorithm. Our partial CFFTs achieve
smaller computational complexities than previously proposed partial CFFTs.
Utilizing our CFFTs in both transform- and time-domain Reed--Solomon decoders,
we achieve significant complexity reductions.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2008 22:46:29 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Chen",
"Ning",
""
],
[
"Yan",
"Zhiyuan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0210 | Xudong Ma | Xudong Ma | Novel Blind Signal Classification Method Based on Data Compression | Camera ready version, accepted for publication in Proc. the 6th
International Conference on Information Technology : New Generations, ITNG
2009, Las Vegas, Nevada, USA. Typos in the reference list have been fixed | Proceeding of the 6th International Conference on Information
Technology : New Generations, Las Vegas, Nevada, April 27-29, 2009 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a novel algorithm for signal classification problems. We
consider a non-stationary random signal, where samples can be classified into
several different classes, and samples in each class are identically
independently distributed with an unknown probability distribution. The problem
to be solved is to estimate the probability distributions of the classes and
the correct membership of the samples to the classes. We propose a signal
classification method based on the data compression principle that the accurate
estimation in the classification problems induces the optimal signal models for
data compression. The method formulates the classification problem as an
optimization problem, where a so called {"classification gain"} is maximized.
In order to circumvent the difficulties in integer optimization, we propose a
continuous relaxation based algorithm. It is proven in this paper that
asymptotically vanishing optimality loss is incurred by the continuous
relaxation. We show by simulation results that the proposed algorithm is
effective, robust and has low computational complexity. The proposed algorithm
can be applied to solve various multimedia signal segmentation, analysis, and
pattern recognition problems.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2008 02:47:37 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Mar 2009 20:38:09 GMT"
}
]
| 2009-03-02T00:00:00 | [
[
"Ma",
"Xudong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0241 | Xiaochuan Zhao | P. Ma (1), W. Wang (1), X. Zhao (1) and K. Zheng (1) ((1) Beijing
University of Posts and Telecommunications, Beijing, China) | Joint Transmitter-Receiver Design for the Downlink Multiuser Spatial
Multiplexing MIMO System | 5 pages, 3 figures, Appeared in IEEE ICC'08 WCS | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a joint transmitter-receiver design to minimize the
weighted sum power under the post-processing signal-to-interference-and-noise
ratio (post-SINR) constraints for all subchannels. Simulation results
demonstrate that the algorithm can not only satisfy the post-SINR constraints
but also easily adjust the power distribution among the users by changing the
weights accordingly. Hence the algorithm can be used to alleviates the adjacent
cell interference by reducing the transmitting power to the edge users without
performance penalty.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2008 08:15:32 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Nov 2008 07:15:30 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Ma",
"P.",
""
],
[
"Wang",
"W.",
""
],
[
"Zhao",
"X.",
""
],
[
"Zheng",
"K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0254 | Masud Hasan | Muhammad Abdullah Adnan and Masud Hasan | Characterizing Graphs of Zonohedra | 13 pages, 5 figures | null | null | null | cs.CG cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A classic theorem by Steinitz states that a graph G is realizable by a convex
polyhedron if and only if G is 3-connected planar. Zonohedra are an important
subclass of convex polyhedra having the property that the faces of a zonohedron
are parallelograms and are in parallel pairs. In this paper we give
characterization of graphs of zonohedra. We also give a linear time algorithm
to recognize such a graph. In our quest for finding the algorithm, we prove
that in a zonohedron P both the number of zones and the number of faces in each
zone is O(square root{n}), where n is the number of vertices of P.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2008 10:19:10 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Adnan",
"Muhammad Abdullah",
""
],
[
"Hasan",
"Masud",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0811.0273 | Vinay Joseph | Vinod Sharma, Utpal Mukherji and Vinay Joseph | Efficient Energy Management Policies for Networks with Energy Harvesting
Sensor Nodes | Keywords: Optimal energy management policies, energy harvesting,
sensor networks, MAC protocols | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study sensor networks with energy harvesting nodes. The generated energy
at a node can be stored in a buffer. A sensor node periodically senses a random
field and generates a packet. These packets are stored in a queue and
transmitted using the energy available at that time at the node. For such
networks we develop efficient energy management policies. First, for a single
node, we obtain policies that are throughput optimal, i.e., the data queue
stays stable for the largest possible data rate. Next we obtain energy
management policies which minimize the mean delay in the queue. We also compare
performance of several easily implementable suboptimal policies. A greedy
policy is identified which, in low SNR regime, is throughput optimal and also
minimizes mean delay. Next using the results for a single node, we develop
efficient MAC policies.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2008 12:05:01 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Sharma",
"Vinod",
""
],
[
"Mukherji",
"Utpal",
""
],
[
"Joseph",
"Vinay",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0811.0285 | Brijesh Rai Kumar | Brijesh Kumar Rai, Bikash Kumar Dey, and Abhay Karandikar | Some results on communicating the sum of sources over a network | 5 pages, 3 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of communicating the sum of $m$ sources to $n$
terminals in a directed acyclic network. Recently, it was shown that for a
network of unit capacity links with either $m=2$ or $n=2$, the sum of the
sources can be communicated to the terminals if and only if every
source-terminal pair is connected in the network. We show in this paper that
for any finite set of primes, there exists a network where the sum of the
sources can be communicated to the terminals only over finite fields of
characteristic belonging to that set. As a corollary, this gives networks where
the sum can not be communicated over any finite field even though every source
is connected to every terminal.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2008 12:56:44 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Rai",
"Brijesh Kumar",
""
],
[
"Dey",
"Bikash Kumar",
""
],
[
"Karandikar",
"Abhay",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0310 | Fadi Badra | Fadi Badra (INRIA Lorraine - LORIA), Mathieu D'Aquin (KMI), Jean
Lieber (INRIA Lorraine - LORIA), Thomas Meilender (INRIA Lorraine - LORIA) | Edhibou: a Customizable Interface for Decision Support in a Semantic
Portal | ISWC (2008) | null | null | null | cs.AI cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Semantic Web is becoming more and more a reality, as the required
technologies have reached an appropriate level of maturity. However, at this
stage, it is important to provide tools facilitating the use and deployment of
these technologies by end-users. In this paper, we describe EdHibou, an
automatically generated, ontology-based graphical user interface that
integrates in a semantic portal. The particularity of EdHibou is that it makes
use of OWL reasoning capabilities to provide intelligent features, such as
decision support, upon the underlying ontology. We present an application of
EdHibou to medical decision support based on a formalization of clinical
guidelines in OWL and show how it can be customized thanks to an ontology of
graphical components.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2008 14:49:44 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Badra",
"Fadi",
"",
"INRIA Lorraine - LORIA"
],
[
"D'Aquin",
"Mathieu",
"",
"KMI"
],
[
"Lieber",
"Jean",
"",
"INRIA Lorraine - LORIA"
],
[
"Meilender",
"Thomas",
"",
"INRIA Lorraine - LORIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0811.0325 | Jasper Goseling | Jasper Goseling and Jos. H. Weber | Energy Benefit of Network Coding for Multiple Unicast in Wireless
Networks | null | Proceedings of the Twenty-ninth Symposium on Information Theory in
the Benelux (ISBN: 978-90-9023135-8), Leuven, Belgium, pp. 85-91, May 29-30,
2008 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that the maximum possible energy benefit of network coding for
multiple unicast on wireless networks is at least 3. This improves the
previously known lower bound of 2.4 from [1].
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2008 16:14:36 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Goseling",
"Jasper",
""
],
[
"Weber",
"Jos. H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0335 | Sylvie Saget | Sylvie Saget, Francois Legras, Gilles Coppin | Cooperative interface of a swarm of UAVs | First Conference on Humans Operating Unmanned Systems (HUMOUS-08),
Brest : France (2008) | null | null | null | cs.AI cs.HC cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | After presenting the broad context of authority sharing, we outline how
introducing more natural interaction in the design of the ground operator
interface of UV systems should help in allowing a single operator to manage the
complexity of his/her task. Introducing new modalities is one one of the means
in the realization of our vision of next- generation GOI. A more fundamental
aspect resides in the interaction manager which should help balance the
workload of the operator between mission and interaction, notably by applying a
multi-strategy approach to generation and interpretation. We intend to apply
these principles to the context of the Smaart prototype, and in this
perspective, we illustrate how to characterize the workload associated with a
particular operational situation.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2008 16:54:10 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Saget",
"Sylvie",
""
],
[
"Legras",
"Francois",
""
],
[
"Coppin",
"Gilles",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0811.0340 | Patricia Gautier | Alain Lelu (LASELDI), Martine Cadot, Pascal Cuxac (INIST) | Document stream clustering: experimenting an incremental algorithm and
AR-based tools for highlighting dynamic trends | null | International Workshop on Webometrics, Informetrics and
Scientometrics & Seventh COLLNET Meeting, France (2006) | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address here two major challenges presented by dynamic data mining: 1) the
stability challenge: we have implemented a rigorous incremental density-based
clustering algorithm, independent from any initial conditions and ordering of
the data-vectors stream, 2) the cognitive challenge: we have implemented a
stringent selection process of association rules between clusters at time t-1
and time t for directly generating the main conclusions about the dynamics of a
data-stream. We illustrate these points with an application to a two years and
2600 documents scientific information database.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2008 16:56:51 GMT"
}
]
| 2008-11-04T00:00:00 | [
[
"Lelu",
"Alain",
"",
"LASELDI"
],
[
"Cadot",
"Martine",
"",
"INIST"
],
[
"Cuxac",
"Pascal",
"",
"INIST"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0811.0359 | Jos de Bruijn Jos de Bruijn | Jos de Bruijn, Thomas Eiter, Axel Polleres, and Hans Tompits | Embedding Non-Ground Logic Programs into Autoepistemic Logic for
Knowledge Base Combination | 52 pages, submitted | null | null | null | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the context of the Semantic Web, several approaches to the combination of
ontologies, given in terms of theories of classical first-order logic and rule
bases, have been proposed. They either cast rules into classical logic or limit
the interaction between rules and ontologies. Autoepistemic logic (AEL) is an
attractive formalism which allows to overcome these limitations, by serving as
a uniform host language to embed ontologies and nonmonotonic logic programs
into it. For the latter, so far only the propositional setting has been
considered. In this paper, we present three embeddings of normal and three
embeddings of disjunctive non-ground logic programs under the stable model
semantics into first-order AEL. While the embeddings all correspond with
respect to objective ground atoms, differences arise when considering
non-atomic formulas and combinations with first-order theories. We compare the
embeddings with respect to stable expansions and autoepistemic consequences,
considering the embeddings by themselves, as well as combinations with
classical theories. Our results reveal differences and correspondences of the
embeddings and provide useful guidance in the choice of a particular embedding
for knowledge combination.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2008 18:42:01 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Oct 2009 13:57:07 GMT"
},
{
"version": "v3",
"created": "Fri, 11 Jun 2010 06:38:32 GMT"
}
]
| 2010-06-14T00:00:00 | [
[
"de Bruijn",
"Jos",
""
],
[
"Eiter",
"Thomas",
""
],
[
"Polleres",
"Axel",
""
],
[
"Tompits",
"Hans",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0811.0381 | Gabriel Istrate | Gabriel Istrate | On the dynamics of Social Balance on general networks (with an
application to XOR-SAT) | null | Fundamenta Informaticae, 91 (2), pp. 341-356, 2009. | null | null | cs.DM math.CO math.PR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study nondeterministic and probabilistic versions of a discrete dynamical
system (due to T. Antal, P. L. Krapivsky, and S. Redner) inspired by Heider's
social balance theory. We investigate the convergence time of this dynamics on
several classes of graphs. Our contributions include:
1. We point out the connection between the triad dynamics and a
generalization of annihilating walks to hypergraphs. In particular, this
connection allows us to completely characterize the recurrent states in graphs
where each edge belongs to at most two triangles.
2. We also solve the case of hypergraphs that do not contain edges consisting
of one or two vertices.
3. We show that on the so-called "triadic cycle" graph, the convergence time
is linear.
4. We obtain a cubic upper bound on the convergence time on 2-regular triadic
simplexes G. This bound can be further improved to a quantity that depends on
the Cheeger constant of G. In particular this provides some rigorous
counterparts to previous experimental observations.
We also point out an application to the analysis of the random walk algorithm
on certain instances of the 3-XOR-SAT problem.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2008 20:19:57 GMT"
}
]
| 2010-03-18T00:00:00 | [
[
"Istrate",
"Gabriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0811.0405 | Bernardo Huberman | Gabor Szabo and Bernardo A. Huberman | Predicting the popularity of online content | null | null | null | null | cs.CY cs.IR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a method for accurately predicting the long time popularity of
online content from early measurements of user access. Using two content
sharing portals, Youtube and Digg, we show that by modeling the accrual of
views and votes on content offered by these services we can predict the
long-term dynamics of individual submissions from initial data. In the case of
Digg, measuring access to given stories during the first two hours allows us to
forecast their popularity 30 days ahead with remarkable accuracy, while
downloads of Youtube videos need to be followed for 10 days to attain the same
performance. The differing time scales of the predictions are shown to be due
to differences in how content is consumed on the two portals: Digg stories
quickly become outdated, while Youtube videos are still found long after they
are initially submitted to the portal. We show that predictions are more
accurate for submissions for which attention decays quickly, whereas
predictions for evergreen content will be prone to larger errors.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 05:38:58 GMT"
}
]
| 2008-11-06T00:00:00 | [
[
"Szabo",
"Gabor",
""
],
[
"Huberman",
"Bernardo A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0811.0413 | Xiaochuan Zhao | Pengfei Ma (1), Xiaochuan Zhao (1), Mugen Peng (1), Wenbo Wang (1)
((1) Beijing University of Posts and Telecommunications, Beijing, China) | Robust Linear Processing for Downlink Multiuser MIMO System With
Imperfectly Known Channel | 5 pages, 4 figures, Appeared in IEEE WCNC'08 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a roust downlink multiuser MIMO scheme that exploits the
channel mean and antenna correlations to alleviate the performance penalty due
to the mismatch between the true and estimated CSI.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 02:21:40 GMT"
}
]
| 2008-11-05T00:00:00 | [
[
"Ma",
"Pengfei",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Zhao",
"Xiaochuan",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Peng",
"Mugen",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Wang",
"Wenbo",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0417 | Xiaochuan Zhao | Xiaochuan Zhao (1), Tao Peng (1) and Wenbo Wang (1) ((1) Beijing
University of Posts and Telecommunications, Beijing, China) | Parametric Channel Estimation by Exploiting Hopping Pilots in Uplink
OFDMA | 5 pages, 3 figures, Appeared in IEEE PIMRC'08 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a parametric channel estimation algorithm applicable to
uplink of OFDMA systems with pseudo-random subchannelization. It exploits the
hopping pilots to facilitate ESPRIT to estimate the delay subspace of the
multipath fading channel, and utilizes the global pilot tones to interpolate on
data subcarriers. Hence, it outperforms the traditional local channel
interpolators considerably.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 03:04:47 GMT"
}
]
| 2008-11-05T00:00:00 | [
[
"Zhao",
"Xiaochuan",
""
],
[
"Peng",
"Tao",
""
],
[
"Wang",
"Wenbo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0419 | Xiaochuan Zhao | Xiaochuan Zhao (1), Tao Peng (1), Ming Yang (1) and Wenbo Wang (1)
((1) Beijing University of Posts and Telecommunications, Beijing, China) | Doppler Spread Estimation by Subspace Tracking for OFDM Systems | 5 pages, 3 figures, To appear in IEEE GLOBECOM'08 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a novel maximum Doppler spread estimation algorithm for
OFDM systems with the comb-type pilot pattern. By tracking the drifting delay
subspace of the multipath channel, the time correlation function is measured at
a high accuracy, which accordingly improves the estimation accuracy of the
maximum Doppler spread considerably.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 03:30:20 GMT"
}
]
| 2008-11-05T00:00:00 | [
[
"Zhao",
"Xiaochuan",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Peng",
"Tao",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Yang",
"Ming",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Wang",
"Wenbo",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0430 | Xiaochuan Zhao | Xiaochuan Zhao (1), Tao Peng (1), Ming Yang (1) and Wenbo Wang (1)
((1) Beijing University of Posts and Telecommunications, Beijing, China) | An Analysis of the Bias-Property of the Sample Auto-Correlation Matrices
of Doubly Selective Fading Channels for OFDM Systems | not sufficiently novel | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper derives the analytic expression of the sample auto-correlation
matrix from the least-squared channel estimation of doubly selective fading
channels for OFDM systems. According to the expression, the sample
auto-correlation matrix reveals the bias property which would cause the model
mismatch and therefore deteriorate the performance of channel estimation.
Numerical results demonstrate the bias property and corresponding analysis.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 05:59:09 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Apr 2015 22:28:18 GMT"
}
]
| 2015-04-17T00:00:00 | [
[
"Zhao",
"Xiaochuan",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Peng",
"Tao",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Yang",
"Ming",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Wang",
"Wenbo",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0431 | Xiaochuan Zhao | Xiaochuan Zhao (1), Ming Yang (1), Tao Peng (1) and Wenbo Wang (1)
((1) Beijing University of Posts and Telecommunications, Beijing, China) | On the Cramer-Rao Lower Bound for Frequency Correlation Matrices of
Doubly Selective Fading Channels for OFDM Systems | 5 pages, 7 figures, Submitted to IEEE ICC'09 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The analytic expression of CRLB and the maximum likelihood estimator for the
sample frequency correlation matrices in doubly selective fading channels for
OFDM systems are reported in this paper. According to the analytical and
numerical results, the amount of samples affects the average mean square error
dominantly while the SNR and the Doppler spread do negligibly.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 06:55:20 GMT"
}
]
| 2008-11-05T00:00:00 | [
[
"Zhao",
"Xiaochuan",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Yang",
"Ming",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Peng",
"Tao",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Wang",
"Wenbo",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0433 | Xiaochuan Zhao | Xiaochuan Zhao (1), Tao Peng (1), Ming Yang (1) and Wenbo Wang (1)
((1) Beijing University of Posts and Telecommunications, Beijing, China) | On the Cramer-Rao Lower Bound for Spatial Correlation Matrices of Doubly
Selective Fading Channels for MIMO OFDM Systems | 6 pages, 8 figures, Submitted to IEEE WCNC'09 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The analytic expression of CRLB and the maximum likelihood estimator for
spatial correlation matrices in time-varying multipath fading channels for MIMO
OFDM systems are reported in this paper. The analytical and numerical results
reveal that the amount of samples and the order of frequency selectivity have
dominant impact on the CRLB. Moreover, the number of pilot tones, SNR as well
as the normalized maximum Doppler spread together influence the effective order
of frequency selectivity.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 06:51:38 GMT"
}
]
| 2008-11-05T00:00:00 | [
[
"Zhao",
"Xiaochuan",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Peng",
"Tao",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Yang",
"Ming",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Wang",
"Wenbo",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0436 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | Instruction sequences for the production of processes | 23 pages; acknowledgement corrected, reference updated | null | null | PRG0814 | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Single-pass instruction sequences under execution are considered to produce
behaviours to be controlled by some execution environment. Threads as
considered in thread algebra model such behaviours: upon each action performed
by a thread, a reply from its execution environment determines how the thread
proceeds. Threads in turn can be looked upon as producing processes as
considered in process algebra. We show that, by apposite choice of basic
instructions, all processes that can only be in a finite number of states can
be produced by single-pass instruction sequences.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 07:24:12 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Nov 2008 10:08:03 GMT"
}
]
| 2008-11-18T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0811.0452 | Xiaochuan Zhao | Xiaochuan Zhao (1), Tao Peng (1), Ming Yang (1) and Wenbo Wang (1)
((1) Beijing University of Posts and Telecommunications, Beijing, China) | Doppler Spread Estimation by Tracking the Delay-Subspace for OFDM
Systems in Doubly Selective Fading Channels | 4 pages, 2 figures, Appear in IEEE Signal Process. Letters | null | 10.1109/LSP.2008.2010812 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A novel maximum Doppler spread estimation algorithm for OFDM systems with
comb-type pilot pattern is presented in this paper. By tracking the drifting
delay subspace of time-varying multipath channels, a Doppler dependent
parameter can be accurately measured and further expanded and transformed into
a non-linear high-order polynomial equation, from which the maximum Doppler
spread is readily solved by resorting to the Newton's method. Its performance
is demonstrated by simulations.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 09:04:35 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Zhao",
"Xiaochuan",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Peng",
"Tao",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Yang",
"Ming",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
],
[
"Wang",
"Wenbo",
"",
"Beijing University of Posts and Telecommunications, Beijing, China"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0453 | Cynthia Wagner CW | Cynthia Wagner, and Christoph Schommer | CoZo+ - A Content Zoning Engine for textual documents | 4 pages, 4 figures | null | null | null | cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Content zoning can be understood as a segmentation of textual documents into
zones. This is inspired by [6] who initially proposed an approach for the
argumentative zoning of textual documents. With the prototypical CoZo+ engine,
we focus on content zoning towards an automatic processing of textual streams
while considering only the actors as the zones. We gain information that can be
used to realize an automatic recognition of content for pre-defined actors. We
understand CoZo+ as a necessary pre-step towards an automatic generation of
summaries and to make intellectual ownership of documents detectable.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 09:08:32 GMT"
}
]
| 2008-11-05T00:00:00 | [
[
"Wagner",
"Cynthia",
""
],
[
"Schommer",
"Christoph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0811.0463 | Stefan Jaeger | Stefan Jaeger | Solving the P/NP Problem under Intrinsic Uncertainty | typos corrected, figure added, statements clarified | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Heisenberg's uncertainty principle states that it is not possible to compute
both the position and momentum of an electron with absolute certainty. However,
this computational limitation, which is central to quantum mechanics, has no
counterpart in theoretical computer science. Here, I will show that we can
distinguish between the complexity classes P and NP when we consider intrinsic
uncertainty in our computations, and take uncertainty about whether a bit
belongs to the program code or machine input into account. Given intrinsic
uncertainty, every output is uncertain, and computations become meaningful only
in combination with a confidence level. In particular, it is impossible to
compute solutions with absolute certainty as this requires infinite run-time.
Considering intrinsic uncertainty, I will present a function that is in NP but
not in P, and thus prove that P is a proper subset of NP. I will also show that
all traditional hard decision problems have polynomial-time algorithms that
provide solutions with confidence under uncertainty.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 10:08:47 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Nov 2008 07:47:38 GMT"
}
]
| 2008-11-10T00:00:00 | [
[
"Jaeger",
"Stefan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0811.0475 | Manoj Prabhakaran | Yuval Ishai, Manoj Prabhakaran and Amit Sahai | Secure Arithmetic Computation with No Honest Majority | minor editorial changes | null | null | null | cs.CR cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the complexity of securely evaluating arithmetic circuits over
finite rings. This question is motivated by natural secure computation tasks.
Focusing mainly on the case of two-party protocols with security against
malicious parties, our main goals are to: (1) only make black-box calls to the
ring operations and standard cryptographic primitives, and (2) minimize the
number of such black-box calls as well as the communication overhead.
We present several solutions which differ in their efficiency, generality,
and underlying intractability assumptions. These include:
1. An unconditionally secure protocol in the OT-hybrid model which makes a
black-box use of an arbitrary ring $R$, but where the number of ring operations
grows linearly with (an upper bound on) $\log|R|$.
2. Computationally secure protocols in the OT-hybrid model which make a
black-box use of an underlying ring, and in which the number of ring operations
does not grow with the ring size. These results extend a previous approach of
Naor and Pinkas for secure polynomial evaluation (SIAM J. Comput., 35(5),
2006).
3. A protocol for the rings $\mathbb{Z}_m=\mathbb{Z}/m\mathbb{Z}$ which only
makes a black-box use of a homomorphic encryption scheme. When $m$ is prime,
the (amortized) number of calls to the encryption scheme for each gate of the
circuit is constant.
All of our protocols are in fact UC-secure in the OT-hybrid model and can be
generalized to multiparty computation with an arbitrary number of malicious
parties.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 11:18:06 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Nov 2008 16:40:42 GMT"
},
{
"version": "v3",
"created": "Sat, 8 Nov 2008 17:54:42 GMT"
}
]
| 2008-11-08T00:00:00 | [
[
"Ishai",
"Yuval",
""
],
[
"Prabhakaran",
"Manoj",
""
],
[
"Sahai",
"Amit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0811.0537 | Rajeev Alur | Rajeev Alur (UPenn), Marcelo Arenas (PUC, Chile), Pablo Barcelo (U
Chile), Kousha Etessami (U Edinburgh), Neil Immerman (UMass), Leonid Libkin
(Edinbugh) | First-Order and Temporal Logics for Nested Words | revised and corrected version of Mar 03, 2011 | Logical Methods in Computer Science, Volume 4, Issue 4 (November
25, 2008) lmcs:782 | 10.2168/LMCS-4(4:11)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nested words are a structured model of execution paths in procedural
programs, reflecting their call and return nesting structure. Finite nested
words also capture the structure of parse trees and other tree-structured data,
such as XML. We provide new temporal logics for finite and infinite nested
words, which are natural extensions of LTL, and prove that these logics are
first-order expressively-complete. One of them is based on adding a "within"
modality, evaluating a formula on a subword, to a logic CaRet previously
studied in the context of verifying properties of recursive state machines
(RSMs). The other logic, NWTL, is based on the notion of a summary path that
uses both the linear and nesting structures. For NWTL we show that
satisfiability is EXPTIME-complete, and that model-checking can be done in time
polynomial in the size of the RSM model and exponential in the size of the NWTL
formula (and is also EXPTIME-complete). Finally, we prove that first-order
logic over nested words has the three-variable property, and we present a
temporal logic for nested words which is complete for the two-variable fragment
of first-order.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 15:30:12 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Nov 2008 00:54:10 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Mar 2011 16:16:19 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Alur",
"Rajeev",
"",
"UPenn"
],
[
"Arenas",
"Marcelo",
"",
"PUC, Chile"
],
[
"Barcelo",
"Pablo",
"",
"U\n Chile"
],
[
"Etessami",
"Kousha",
"",
"U Edinburgh"
],
[
"Immerman",
"Neil",
"",
"UMass"
],
[
"Libkin",
"Leonid",
"",
"Edinbugh"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0811.0543 | Charlotte Hucher | Charlotte Hucher, Ghaya Rekaya-Ben Othman and Ahmed Saadani | Incomplete decode-and-forward protocol using distributed space-time
block codes | 21 pages, 12 figures, submitted to Trans. Wireless Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we explore the introduction of distributed space-time codes in
decode-and-forward (DF) protocols. A first protocol named the Asymmetric DF is
presented. It is based on two phases of different lengths, defined so that
signals can be fully decoded at relays. This strategy brings full diversity but
the symbol rate is not optimal. To solve this problem a second protocol named
the Incomplete DF is defined. It is based on an incomplete decoding at the
relays reducing the length of the first phase. This last strategy brings both
full diversity and full symbol rate. The outage probability and the simulation
results show that the Incomplete DF has better performance than any existing DF
protocol and than the non-orthogonal amplify-and-forward (NAF) strategy using
the same space-time codes. Moreover the diversity-multiplexing gain tradeoff
(DMT) of this new DF protocol is proven to be the same as the one of the NAF.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 15:55:15 GMT"
}
]
| 2008-11-05T00:00:00 | [
[
"Hucher",
"Charlotte",
""
],
[
"Othman",
"Ghaya Rekaya-Ben",
""
],
[
"Saadani",
"Ahmed",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0573 | Carl Lagoze | Carl Lagoze, Herbert Van de Sompel, Michael Nelson, Simeon Warner,
Robert Sanderson, Pete Johnston | A Web-Based Resource Model for eScience: Object Reuse & Exchange | 2008 Microsoft eScience Workshop, Indianapolis | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Work in the Open Archives Initiative - Object Reuse and Exchange (OAI-ORE)
focuses on an important aspect of infrastructure for eScience: the
specification of the data model and a suite of implementation standards to
identify and describe compound objects. These are objects that aggregate
multiple sources of content including text, images, data, visualization tools,
and the like. These aggregations are an essential product of eScience, and will
become increasingly common in the age of data-driven scholarship. The OAI-ORE
specifications conform to the core concepts of the Web architecture and the
semantic Web, ensuring that applications that use them will integrate well into
the general Web environment.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 19:07:36 GMT"
}
]
| 2008-11-05T00:00:00 | [
[
"Lagoze",
"Carl",
""
],
[
"Van de Sompel",
"Herbert",
""
],
[
"Nelson",
"Michael",
""
],
[
"Warner",
"Simeon",
""
],
[
"Sanderson",
"Robert",
""
],
[
"Johnston",
"Pete",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0811.0579 | Gilles Serasset | Gilles s\'erasset (IMAG, Clips - Imag, Lig), Christian Boitet (IMAG,
Clips - Imag, Lig) | UNL-French deconversion as transfer & generation from an interlingua
with possible quality enhancement through offline human interaction | null | MACHINE TRANSLATION SUMMIT VII, Singapour : Singapour (1999) | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the architecture of the UNL-French deconverter, which "generates"
from the UNL interlingua by first"localizing" the UNL form for French, within
UNL, and then applying slightly adapted but classical transfer and generation
techniques, implemented in GETA's Ariane-G5 environment, supplemented by some
UNL-specific tools. Online interaction can be used during deconversion to
enhance output quality and is now used for development purposes. We show how
interaction could be delayed and embedded in the postedition phase, which would
then interact not directly with the output text, but indirectly with several
components of the deconverter. Interacting online or offline can improve the
quality not only of the utterance at hand, but also of the utterances processed
later, as various preferences may be automatically changed to let the
deconverter "learn".
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 19:31:58 GMT"
}
]
| 2008-11-05T00:00:00 | [
[
"sérasset",
"Gilles",
"",
"IMAG, Clips - Imag, Lig"
],
[
"Boitet",
"Christian",
"",
"IMAG,\n Clips - Imag, Lig"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0811.0582 | Jean Francois Nezan | Maxime Pelcat (IETR), Slaheddine Aridhi, Jean Fran\c{c}ois Nezan
(IETR) | Optimization of automatically generated multi-core code for the LTE
RACH-PD algorithm | null | DASIP 2008, Bruxelles : Belgique (2008) | null | null | cs.MM cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Embedded real-time applications in communication systems require high
processing power. Manual scheduling devel-oped for single-processor
applications is not suited to multi-core architectures. The Algorithm
Architecture Matching (AAM) methodology optimizes static application
implementation on multi-core architectures. The Random Access Channel Preamble
Detection (RACH-PD) is an algorithm for non-synchronized access of Long Term
Evolu-tion (LTE) wireless networks. LTE aims to improve the spectral efficiency
of the next generation cellular system. This paper de-scribes a complete
methodology for implementing the RACH-PD. AAM prototyping is applied to the
RACH-PD which is modelled as a Synchronous DataFlow graph (SDF). An efficient
implemen-tation of the algorithm onto a multi-core DSP, the TI C6487, is then
explained. Benchmarks for the solution are given.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 19:36:16 GMT"
}
]
| 2008-11-05T00:00:00 | [
[
"Pelcat",
"Maxime",
"",
"IETR"
],
[
"Aridhi",
"Slaheddine",
"",
"IETR"
],
[
"Nezan",
"Jean François",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0811.0602 | Patricia Gautier | Alain Lelu (LASELDI), Pascal Cuxac (INIST), Joel Johansson (INIST) | Classification dynamique d'un flux documentaire : une \'evaluation
statique pr\'ealable de l'algorithme GERMEN | null | JADT 2006 : 8es Journ\'ees internationales d'Analyse statistique
des Donn\'ees Textuelles, France (2006) | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data-stream clustering is an ever-expanding subdomain of knowledge
extraction. Most of the past and present research effort aims at efficient
scaling up for the huge data repositories. Our approach focuses on qualitative
improvement, mainly for "weak signals" detection and precise tracking of
topical evolutions in the framework of information watch - though scalability
is intrinsically guaranteed in a possibly distributed implementation. Our
GERMEN algorithm exhaustively picks up the whole set of density peaks of the
data at time t, by identifying the local perturbations induced by the current
document vector, such as changing cluster borders, or new/vanishing clusters.
Optimality yields from the uniqueness 1) of the density landscape for any value
of our zoom parameter, 2) of the cluster allocation operated by our border
propagation rule. This results in a rigorous independence from the data
presentation ranking or any initialization parameter. We present here as a
first step the only assessment of a static view resulting from one year of the
CNRS/INIST Pascal database in the field of geotechnics.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 20:42:52 GMT"
}
]
| 2008-11-05T00:00:00 | [
[
"Lelu",
"Alain",
"",
"LASELDI"
],
[
"Cuxac",
"Pascal",
"",
"INIST"
],
[
"Johansson",
"Joel",
"",
"INIST"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0811.0603 | Patricia Gautier | Veronila Lux-Pogodalla (INIST), Eric San Juan | Query Refinement by Multi Word Term expansions and semantic synonymy | null | InSciT2006, medira : Espagne (2006) | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We developed a system, TermWatch
(https://stid-bdd.iut.univ-metz.fr/TermWatch/index.pl), which combines a
linguistic extraction of terms, their structuring into a terminological network
with a clustering algorithm. In this paper we explore its ability in
integrating the most promising aspects of the studies on query refinement:
choice of meaningful text units to cluster (domain terms), choice of tight
semantic relations with which to cluster terms, structuring of terms in a
network enabling abetter perception of domain concepts. We have run this
experiment on the 367 645 English abstracts of PASCAL 2005-2006 bibliographic
database (http://www.inist.fr) and compared the structured terminological
resource automatically build by TermWarch to the English segment of TermScience
resource (http://termsciences.inist.fr/) containing 88 211 terms.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 20:43:29 GMT"
}
]
| 2008-11-05T00:00:00 | [
[
"Lux-Pogodalla",
"Veronila",
"",
"INIST"
],
[
"Juan",
"Eric San",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0811.0623 | Joel Ratsaby | J. Ratsaby and J. Chaskalovic | Algorithmic complexity and randomness in elastic solids | null | null | null | null | cs.CC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A system comprised of an elastic solid and its response to an external random
force sequence is shown to behave based on the principles of the theory of
algorithmic complexity and randomness. The solid distorts the randomness of an
input force sequence in a way proportional to its algorithmic complexity. We
demonstrate this by numerical analysis of a one-dimensional vibrating elastic
solid (the system) on which we apply a maximally random input force. The level
of complexity of the system is controlled via external parameters. The output
response is the field of displacements observed at several positions on the
body. The algorithmic complexity and stochasticity of the resulting output
displacement sequence is measured and compared against the complexity of the
system. The results show that the higher the system complexity the more
random-deficient the output sequence. This agrees with the theory introduced in
[16] which states that physical systems such as this behave as algorithmic
selection-rules which act on random actions in their surroundings.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2008 21:34:54 GMT"
}
]
| 2008-11-06T00:00:00 | [
[
"Ratsaby",
"J.",
""
],
[
"Chaskalovic",
"J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0637 | Qing Zhao | Sahand H.A. Ahmad, Mingyan Liu, Tara Javidi, Qing Zhao, Bhaskar
Krishnamachari | Optimality of Myopic Sensing in Multi-Channel Opportunistic Access | Revised version | null | null | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider opportunistic communications over multiple channels where the
state ("good" or "bad") of each channel evolves as independent and identically
distributed Markov processes. A user, with limited sensing and access
capability, chooses one channel to sense and subsequently access (based on the
sensed channel state) in each time slot. A reward is obtained when the user
senses and accesses a "good" channel. The objective is to design the optimal
channel selection policy that maximizes the expected reward accrued over time.
This problem can be generally cast as a Partially Observable Markov Decision
Process (POMDP) or a restless multi-armed bandit process, to which optimal
solutions are often intractable. We show in this paper that the myopic policy,
with a simple and robust structure, achieves optimality under certain
conditions. This result finds applications in opportunistic communications in
fading environment, cognitive radio networks for spectrum overlay, and
resource-constrained jamming and anti-jamming.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 02:21:52 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Mar 2009 22:40:53 GMT"
}
]
| 2009-03-11T00:00:00 | [
[
"Ahmad",
"Sahand H. A.",
""
],
[
"Liu",
"Mingyan",
""
],
[
"Javidi",
"Tara",
""
],
[
"Zhao",
"Qing",
""
],
[
"Krishnamachari",
"Bhaskar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0699 | Hiroki Morizumi | Hiroki Morizumi | A Note on the Inversion Complexity of Boolean Functions in Boolean
Formulas | 5 pages, 1 figures | null | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note, we consider the minimum number of NOT operators in a Boolean
formula representing a Boolean function. In circuit complexity theory, the
minimum number of NOT gates in a Boolean circuit computing a Boolean function
$f$ is called the inversion complexity of $f$. In 1958, Markov determined the
inversion complexity of every Boolean function and particularly proved that
$\lceil \log_2(n+1) \rceil$ NOT gates are sufficient to compute any Boolean
function on $n$ variables. As far as we know, no result is known for inversion
complexity in Boolean formulas, i.e., the minimum number of NOT operators in a
Boolean formula representing a Boolean function. The aim of this note is
showing that we can determine the inversion complexity of every Boolean
function in Boolean formulas by arguments based on the study of circuit
complexity.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 11:22:15 GMT"
}
]
| 2008-11-06T00:00:00 | [
[
"Morizumi",
"Hiroki",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0811.0705 | Lianlin Li Dr | Lianlin Li, wenji zhang and Fang Li | The Design of Sparse Antenna Array | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of antenna array synthesis is to achieve a desired radiation pattern
with the minimum number of antenna elements. In this paper the antenna
synthesis problem is studied from a totally new perspective. One of the key
principles of compressive sensing is that the signal to be sensed should be
sparse or compressible. This coincides with the requirement of minimum number
of element in the antenna array synthesis problem. In this paper the antenna
element of the array can be efficiently reduced via compressive sensing, which
shows a great improvement to the existing antenna synthesis method. Moreover,
the desired radiation pattern can be achieved in a very computation time which
is even shorter than the existing method. Numerical examples are presented to
show the high efficiency of the proposed method.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 12:03:42 GMT"
}
]
| 2008-11-06T00:00:00 | [
[
"Li",
"Lianlin",
""
],
[
"zhang",
"wenji",
""
],
[
"Li",
"Fang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0709 | Joost Broekens | Joost Broekens | MMOGs as Social Experiments: the Case of Environmental Laws | null | null | null | null | cs.CY | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper we argue that Massively Multiplayer Online Games (MMOGs), also
known as Large Games are an interesting research tool for policy
experimentation. One of the major problems with lawmaking is that testing the
laws is a difficult enterprise. Here we show that the concept of an MMOG can be
used to experiment with environmental laws on a large scale, provided that the
MMOG is a real game, i.e., it is fun, addictive, presents challenges that last,
etc.. We present a detailed game concept as an initial step.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 12:10:21 GMT"
}
]
| 2008-11-06T00:00:00 | [
[
"Broekens",
"Joost",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0811.0717 | Patricia Gautier | Eric San Juan (INIST), Ivana Roche (INIST) | Visualization of association graphs for assisting the interpretation of
classifications | International workshop on Webometrics, informetrics and
scientometrics. Seventh collnet meeting, Nancy : France (2005) | null | null | null | stat.AP cs.DL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a query on the PASCAL database maintained by the INIST, we design user
interfaces to visualize and browse two types of graphs extracted from
abstracts: 1) the graph of all associations between authors (co-author graph),
2) the graph of strong associations between authors and terms automatically
extracted from abstracts and grouped using linguistic variations. We adapt for
this purpose the TermWatch system that comprises a term extractor, a relation
identifier which yields the terminological network and a clustering module. The
results are output on two interfaces: a graphic one mapping the clusters in a
2D space and a terminological hypertext network allowing the user to
interactively explore results and return to source texts.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 12:58:38 GMT"
}
]
| 2008-11-06T00:00:00 | [
[
"Juan",
"Eric San",
"",
"INIST"
],
[
"Roche",
"Ivana",
"",
"INIST"
]
]
| [
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0811.0719 | Patricia Gautier | Xavier Polanco (INIST), Ivana Roche (INIST), Dominique Besagni (INIST) | Web Usage Analysis: New Science Indicators and Co-usage | null | S\'eminaire VSST 2006, Lille : France (2006) | null | null | cs.IR stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new type of statistical analysis of the science and technical information
(STI) in the Web context is produced. We propose a set of indicators about Web
users, visualized bibliographic records, and e-commercial transactions. In
addition, we introduce two Web usage factors. Finally, we give an overview of
the co-usage analysis. For these tasks, we introduce a computer based system,
called Miri@d, which produces descriptive statistical information about the Web
users' searching behaviour, and what is effectively used from a free access
digital bibliographical database. The system is conceived as a server of
statistical data which are carried out beforehand, and as an interactive server
for online statistical work. The results will be made available to analysts,
who can use this descriptive statistical information as raw data for their
indicator design tasks, and as input for multivariate data analysis, clustering
analysis, and mapping. Managers also can exploit the results in order to
improve management and decision-making.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 13:00:52 GMT"
}
]
| 2008-11-06T00:00:00 | [
[
"Polanco",
"Xavier",
"",
"INIST"
],
[
"Roche",
"Ivana",
"",
"INIST"
],
[
"Besagni",
"Dominique",
"",
"INIST"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
]
|
0811.0726 | Won-Yong Shin | Won-Yong Shin, Sang-Woon Jeon, Natasha Devroye, Mai H. Vu, Sae-Young
Chung, Yong H. Lee, and Vahid Tarokh | Improved Capacity Scaling in Wireless Networks With Infrastructure | 26 pages, 10 figures, 1 table, Under revision for IEEE Transactions
on Information Theory | null | 10.1109/TIT.2011.2158881 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper analyzes the impact and benefits of infrastructure support in
improving the throughput scaling in networks of $n$ randomly located wireless
nodes. The infrastructure uses multi-antenna base stations (BSs), in which the
number of BSs and the number of antennas at each BS can scale at arbitrary
rates relative to $n$. Under the model, capacity scaling laws are analyzed for
both dense and extended networks. Two BS-based routing schemes are first
introduced in this study: an infrastructure-supported single-hop (ISH) routing
protocol with multiple-access uplink and broadcast downlink and an
infrastructure-supported multi-hop (IMH) routing protocol. Then, their
achievable throughput scalings are analyzed. These schemes are compared against
two conventional schemes without BSs: the multi-hop (MH) transmission and
hierarchical cooperation (HC) schemes. It is shown that a linear throughput
scaling is achieved in dense networks, as in the case without help of BSs. In
contrast, the proposed BS-based routing schemes can, under realistic network
conditions, improve the throughput scaling significantly in extended networks.
The gain comes from the following advantages of these BS-based protocols.
First, more nodes can transmit simultaneously in the proposed scheme than in
the MH scheme if the number of BSs and the number of antennas are large enough.
Second, by improving the long-distance signal-to-noise ratio (SNR), the
received signal power can be larger than that of the HC, enabling a better
throughput scaling under extended networks. Furthermore, by deriving the
corresponding information-theoretic cut-set upper bounds, it is shown under
extended networks that a combination of four schemes IMH, ISH, MH, and HC is
order-optimal in all operating regimes.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 13:56:26 GMT"
},
{
"version": "v2",
"created": "Sun, 4 Apr 2010 04:36:31 GMT"
},
{
"version": "v3",
"created": "Tue, 6 Apr 2010 02:28:49 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Shin",
"Won-Yong",
""
],
[
"Jeon",
"Sang-Woon",
""
],
[
"Devroye",
"Natasha",
""
],
[
"Vu",
"Mai H.",
""
],
[
"Chung",
"Sae-Young",
""
],
[
"Lee",
"Yong H.",
""
],
[
"Tarokh",
"Vahid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0731 | Romain Couillet | Romain Couillet, Merouane Debbah | Cognitive OFDM network sensing: a free probability approach | 12 pages, 10 figures, 2 tables | null | null | null | cs.IT cs.AI math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a practical power detection scheme for OFDM terminals, based
on recent free probability tools, is proposed. The objective is for the
receiving terminal to determine the transmission power and the number of the
surrounding base stations in the network. However, thesystem dimensions of the
network model turn energy detection into an under-determined problem. The focus
of this paper is then twofold: (i) discuss the maximum amount of information
that an OFDM terminal can gather from the surrounding base stations in the
network, (ii) propose a practical solution for blind cell detection using the
free deconvolution tool. The efficiency of this solution is measured through
simulations, which show better performance than the classical power detection
methods.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 14:34:23 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Nov 2008 19:05:04 GMT"
}
]
| 2008-11-25T00:00:00 | [
[
"Couillet",
"Romain",
""
],
[
"Debbah",
"Merouane",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0811.0741 | Jerome Darmont | Hadj Mahboubi (ERIC), J\'er\^ome Darmont (ERIC) | Data Mining-based Fragmentation of XML Data Warehouses | null | ACM 11th International Workshop on Data Warehousing and OLAP
(CIKM/DOLAP 08), Napa Valley : \'Etats-Unis d'Am\'erique (2008) | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the multiplication of XML data sources, many XML data warehouse models
have been proposed to handle data heterogeneity and complexity in a way
relational data warehouses fail to achieve. However, XML-native database
systems currently suffer from limited performances, both in terms of manageable
data volume and response time. Fragmentation helps address both these issues.
Derived horizontal fragmentation is typically used in relational data
warehouses and can definitely be adapted to the XML context. However, the
number of fragments produced by classical algorithms is difficult to control.
In this paper, we propose the use of a k-means-based fragmentation approach
that allows to master the number of fragments through its $k$ parameter. We
experimentally compare its efficiency to classical derived horizontal
fragmentation algorithms adapted to XML data warehouses and show its
superiority.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 15:00:32 GMT"
}
]
| 2008-11-06T00:00:00 | [
[
"Mahboubi",
"Hadj",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0811.0764 | Romain Couillet | Romain Couillet, Merouane Debbah | A Bayesian Framework for Collaborative Multi-Source Signal Detection | 15 pages, 9 pictures, Submitted to IEEE Trans. on Signal Processing | null | null | null | cs.IT cs.AI math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a Bayesian framework to detect multiple signals
embedded in noisy observations from a sensor array. For various states of
knowledge on the communication channel and the noise at the receiving sensors,
a marginalization procedure based on recent tools of finite random matrix
theory, in conjunction with the maximum entropy principle, is used to compute
the hypothesis selection criterion. Quite remarkably, explicit expressions for
the Bayesian detector are derived which enable to decide on the presence of
signal sources in a noisy wireless environment. The proposed Bayesian detector
is shown to outperform the classical power detector when the noise power is
known and provides very good performance for limited knowledge on the noise
power. Simulations corroborate the theoretical results and quantify the gain
achieved using the proposed Bayesian framework.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 16:11:59 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Sep 2009 12:08:50 GMT"
}
]
| 2009-09-08T00:00:00 | [
[
"Couillet",
"Romain",
""
],
[
"Debbah",
"Merouane",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0811.0777 | Amin Zia | Amin Zia | A random coding theorem for "modulo-two adder" source network | This paper has been withdrawn | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn by the author, due a crucial error in the proof
of the main Theorem (Sec. 3). In particular, in deriving the bound on the
probability of error (Eq. 10) the contribution of those pairs (x', y') that are
not equal to (x, y) has not been considered. By adding the contribution of
these pairs, one can verify that a region of rates similar to the Slepian-Wolf
region will emerge.
The author would like to acknowledge a critical review of the paper by Mr.
Paul Cuff of Stanford University who first pointed out the error.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 20:22:59 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Jan 2009 18:48:38 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Zia",
"Amin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.0778 | Romain Couillet | Romain Couillet, Merouane Debbah | A maximum entropy approach to OFDM channel estimation | 15 pages, 11 figures | null | null | null | cs.IT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, a new Bayesian framework for OFDM channel estimation is
proposed. Using Jaynes' maximum entropy principle to derive prior information,
we successively tackle the situations when only the channel delay spread is a
priori known, then when it is not known. Exploitation of the time-frequency
dimensions are also considered in this framework, to derive the optimal channel
estimation associated to some performance measure under any state of knowledge.
Simulations corroborate the optimality claim and always prove as good or better
in performance than classical estimators.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 17:16:34 GMT"
}
]
| 2008-11-06T00:00:00 | [
[
"Couillet",
"Romain",
""
],
[
"Debbah",
"Merouane",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0811.0811 | Andreas Blass | Andreas Blass (University of Michigan), Nachum Dershowitz (Tel Aviv
University), and Yuri Gurevich (Microsoft Research) | When are two algorithms the same? | null | Bulletin of Symbolic Logic, vol. 15, no. 2, pp. 145-168, 2009 | null | null | cs.GL cs.DS cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | People usually regard algorithms as more abstract than the programs that
implement them. The natural way to formalize this idea is that algorithms are
equivalence classes of programs with respect to a suitable equivalence
relation. We argue that no such equivalence relation exists.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 20:38:22 GMT"
}
]
| 2020-06-11T00:00:00 | [
[
"Blass",
"Andreas",
"",
"University of Michigan"
],
[
"Dershowitz",
"Nachum",
"",
"Tel Aviv\n University"
],
[
"Gurevich",
"Yuri",
"",
"Microsoft Research"
]
]
| [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0811.0819 | Andreas Blass | Andreas Blass (University of Michigan) and Yuri Gurevich (Microsoft
Research) | Persistent Queries | null | null | null | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a syntax and semantics for interactive abstract state machines to
deal with the following situation. A query is issued during a certain step, but
the step ends before any reply is received. Later, a reply arrives, and later
yet the algorithm makes use of this reply. By a persistent query, we mean a
query for which a late reply might be used. Syntactically, our proposal
involves issuing, along with a persistent query, a location where a late reply
is to be stored. Semantically, it involves only a minor modification of the
existing theory of interactive small-step abstract state machines.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2008 21:10:33 GMT"
}
]
| 2008-11-07T00:00:00 | [
[
"Blass",
"Andreas",
"",
"University of Michigan"
],
[
"Gurevich",
"Yuri",
"",
"Microsoft\n Research"
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.