id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0811.3062 | Qin Zhang | Zhewei Wei, Ke Yi, Qin Zhang | Dynamic External Hashing: The Limit of Buffering | 10 pages, 1 figure | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hash tables are one of the most fundamental data structures in computer
science, in both theory and practice. They are especially useful in external
memory, where their query performance approaches the ideal cost of just one
disk access. Knuth gave an elegant analysis showing that with some simple
collision resolution strategies such as linear probing or chaining, the
expected average number of disk I/Os of a lookup is merely $1+1/2^{\Omega(b)}$,
where each I/O can read a disk block containing $b$ items. Inserting a new item
into the hash table also costs $1+1/2^{\Omega(b)}$ I/Os, which is again almost
the best one can do if the hash table is entirely stored on disk. However, this
assumption is unrealistic since any algorithm operating on an external hash
table must have some internal memory (at least $\Omega(1)$ blocks) to work
with. The availability of a small internal memory buffer can dramatically
reduce the amortized insertion cost to $o(1)$ I/Os for many external memory
data structures. In this paper we study the inherent query-insertion tradeoff
of external hash tables in the presence of a memory buffer. In particular, we
show that for any constant $c>1$, if the query cost is targeted at
$1+O(1/b^{c})$ I/Os, then it is not possible to support insertions in less than
$1-O(1/b^{\frac{c-1}{4}})$ I/Os amortized, which means that the memory buffer
is essentially useless. While if the query cost is relaxed to $1+O(1/b^{c})$
I/Os for any constant $c<1$, there is a simple dynamic hash table with $o(1)$
insertion cost. These results also answer the open question recently posed by
Jensen and Pagh.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2008 08:11:14 GMT"
}
]
| 2008-11-20T00:00:00 | [
[
"Wei",
"Zhewei",
""
],
[
"Yi",
"Ke",
""
],
[
"Zhang",
"Qin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0811.3116 | Gabriel Istrate | Gabriel Istrate | Geometric properties of satisfying assignments of random
$\epsilon$-1-in-k SAT | null | International Journal of Computer Mathematics, 86(12), pp.
2029-2039, 2009 | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the geometric structure of the set of solutions of random
$\epsilon$-1-in-k SAT problem. For $l\geq 1$, two satisfying assignments $A$
and $B$ are $l$-connected if there exists a sequence of satisfying assignments
connecting them by changing at most $l$ bits at a time.
We first prove that w.h.p. two assignments of a random $\epsilon$-1-in-$k$
SAT instance are $O(\log n)$-connected, conditional on being satisfying
assignments. Also, there exists $\epsilon_{0}\in (0,\frac{1}{k-2})$ such that
w.h.p. no two satisfying assignments at distance at least $\epsilon_{0}\cdot n$
form a "hole" in the set of assignments. We believe that this is true for all
$\epsilon >0$, and thus satisfying assignments of a random 1-in-$k$ SAT
instance form a single cluster.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2008 15:35:42 GMT"
}
]
| 2010-03-18T00:00:00 | [
[
"Istrate",
"Gabriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0811.3137 | Megan Winget | Megan A. Winget, Caitlin Murray | Collecting and Preserving Videogames and Their Related Materials: A
Review of Current Practice, Game-Related Archives and Research Projects | 9 pages, 0 figures, ASIS&T Conference Paper | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper reviews the major methods and theories regarding the preservation
of new media artifacts such as videogames, and argues for the importance of
collecting and coming to a better understanding of videogame artifacts of
creation, which will help build a more detailed understanding of the essential
qualities of these culturally significant artifacts. We will also review the
major videogame collections in the United States, Europe and Japan to give an
idea of the current state of videogame archives, and argue for a fuller, more
comprehensive coverage of these materials in institutional repositories.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2008 15:36:13 GMT"
}
]
| 2008-11-20T00:00:00 | [
[
"Winget",
"Megan A.",
""
],
[
"Murray",
"Caitlin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0811.3140 | J. F. J. Laros | Michael Hansen and Jeroen F. J. Laros | Desynched channels on IRCnet | 13 pages, 3 figures, 2 algorithms | null | null | null | cs.NI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we describe what a desynchronised channel on IRC is. We give
procedures on how to create such a channel and how to remove desynchronisation.
We explain which types of desynchronisation there are, what properties
desynchronised channels have, and which properties can be exploited.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2008 15:43:50 GMT"
}
]
| 2008-11-20T00:00:00 | [
[
"Hansen",
"Michael",
""
],
[
"Laros",
"Jeroen F. J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0811.3161 | Nitin Saxena | Nitin Saxena and C. Seshadhri | An Almost Optimal Rank Bound for Depth-3 Identities | 25 pages, preliminary version | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that the rank of a depth-3 circuit (over any field) that is simple,
minimal and zero is at most k^3\log d. The previous best rank bound known was
2^{O(k^2)}(\log d)^{k-2} by Dvir and Shpilka (STOC 2005). This almost resolves
the rank question first posed by Dvir and Shpilka (as we also provide a simple
and minimal identity of rank \Omega(k\log d)).
Our rank bound significantly improves (dependence on k exponentially reduced)
the best known deterministic black-box identity tests for depth-3 circuits by
Karnin and Shpilka (CCC 2008). Our techniques also shed light on the
factorization pattern of nonzero depth-3 circuits, most strikingly: the rank of
linear factors of a simple, minimal and nonzero depth-3 circuit (over any
field) is at most k^3\log d.
The novel feature of this work is a new notion of maps between sets of linear
forms, called "ideal matchings", used to study depth-3 circuits. We prove
interesting structural results about depth-3 identities using these techniques.
We believe that these can lead to the goal of a deterministic polynomial time
identity test for these circuits.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2008 17:41:06 GMT"
}
]
| 2008-11-20T00:00:00 | [
[
"Saxena",
"Nitin",
""
],
[
"Seshadhri",
"C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0811.3165 | Nitin Saxena | G\'abor Ivanyos, Marek Karpinski, Lajos R\'onyai and Nitin Saxena | Trading GRH for algebra: algorithms for factoring polynomials and
related structures | 35 pages, preliminary version | null | null | null | cs.CC cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we develop techniques that eliminate the need of the
Generalized Riemann Hypothesis (GRH) from various (almost all) known results
about deterministic polynomial factoring over finite fields. Our main result
shows that given a polynomial f(x) of degree n over a finite field k, we can
find in deterministic poly(n^{\log n},\log |k|) time "either" a nontrivial
factor of f(x) "or" a nontrivial automorphism of k[x]/(f(x)) of order n. This
main tool leads to various new GRH-free results, most striking of which are:
(1) Given a noncommutative algebra over a finite field, we can find a zero
divisor in deterministic subexponential time.
(2) Given a positive integer r such that either 8|r or r has at least two
distinct odd prime factors. There is a deterministic polynomial time algorithm
to find a nontrivial factor of the r-th cyclotomic polynomial over a finite
field.
In this paper, following the seminal work of Lenstra (1991) on constructing
isomorphisms between finite fields, we further generalize classical Galois
theory constructs like cyclotomic extensions, Kummer extensions, Teichmuller
subgroups, to the case of commutative semisimple algebras with automorphisms.
These generalized constructs help eliminate the dependence on GRH.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2008 17:57:25 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Feb 2009 17:14:49 GMT"
}
]
| 2009-02-08T00:00:00 | [
[
"Ivanyos",
"Gábor",
""
],
[
"Karpinski",
"Marek",
""
],
[
"Rónyai",
"Lajos",
""
],
[
"Saxena",
"Nitin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0811.3176 | Danny Bickson | Ezra N. Hoch, Danny Bickson and Danny Dolev | Self-stabilizing Numerical Iterative Computation | null | In the 10th International Symposium on Stabilization, Safety, and
Security of Distributed Systems (SSS '08), Detriot, Nov. 2008 | 10.1007/978-3-540-89335-6_9 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many challenging tasks in sensor networks, including sensor calibration,
ranking of nodes, monitoring, event region detection, collaborative filtering,
collaborative signal processing, {\em etc.}, can be formulated as a problem of
solving a linear system of equations. Several recent works propose different
distributed algorithms for solving these problems, usually by using linear
iterative numerical methods.
In this work, we extend the settings of the above approaches, by adding
another dimension to the problem. Specifically, we are interested in {\em
self-stabilizing} algorithms, that continuously run and converge to a solution
from any initial state. This aspect of the problem is highly important due to
the dynamic nature of the network and the frequent changes in the measured
environment.
In this paper, we link together algorithms from two different domains. On the
one hand, we use the rich linear algebra literature of linear iterative methods
for solving systems of linear equations, which are naturally distributed with
rapid convergence properties. On the other hand, we are interested in
self-stabilizing algorithms, where the input to the computation is constantly
changing, and we would like the algorithms to converge from any initial state.
We propose a simple novel method called \syncAlg as a self-stabilizing variant
of the linear iterative methods. We prove that under mild conditions the
self-stabilizing algorithm converges to a desired result. We further extend
these results to handle the asynchronous case.
As a case study, we discuss the sensor calibration problem and provide
simulation results to support the applicability of our approach.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2008 19:11:46 GMT"
}
]
| 2008-11-21T00:00:00 | [
[
"Hoch",
"Ezra N.",
""
],
[
"Bickson",
"Danny",
""
],
[
"Dolev",
"Danny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0811.3208 | Martin Roetteler | Martin Roetteler | Quantum algorithms for highly non-linear Boolean functions | 15 pages, 1 figure, to appear in Proceedings of the 21st Annual
ACM-SIAM Symposium on Discrete Algorithms (SODA'10). This updated version of
the paper contains a new exponential separation between classical and quantum
query complexity | Proceedings of the 21st Annual ACM-SIAM Symposium on Discrete
Algorithms (SODA'10), pp. 448-457, 2010 | null | null | quant-ph cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Attempts to separate the power of classical and quantum models of computation
have a long history. The ultimate goal is to find exponential separations for
computational problems. However, such separations do not come a dime a dozen:
while there were some early successes in the form of hidden subgroup problems
for abelian groups--which generalize Shor's factoring algorithm perhaps most
faithfully--only for a handful of non-abelian groups efficient quantum
algorithms were found. Recently, problems have gotten increased attention that
seek to identify hidden sub-structures of other combinatorial and algebraic
objects besides groups. In this paper we provide new examples for exponential
separations by considering hidden shift problems that are defined for several
classes of highly non-linear Boolean functions. These so-called bent functions
arise in cryptography, where their property of having perfectly flat Fourier
spectra on the Boolean hypercube gives them resilience against certain types of
attack. We present new quantum algorithms that solve the hidden shift problems
for several well-known classes of bent functions in polynomial time and with a
constant number of queries, while the classical query complexity is shown to be
exponential. Our approach uses a technique that exploits the duality between
bent functions and their Fourier transforms.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2008 21:13:00 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Nov 2009 21:13:50 GMT"
}
]
| 2013-12-05T00:00:00 | [
[
"Roetteler",
"Martin",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0811.3231 | Olivier Danvy | Olivier Danvy and Kevin Millikin | A Rational Deconstruction of Landin's SECD Machine with the J Operator | null | Logical Methods in Computer Science, Volume 4, Issue 4 (November
29, 2008) lmcs:1112 | 10.2168/LMCS-4(4:12)2008 | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Landin's SECD machine was the first abstract machine for applicative
expressions, i.e., functional programs. Landin's J operator was the first
control operator for functional languages, and was specified by an extension of
the SECD machine. We present a family of evaluation functions corresponding to
this extension of the SECD machine, using a series of elementary
transformations (transformation into continu-ation-passing style (CPS) and
defunctionalization, chiefly) and their left inverses (transformation into
direct style and refunctionalization). To this end, we modernize the SECD
machine into a bisimilar one that operates in lockstep with the original one
but that (1) does not use a data stack and (2) uses the caller-save rather than
the callee-save convention for environments. We also identify that the dump
component of the SECD machine is managed in a callee-save way. The caller-save
counterpart of the modernized SECD machine precisely corresponds to Thielecke's
double-barrelled continuations and to Felleisen's encoding of J in terms of
call/cc. We then variously characterize the J operator in terms of CPS and in
terms of delimited-control operators in the CPS hierarchy. As a byproduct, we
also present several reduction semantics for applicative expressions with the J
operator, based on Curien's original calculus of explicit substitutions. These
reduction semantics mechanically correspond to the modernized versions of the
SECD machine and to the best of our knowledge, they provide the first syntactic
theories of applicative expressions with the J operator.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2008 22:31:34 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Nov 2008 23:19:23 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Danvy",
"Olivier",
""
],
[
"Millikin",
"Kevin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0811.3233 | Narad Rampersad | James Currie and Narad Rampersad | Cubefree words with many squares | 6 pages | null | null | null | math.CO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We construct infinite cubefree binary words containing exponentially many
distinct squares of length n. We also show that for every positive integer n,
there is a cubefree binary square of length 2n.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2008 22:33:30 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Currie",
"James",
""
],
[
"Rampersad",
"Narad",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0811.3244 | Warren Schudy | Marek Karpinski, Warren Schudy | Linear Time Approximation Schemes for the Gale-Berlekamp Game and
Related Minimization Problems | 18 pages LaTeX, 2 figures | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We design a linear time approximation scheme for the Gale-Berlekamp Switching
Game and generalize it to a wider class of dense fragile minimization problems
including the Nearest Codeword Problem (NCP) and Unique Games Problem. Further
applications include, among other things, finding a constrained form of matrix
rigidity and maximum likelihood decoding of an error correcting code. As
another application of our method we give the first linear time approximation
schemes for correlation clustering with a fixed number of clusters and its
hierarchical generalization. Our results depend on a new technique for dealing
with small objective function values of optimization problems and could be of
independent interest.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2008 01:07:49 GMT"
}
]
| 2008-11-21T00:00:00 | [
[
"Karpinski",
"Marek",
""
],
[
"Schudy",
"Warren",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0811.3247 | Marino Pagan | Bruno Codenotti, Stefano De Rossi, Marino Pagan | An experimental analysis of Lemke-Howson algorithm | 15 pages, 18 figures. The source code of our implementation can be
found at http://allievi.sssup.it/game/index.html | null | null | null | cs.DS cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an experimental investigation of the performance of the
Lemke-Howson algorithm, which is the most widely used algorithm for the
computation of a Nash equilibrium for bimatrix games. Lemke-Howson algorithm is
based upon a simple pivoting strategy, which corresponds to following a path
whose endpoint is a Nash equilibrium. We analyze both the basic Lemke-Howson
algorithm and a heuristic modification of it, which we designed to cope with
the effects of a 'bad' initial choice of the pivot. Our experimental findings
show that, on uniformly random games, the heuristics achieves a linear running
time, while the basic Lemke-Howson algorithm runs in time roughly proportional
to a polynomial of degree seven. To conduct the experiments, we have developed
our own implementation of Lemke-Howson algorithm, which turns out to be
significantly faster than state-of-the-art software. This allowed us to run the
algorithm on a much larger set of data, and on instances of much larger size,
compared with previous work.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2008 00:32:16 GMT"
}
]
| 2008-11-21T00:00:00 | [
[
"Codenotti",
"Bruno",
""
],
[
"De Rossi",
"Stefano",
""
],
[
"Pagan",
"Marino",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0811.3272 | Ali Sydney | Ali Sydney, Caterina Scoglio, Mina Youssef, and Phillip Schumm | Characterizing the Robustness of Complex Networks | This paper serves as a replacement to its predecessor | null | null | null | cs.NI cs.PF physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With increasingly ambitious initiatives such as GENI and FIND that seek to
design the future Internet, it becomes imperative to define the characteristics
of robust topologies, and build future networks optimized for robustness. This
paper investigates the characteristics of network topologies that maintain a
high level of throughput in spite of multiple attacks. To this end, we select
network topologies belonging to the main network models and some real world
networks. We consider three types of attacks: removal of random nodes, high
degree nodes, and high betweenness nodes. We use elasticity as our robustness
measure and, through our analysis, illustrate that different topologies can
have different degrees of robustness. In particular, elasticity can fall as low
as 0.8% of the upper bound based on the attack employed. This result
substantiates the need for optimized network topology design. Furthermore, we
implement a tradeoff function that combines elasticity under the three attack
strategies and considers the cost of the network. Our extensive simulations
show that, for a given network density, regular and semi-regular topologies can
have higher degrees of robustness than heterogeneous topologies, and that link
redundancy is a sufficient but not necessary condition for robustness.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2008 07:35:39 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Jun 2009 18:55:35 GMT"
},
{
"version": "v3",
"created": "Fri, 25 Sep 2009 20:31:20 GMT"
}
]
| 2009-09-25T00:00:00 | [
[
"Sydney",
"Ali",
""
],
[
"Scoglio",
"Caterina",
""
],
[
"Youssef",
"Mina",
""
],
[
"Schumm",
"Phillip",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0811.3284 | Chen Avin | Chen Avin (1), Yuval Emek (2), Erez Kantor (2), Zvi Lotker (1), David
Peleg (2) and Liam Roditty (3) ((1) Department of Communication Systems
Engineering, Ben Gurion University, Israel (2) Department of Computer Science
and Applied Mathematics, Weizmann Institute of Science, Israel, (3)
Department of Computer Science, Bar Ilan University, Israel) | SINR Diagrams: Towards Algorithmically Usable SINR Models of Wireless
Networks | 34 pages, 17 Figures | null | null | null | cs.NI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rules governing the availability and quality of connections in a wireless
network are described by physical models such as the signal-to-interference &
noise ratio (SINR) model. For a collection of simultaneously transmitting
stations in the plane, it is possible to identify a reception zone for each
station, consisting of the points where its transmission is received correctly.
The resulting SINR diagram partitions the plane into a reception zone per
station and the remaining plane where no station can be heard.
SINR diagrams appear to be fundamental to understanding the behavior of
wireless networks, and may play a key role in the development of suitable
algorithms for such networks, analogous perhaps to the role played by Voronoi
diagrams in the study of proximity queries and related issues in computational
geometry. So far, however, the properties of SINR diagrams have not been
studied systematically, and most algorithmic studies in wireless networking
rely on simplified graph-based models such as the unit disk graph (UDG) model,
which conveniently abstract away interference-related complications, and make
it easier to handle algorithmic issues, but consequently fail to capture
accurately some important aspects of wireless networks.
The current paper focuses on obtaining some basic understanding of SINR
diagrams, their properties and their usability in algorithmic applications.
Specifically, based on some algebraic properties of the polynomials defining
the reception zones we show that assuming uniform power transmissions, the
reception zones are convex and relatively well-rounded. These results are then
used to develop an efficient approximation algorithm for a fundamental point
location problem in wireless networks.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2008 08:49:48 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Dec 2008 13:39:32 GMT"
}
]
| 2008-12-10T00:00:00 | [
[
"Avin",
"Chen",
""
],
[
"Emek",
"Yuval",
""
],
[
"Kantor",
"Erez",
""
],
[
"Lotker",
"Zvi",
""
],
[
"Peleg",
"David",
""
],
[
"Roditty",
"Liam",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0811.3301 | Daniel Lemire | Daniel Lemire | Faster Retrieval with a Two-Pass Dynamic-Time-Warping Lower Bound | Accepted in Pattern Recognition on November 20th, 2008 | Daniel Lemire, Faster Retrieval with a Two-Pass
Dynamic-Time-Warping Lower Bound, Pattern Recognition 42(9): 2169-2180 (2009) | 10.1016/j.patcog.2008.11.030 | null | cs.DB cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Dynamic Time Warping (DTW) is a popular similarity measure between time
series. The DTW fails to satisfy the triangle inequality and its computation
requires quadratic time. Hence, to find closest neighbors quickly, we use
bounding techniques. We can avoid most DTW computations with an inexpensive
lower bound (LB Keogh). We compare LB Keogh with a tighter lower bound (LB
Improved). We find that LB Improved-based search is faster. As an example, our
approach is 2-3 times faster over random-walk and shape time series.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2008 16:22:05 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jun 2009 17:37:32 GMT"
}
]
| 2012-01-16T00:00:00 | [
[
"Lemire",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0811.3328 | Justislav Bogevolnov V | Justislav Bogevolnov | chi2TeX Semi-automatic translation from chiwriter to LaTeX | 8 pages, 8 figures in Russian | null | null | null | cs.SE cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Semi-automatic translation of math-filled book from obsolete ChiWriter format
to LaTeX. Is it possible? Idea of criterion whether to use automatic or hand
mode for translation. Illustrations.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2008 12:49:12 GMT"
}
]
| 2008-11-21T00:00:00 | [
[
"Bogevolnov",
"Justislav",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0811.3373 | Michel Grabisch | Michel Grabisch (CERMSEM, Ces) | Belief functions on lattices | null | International Journal of Intelligent Systems (2009) 1-20 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We extend the notion of belief function to the case where the underlying
structure is no more the Boolean lattice of subsets of some universal set, but
any lattice, which we will endow with a minimal set of properties according to
our needs. We show that all classical constructions and definitions (e.g., mass
allocation, commonality function, plausibility functions, necessity measures
with nested focal elements, possibility distributions, Dempster rule of
combination, decomposition w.r.t. simple support functions, etc.) remain valid
in this general setting. Moreover, our proof of decomposition of belief
functions into simple support functions is much simpler and general than the
original one by Shafer.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2008 16:37:08 GMT"
}
]
| 2008-11-21T00:00:00 | [
[
"Grabisch",
"Michel",
"",
"CERMSEM, Ces"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0811.3387 | Matthias W\"ahlisch | Matthias W\"ahlisch, Thomas C. Schmidt and Georg Wittenburg | Broadcasting in Prefix Space: P2P Data Dissemination with Predictable
Performance | final version for ICIW'09 | Matthias W\"ahlisch, Thomas C. Schmidt, and Georg Wittenburg,
"Broadcasting in Prefix Space: P2P Data Dissemination with Predictable
Performance," in Proc. of the Fourth ICIW: IEEE ComSoc Press, 2009, pp. 74-83 | 10.1109/ICIW.2009.19 | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A broadcast mode may augment peer-to-peer overlay networks with an efficient,
scalable data replication function, but may also give rise to a virtual link
layer in VPN-type solutions. We introduce a simple broadcasting mechanism that
operates in the prefix space of distributed hash tables without signaling. This
paper concentrates on the performance analysis of the prefix flooding scheme.
Starting from simple models of recursive $k$-ary trees, we analytically derive
distributions of hop counts and the replication load. Extensive simulation
results are presented further on, based on an implementation within the OverSim
framework. Comparisons are drawn to Scribe, taken as a general reference model
for group communication according to the shared, rendezvous-point-centered
distribution paradigm. The prefix flooding scheme thereby confirmed its widely
predictable performance and consistently outperformed Scribe in all metrics.
Reverse path selection in overlays is identified as a major cause of
performance degradation.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2008 17:56:17 GMT"
},
{
"version": "v2",
"created": "Mon, 25 May 2009 15:16:39 GMT"
}
]
| 2009-05-25T00:00:00 | [
[
"Wählisch",
"Matthias",
""
],
[
"Schmidt",
"Thomas C.",
""
],
[
"Wittenburg",
"Georg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0811.3400 | Frederic Prost | Dominique Duval (LMC - IMAG, LJK, NMST), Rachid Echahed (LIG, Leibniz
- IMAG, IMAG), Fr\'ed\'eric Prost (LIG) | A Cloning Pushout Approach to Term-Graph Transformation | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of cyclic termgraph rewriting. We propose a new
framework where rewrite rules are tuples of the form $(L,R,\tau,\sigma)$ such
that $L$ and $R$ are termgraphs representing the left-hand and the right-hand
sides of the rule, $\tau$ is a mapping from the nodes of $L$ to those of $R$
and $\sigma$ is a partial function from nodes of $R$ to nodes of $L$. $\tau$
describes how incident edges of the nodes in $L$ are connected in $R$. $\tau$
is not required to be a graph morphism as in classical algebraic approaches of
graph transformation. The role of $\sigma$ is to indicate the parts of $L$ to
be cloned (copied). Furthermore, we introduce a new notion of \emph{cloning
pushout} and define rewrite steps as cloning pushouts in a given category.
Among the features of the proposed rewrite systems, we quote the ability to
perform local and global redirection of pointers, addition and deletion of
nodes as well as cloning and collapsing substructures.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2008 19:39:51 GMT"
}
]
| 2008-11-21T00:00:00 | [
[
"Duval",
"Dominique",
"",
"LMC - IMAG, LJK, NMST"
],
[
"Echahed",
"Rachid",
"",
"LIG, Leibniz\n - IMAG, IMAG"
],
[
"Prost",
"Frédéric",
"",
"LIG"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0811.3448 | William Gilreath | William F. Gilreath | Binar Sort: A Linear Generalized Sorting Algorithm | PDF from Word, 25-pages, 2-figures, 4-diagrams, version 2.0 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sorting is a common and ubiquitous activity for computers. It is not
surprising that there exist a plethora of sorting algorithms. For all the
sorting algorithms, it is an accepted performance limit that sorting algorithms
are linearithmic or O(N lg N). The linearithmic lower bound in performance
stems from the fact that the sorting algorithms use the ordering property of
the data. The sorting algorithm uses comparison by the ordering property to
arrange the data elements from an initial permutation into a sorted
permutation.
Linear O(N) sorting algorithms exist, but use a priori knowledge of the data
to use a specific property of the data and thus have greater performance. In
contrast, the linearithmic sorting algorithms are generalized by using a
universal property of data-comparison, but have a linearithmic performance
lower bound. The trade-off in sorting algorithms is generality for performance
by the chosen property used to sort the data elements.
A general-purpose, linear sorting algorithm in the context of the trade-off
of performance for generality at first consideration seems implausible. But,
there is an implicit assumption that only the ordering property is universal.
But, as will be discussed and examined, it is not the only universal property
for data elements. The binar sort is a general-purpose sorting algorithm that
uses this other universal property to sort linearly.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 01:38:09 GMT"
},
{
"version": "v2",
"created": "Tue, 17 May 2011 04:19:05 GMT"
}
]
| 2011-05-18T00:00:00 | [
[
"Gilreath",
"William F.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0811.3449 | William Gilreath | William F. Gilreath | Binar Shuffle Algorithm: Shuffling Bit by Bit | 27-pages, watermarked | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Frequently, randomly organized data is needed to avoid an anomalous operation
of other algorithms and computational processes. An analogy is that a deck of
cards is ordered within the pack, but before a game of poker or solitaire the
deck is shuffled to create a random permutation. Shuffling is used to assure
that an aggregate of data elements for a sequence S is randomly arranged, but
avoids an ordered or partially ordered permutation.
Shuffling is the process of arranging data elements into a random
permutation. The sequence S as an aggregation of N data elements, there are N!
possible permutations. For the large number of possible permutations, two of
the possible permutations are for a sorted or ordered placement of data
elements--both an ascending and descending sorted permutation. Shuffling must
avoid inadvertently creating either an ascending or descending permutation.
Shuffling is frequently coupled to another algorithmic function --
pseudo-random number generation. The efficiency and quality of the shuffle is
directly dependent upon the random number generation algorithm utilized. A more
effective and efficient method of shuffling is to use parameterization to
configure the shuffle, and to shuffle into sub-arrays by utilizing the encoding
of the data elements. The binar shuffle algorithm uses the encoding of the data
elements and parameterization to avoid any direct coupling to a random number
generation algorithm, but still remain a linear O(N) shuffle algorithm.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 01:45:50 GMT"
}
]
| 2008-11-24T00:00:00 | [
[
"Gilreath",
"William F.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0811.3475 | Danilo Silva | Da Wang, Danilo Silva, Frank R. Kschischang | Robust Network Coding in the Presence of Untrusted Nodes | 7 pages, 4 figures, to be published at the IEEE Transactions on
Information Theory | IEEE Transactions on Information Theory, vol. 56, no. 9, pp.
4532-4538, Sep. 2010 | 10.1109/TIT.2010.2054650 | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While network coding can be an efficient means of information dissemination
in networks, it is highly susceptible to "pollution attacks," as the injection
of even a single erroneous packet has the potential to corrupt each and every
packet received by a given destination. Even when suitable error-control coding
is applied, an adversary can, in many interesting practical situations,
overwhelm the error-correcting capability of the code. To limit the power of
potential adversaries, a broadcast transformation is introduced, in which nodes
are limited to just a single (broadcast) transmission per generation. Under
this broadcast transformation, the multicast capacity of a network is changed
(in general reduced) from the number of edge-disjoint paths between source and
sink to the number of internally-disjoint paths. Exploiting this fact, we
propose a family of networks whose capacity is largely unaffected by a
broadcast transformation. This results in a significant achievable transmission
rate for such networks, even in the presence of adversaries.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 05:59:31 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Apr 2010 22:34:48 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Apr 2010 21:02:00 GMT"
}
]
| 2019-05-07T00:00:00 | [
[
"Wang",
"Da",
""
],
[
"Silva",
"Danilo",
""
],
[
"Kschischang",
"Frank R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.3476 | Florent Cousseau | Florent Cousseau, Kazushi Mimura, Masato Okada | Error correcting code using tree-like multilayer perceptron | 23 pages, 3 figures, Content has been extended and revised | Phys. Rev. E, 81, 021104 (2010) | 10.1103/PhysRevE.81.021104 | null | cond-mat.stat-mech cond-mat.dis-nn cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An error correcting code using a tree-like multilayer perceptron is proposed.
An original message $\mbi{s}^0$ is encoded into a codeword $\boldmath{y}_0$
using a tree-like committee machine (committee tree) or a tree-like parity
machine (parity tree). Based on these architectures, several schemes featuring
monotonic or non-monotonic units are introduced. The codeword $\mbi{y}_0$ is
then transmitted via a Binary Asymmetric Channel (BAC) where it is corrupted by
noise. The analytical performance of these schemes is investigated using the
replica method of statistical mechanics. Under some specific conditions, some
of the proposed schemes are shown to saturate the Shannon bound at the infinite
codeword length limit. The influence of the monotonicity of the units on the
performance is also discussed.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 06:24:57 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Feb 2009 08:23:47 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Mar 2009 06:03:59 GMT"
},
{
"version": "v4",
"created": "Fri, 22 May 2009 06:01:20 GMT"
},
{
"version": "v5",
"created": "Thu, 6 Aug 2009 04:13:51 GMT"
},
{
"version": "v6",
"created": "Sat, 16 Jan 2010 08:25:23 GMT"
}
]
| 2011-03-15T00:00:00 | [
[
"Cousseau",
"Florent",
""
],
[
"Mimura",
"Kazushi",
""
],
[
"Okada",
"Masato",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.3479 | Shamik Ghosh | Shamik Ghosh | Counting number of factorizations of a natural number | null | null | null | null | cs.DM math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note we describe a new method of counting the number of unordered
factorizations of a natural number by means of a generating function and a
recurrence relation arising from it, which improves an earlier result in this
direction.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 06:45:15 GMT"
}
]
| 2008-11-24T00:00:00 | [
[
"Ghosh",
"Shamik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
]
|
0811.3490 | Philip Bille | Philip Bille | Faster Approximate String Matching for Short Patterns | To appear in Theory of Computing Systems | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the classical approximate string matching problem, that is, given
strings $P$ and $Q$ and an error threshold $k$, find all ending positions of
substrings of $Q$ whose edit distance to $P$ is at most $k$. Let $P$ and $Q$
have lengths $m$ and $n$, respectively. On a standard unit-cost word RAM with
word size $w \geq \log n$ we present an algorithm using time $$ O(nk \cdot
\min(\frac{\log^2 m}{\log n},\frac{\log^2 m\log w}{w}) + n) $$ When $P$ is
short, namely, $m = 2^{o(\sqrt{\log n})}$ or $m = 2^{o(\sqrt{w/\log w})}$ this
improves the previously best known time bounds for the problem. The result is
achieved using a novel implementation of the Landau-Vishkin algorithm based on
tabulation and word-level parallelism.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 08:52:59 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Mar 2011 21:11:16 GMT"
}
]
| 2011-03-21T00:00:00 | [
[
"Bille",
"Philip",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0811.3492 | Erik de Vink | L.P.J. Groenewegen and E.P. de Vink | Dynamic System Adaptation by Constraint Orchestration | 19 pages | null | null | CSR 08/29 | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For Paradigm models, evolution is just-in-time specified coordination
conducted by a special reusable component McPal. Evolution can be treated
consistently and on-the-fly through Paradigm's constraint orchestration, also
for originally unforeseen evolution. UML-like diagrams visually supplement such
migration, as is illustrated for the case of a critical section solution
evolving into a pipeline architecture.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 09:47:26 GMT"
}
]
| 2008-11-24T00:00:00 | [
[
"Groenewegen",
"L. P. J.",
""
],
[
"de Vink",
"E. P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0811.3521 | Angelo Brillout | Angelo Brillout, Daniel Kroening, and Thomas Wahl | Craig Interpolation for Quantifier-Free Presburger Arithmetic | 15 pages, 1 algorithm, 1 figure | null | null | null | cs.LO cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Craig interpolation has become a versatile algorithmic tool for improving
software verification. Interpolants can, for instance, accelerate the
convergence of fixpoint computations for infinite-state systems. They also help
improve the refinement of iteratively computed lazy abstractions. Efficient
interpolation procedures have been presented only for a few theories. In this
paper, we introduce a complete interpolation method for the full range of
quantifier-free Presburger arithmetic formulas. We propose a novel convex
variable projection for integer inequalities and a technique to combine them
with equalities. The derivation of the interpolant has complexity low-degree
polynomial in the size of the refutation proof and is typically fast in
practice.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 11:44:22 GMT"
}
]
| 2008-11-24T00:00:00 | [
[
"Brillout",
"Angelo",
""
],
[
"Kroening",
"Daniel",
""
],
[
"Wahl",
"Thomas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0811.3536 | Damien Chablat | Anatoly Pashkevich (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger
(IRCCyN) | Analyse de la rigidit\'e des machines outils 3 axes d'architecture
parall\`ele hyperstatique | null | 5eme Assises Machines et Usinage \`a grande vitesse, Nantes :
France (2008) | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents a new stiffness modelling method for overconstrained
parallel manipulators, which is applied to 3-d.o.f. translational mechanisms.
It is based on a multidimensional lumped-parameter model that replaces the link
flexibility by localized 6-d.o.f. virtual springs. In contrast to other works,
the method includes a FEA-based link stiffness evaluation and employs a new
solution strategy of the kinetostatic equations, which allows computing the
stiffness matrix for the overconstrained architectures and for the singular
manipulator postures. The advantages of the developed technique are confirmed
by application examples, which deal with comparative stiffness analysis of two
translational parallel manipulators.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 13:47:01 GMT"
}
]
| 2008-11-24T00:00:00 | [
[
"Pashkevich",
"Anatoly",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0811.3585 | Vivek Mhatre | Vivek P. Mhatre, Catherine P. Rosenberg, Ravi R. Mazumdar | The Capacity of Ad hoc Networks under Random Packet Losses | 12 pages, earlier version in ISIT 2006 | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of determining asymptotic bounds on the capacity of a
random ad hoc network. Previous approaches assumed a link layer model in which
if a transmitter-receiver pair can communicate with each other, i.e., the
Signal to Interference and Noise Ratio (SINR) is above a certain threshold,
then every transmitted packet is received error-free by the receiver thereby.
Using this model, the per node capacity of the network was shown to be
$\Theta(\frac{1}{\sqrt{n\log{n}}})$. In reality, for any finite link SINR,
there is a non-zero probability of erroneous reception of the packet. We show
that in a large network, as the packet travels an asymptotically large number
of hops from source to destination, the cumulative impact of packet losses over
intermediate links results in a per-node throughput of only $O(\frac{1}{n})$.
We then propose a new scheduling scheme to counter this effect. The proposed
scheme provides tight guarantees on end-to-end packet loss probability, and
improves the per-node throughput to $\Omega(\frac{1}{\sqrt{n}
({\log{n}})^{\frac{\alpha{{+2}}}{2(\alpha-2)}}})$ where $\alpha>2$ is the path
loss exponent.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 17:24:30 GMT"
}
]
| 2008-11-24T00:00:00 | [
[
"Mhatre",
"Vivek P.",
""
],
[
"Rosenberg",
"Catherine P.",
""
],
[
"Mazumdar",
"Ravi R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.3602 | Yakov Nekrich | Travis Gagie, Marek Karpinski, Yakov Nekrich | Low-Memory Adaptive Prefix Coding | 10 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study the adaptive prefix coding problem in cases where the
size of the input alphabet is large. We present an online prefix coding
algorithm that uses $O(\sigma^{1 / \lambda + \epsilon}) $ bits of space for any
constants $\eps>0$, $\lambda>1$, and encodes the string of symbols in $O(\log
\log \sigma)$ time per symbol \emph{in the worst case}, where $\sigma$ is the
size of the alphabet. The upper bound on the encoding length is $\lambda n H
(s) +(\lambda \ln 2 + 2 + \epsilon) n + O (\sigma^{1 / \lambda} \log^2 \sigma)$
bits.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 18:23:00 GMT"
}
]
| 2008-11-24T00:00:00 | [
[
"Gagie",
"Travis",
""
],
[
"Karpinski",
"Marek",
""
],
[
"Nekrich",
"Yakov",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0811.3617 | Vinith Misra | Vinith Misra, Vivek K Goyal, Lav R. Varshney | Distributed Scalar Quantization for Computing: High-Resolution Analysis
and Extensions | 36 pages, 10 figures | IEEE Trans. on Information Theory, vol. 57, no. 8, pp. 5298-5325,
August 2011 | 10.1109/TIT.2011.2158882 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Communication of quantized information is frequently followed by a
computation. We consider situations of \emph{distributed functional scalar
quantization}: distributed scalar quantization of (possibly correlated) sources
followed by centralized computation of a function. Under smoothness conditions
on the sources and function, companding scalar quantizer designs are developed
to minimize mean-squared error (MSE) of the computed function as the quantizer
resolution is allowed to grow. Striking improvements over quantizers designed
without consideration of the function are possible and are larger in the
entropy-constrained setting than in the fixed-rate setting. As extensions to
the basic analysis, we characterize a large class of functions for which
regular quantization suffices, consider certain functions for which asymptotic
optimality is achieved without arbitrarily fine quantization, and allow limited
collaboration between source encoders. In the entropy-constrained setting, a
single bit per sample communicated between encoders can have an
arbitrarily-large effect on functional distortion. In contrast, such
communication has very little effect in the fixed-rate setting.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 19:46:09 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Sep 2010 16:01:53 GMT"
},
{
"version": "v3",
"created": "Fri, 13 May 2011 01:54:32 GMT"
}
]
| 2015-01-20T00:00:00 | [
[
"Misra",
"Vinith",
""
],
[
"Goyal",
"Vivek K",
""
],
[
"Varshney",
"Lav R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.3620 | Stefano Zacchiroli | Ralf Treinen (PPS), Stefano Zacchiroli (PPS) | Solving package dependencies: from EDOS to Mancoosi | null | DebConf8, Argentine (2008) | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mancoosi (Managing the Complexity of the Open Source Infrastructure) is an
ongoing research project funded by the European Union for addressing some of
the challenges related to the "upgrade problem" of interdependent software
components of which Debian packages are prototypical examples. Mancoosi is the
natural continuation of the EDOS project which has already contributed tools
for distribution-wide quality assurance in Debian and other GNU/Linux
distributions. The consortium behind the project consists of several European
public and private research institutions as well as some commercial GNU/Linux
distributions from Europe and South America. Debian is represented by a small
group of Debian Developers who are working in the ranks of the involved
universities to drive and integrate back achievements into Debian. This paper
presents relevant results from EDOS in dependency management and gives an
overview of the Mancoosi project and its objectives, with a particular focus on
the prospective benefits for Debian.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 19:45:50 GMT"
}
]
| 2008-11-24T00:00:00 | [
[
"Treinen",
"Ralf",
"",
"PPS"
],
[
"Zacchiroli",
"Stefano",
"",
"PPS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0811.3621 | Stefano Zacchiroli | Ralf Treinen (PPS), Stefano Zacchiroli (PPS) | Description of the CUDF Format | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This document contains several related specifications, together they describe
the document formats related to the solver competition which will be organized
by Mancoosi. In particular, this document describes: - DUDF (Distribution
Upgradeability Description Format), the document format to be used to submit
upgrade problem instances from user machines to a (distribution-specific)
database of upgrade problems; - CUDF (Common Upgradeability Description
Format), the document format used to encode upgrade problems, abstracting over
distribution-specific details. Solvers taking part in the competition will be
fed with input in CUDF format.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 19:46:46 GMT"
}
]
| 2008-11-24T00:00:00 | [
[
"Treinen",
"Ralf",
"",
"PPS"
],
[
"Zacchiroli",
"Stefano",
"",
"PPS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0811.3648 | Jelani Nelson | Daniel M. Kane, Jelani Nelson, David P. Woodruff | Revisiting Norm Estimation in Data Streams | added content; modified L_0 algorithm -- ParityLogEstimator in
version 1 contained an error, and the new algorithm uses slightly more space | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of estimating the pth moment F_p (p nonnegative and real) in data
streams is as follows. There is a vector x which starts at 0, and many updates
of the form x_i <-- x_i + v come sequentially in a stream. The algorithm also
receives an error parameter 0 < eps < 1. The goal is then to output an
approximation with relative error at most eps to F_p = ||x||_p^p.
Previously, it was known that polylogarithmic space (in the vector length n)
was achievable if and only if p <= 2. We make several new contributions in this
regime, including:
(*) An optimal space algorithm for 0 < p < 2, which, unlike previous
algorithms which had optimal dependence on 1/eps but sub-optimal dependence on
n, does not rely on a generic pseudorandom generator.
(*) A near-optimal space algorithm for p = 0 with optimal update and query
time.
(*) A near-optimal space algorithm for the "distinct elements" problem (p = 0
and all updates have v = 1) with optimal update and query time.
(*) Improved L_2 --> L_2 dimensionality reduction in a stream.
(*) New 1-pass lower bounds to show optimality and near-optimality of our
algorithms, as well as of some previous algorithms (the "AMS sketch" for p = 2,
and the L_1-difference algorithm of Feigenbaum et al.).
As corollaries of our work, we also obtain a few separations in the
complexity of moment estimation problems: F_0 in 1 pass vs. 2 passes, p = 0 vs.
p > 0, and F_0 with strictly positive updates vs. arbitrary updates.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2008 22:55:07 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Apr 2009 02:45:30 GMT"
}
]
| 2009-04-09T00:00:00 | [
[
"Kane",
"Daniel M.",
""
],
[
"Nelson",
"Jelani",
""
],
[
"Woodruff",
"David P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0811.3691 | Alejandro Vaisman Prof. | Leticia Gomez, Bart Kuijpers, Alejandro Vaisman | Temporal Support of Regular Expressions in Sequential Pattern Mining | 15 pages, 2 figures | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Classic algorithms for sequential pattern discovery, return all frequent
sequences present in a database, but, in general, only a few ones are
interesting for the user. Languages based on regular expressions (RE) have been
proposed to restrict frequent sequences to the ones that satisfy user-specified
constraints. Although the support of a sequence is computed as the number of
data-sequences satisfying a pattern with respect to the total number of
data-sequences in the database, once regular expressions come into play, new
approaches to the concept of support are needed. For example, users may be
interested in computing the support of the RE as a whole, in addition to the
one of a particular pattern. Also, when the items are frequently updated, the
traditional way of counting support in sequential pattern mining may lead to
incorrect (or, at least incomplete), conclusions. The problem gets more
involved if we are interested in categorical sequential patterns. In light of
the above, in this paper we propose to revise the classic notion of support in
sequential pattern mining, introducing the concept of temporal support of
regular expressions, intuitively defined as the number of sequences satisfying
a target pattern, out of the total number of sequences that could have possibly
matched such pattern, where the pattern is defined as a RE over complex items
(i.e., not only item identifiers, but also attributes and functions).
| [
{
"version": "v1",
"created": "Sat, 22 Nov 2008 15:22:40 GMT"
}
]
| 2008-11-25T00:00:00 | [
[
"Gomez",
"Leticia",
""
],
[
"Kuijpers",
"Bart",
""
],
[
"Vaisman",
"Alejandro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0811.3704 | Olivier Finkel | Olivier Finkel (LIP, Elm) | Highly Undecidable Problems about Recognizability by Tiling Systems | to appear in a Special Issue of the journal Fundamenta Informaticae
on Machines, Computations and Universality | Fundamenta Informaticae 2, 91 (2009) 305-323 | null | null | cs.CC cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Altenbernd, Thomas and W\"ohrle have considered acceptance of languages of
infinite two-dimensional words (infinite pictures) by finite tiling systems,
with usual acceptance conditions, such as the B\"uchi and Muller ones [1]. It
was proved in [9] that it is undecidable whether a B\"uchi-recognizable
language of infinite pictures is E-recognizable (respectively, A-recognizable).
We show here that these two decision problems are actually $\Pi_2^1$-complete,
hence located at the second level of the analytical hierarchy, and "highly
undecidable". We give the exact degree of numerous other undecidable problems
for B\"uchi-recognizable languages of infinite pictures. In particular, the
non-emptiness and the infiniteness problems are $\Sigma^1_1$-complete, and the
universality problem, the inclusion problem, the equivalence problem, the
determinizability problem, the complementability problem, are all
$\Pi^1_2$-complete. It is also $\Pi^1_2$-complete to determine whether a given
B\"uchi recognizable language of infinite pictures can be accepted row by row
using an automaton model over ordinal words of length $\omega^2$.
| [
{
"version": "v1",
"created": "Sat, 22 Nov 2008 17:41:28 GMT"
}
]
| 2009-08-04T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"LIP, Elm"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0811.3712 | Kui Wu | Kui Wu, Yuming Jiang, Guoqiang Hu | Performance Modeling and Evaluation for Information-Driven Networks | 14 pages | null | null | null | cs.PF cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Information-driven networks include a large category of networking systems,
where network nodes are aware of information delivered and thus can not only
forward data packets but may also perform information processing. In many
situations, the quality of service (QoS) in information-driven networks is
provisioned with the redundancy in information. Traditional performance models
generally adopt evaluation measures suitable for packet-oriented service
guarantee, such as packet delay, throughput, and packet loss rate. These
performance measures, however, do not align well with the actual need of
information-driven networks. New performance measures and models for
information-driven networks, despite their importance, have been mainly blank,
largely because information processing is clearly application dependent and
cannot be easily captured within a generic framework. To fill the vacancy, we
present a new performance evaluation framework particularly tailored for
information-driven networks, based on the recent development of stochastic
network calculus. We analyze the QoS with respect to information delivery and
study the scheduling problem with the new performance metrics. Our analytical
framework can be used to calculate the network capacity in information delivery
and in the meantime to help transmission scheduling for a large body of systems
where QoS is stochastically guaranteed with the redundancy in information.
| [
{
"version": "v1",
"created": "Sat, 22 Nov 2008 21:29:47 GMT"
}
]
| 2008-11-25T00:00:00 | [
[
"Wu",
"Kui",
""
],
[
"Jiang",
"Yuming",
""
],
[
"Hu",
"Guoqiang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0811.3723 | Mingyu Xiao | Mingyu Xiao, Leizhen Cai and Andrew C. Yao | Tight Approximation Ratio of a General Greedy Splitting Algorithm for
the Minimum k-Way Cut Problem | 12 pages | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For an edge-weighted connected undirected graph, the minimum $k$-way cut
problem is to find a subset of edges of minimum total weight whose removal
separates the graph into $k$ connected components. The problem is NP-hard when
$k$ is part of the input and W[1]-hard when $k$ is taken as a parameter.
A simple algorithm for approximating a minimum $k$-way cut is to iteratively
increase the number of components of the graph by $h-1$, where $2 \le h \le k$,
until the graph has $k$ components. The approximation ratio of this algorithm
is known for $h \le 3$ but is open for $h \ge 4$.
In this paper, we consider a general algorithm that iteratively increases the
number of components of the graph by $h_i-1$, where $h_1 \le h_2 \le ... \le
h_q$ and $\sum_{i=1}^q (h_i-1) = k-1$. We prove that the approximation ratio of
this general algorithm is $2 - (\sum_{i=1}^q {h_i \choose 2})/{k \choose 2}$,
which is tight. Our result implies that the approximation ratio of the simple
algorithm is $2-h/k + O(h^2/k^2)$ in general and $2-h/k$ if $k-1$ is a multiple
of $h-1$.
| [
{
"version": "v1",
"created": "Sun, 23 Nov 2008 03:47:50 GMT"
}
]
| 2008-11-25T00:00:00 | [
[
"Xiao",
"Mingyu",
""
],
[
"Cai",
"Leizhen",
""
],
[
"Yao",
"Andrew C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0811.3760 | Sebastien Tixeuil | St\'ephane Devismes, Toshimitsu Masuzawa, S\'ebastien Tixeuil (LIP6) | Communication Efficiency in Self-stabilizing Silent Protocols | null | null | null | RR-6731 | cs.DS cs.CC cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Self-stabilization is a general paradigm to provide forward recovery
capabilities to distributed systems and networks. Intuitively, a protocol is
self-stabilizing if it is able to recover without external intervention from
any catastrophic transient failure. In this paper, our focus is to lower the
communication complexity of self-stabilizing protocols \emph{below} the need of
checking every neighbor forever. In more details, the contribution of the paper
is threefold: (i) We provide new complexity measures for communication
efficiency of self-stabilizing protocols, especially in the stabilized phase or
when there are no faults, (ii) On the negative side, we show that for
non-trivial problems such as coloring, maximal matching, and maximal
independent set, it is impossible to get (deterministic or probabilistic)
self-stabilizing solutions where every participant communicates with less than
every neighbor in the stabilized phase, and (iii) On the positive side, we
present protocols for coloring, maximal matching, and maximal independent set
such that a fraction of the participants communicates with exactly one neighbor
in the stabilized phase.
| [
{
"version": "v1",
"created": "Sun, 23 Nov 2008 17:29:25 GMT"
}
]
| 2008-11-25T00:00:00 | [
[
"Devismes",
"Stéphane",
"",
"LIP6"
],
[
"Masuzawa",
"Toshimitsu",
"",
"LIP6"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0811.3777 | Kenric Nelson | Kenric P. Nelson and Sabir Umarov | The Relationship between Tsallis Statistics, the Fourier Transform, and
Nonlinear Coupling | null | null | null | null | cs.IT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tsallis statistics (or q-statistics) in nonextensive statistical mechanics is
a one-parameter description of correlated states. In this paper we use a
translated entropic index: $1 - q \to q$ . The essence of this translation is
to improve the mathematical symmetry of the q-algebra and make q directly
proportional to the nonlinear coupling. A conjugate transformation is defined
$\hat q \equiv \frac{{- 2q}}{{2 + q}}$ which provides a dual mapping between
the heavy-tail q-Gaussian distributions, whose translated q parameter is
between $ - 2 < q < 0$, and the compact-support q-Gaussians, between $0 < q <
\infty $ . This conjugate transformation is used to extend the definition of
the q-Fourier transform to the domain of compact support. A conjugate q-Fourier
transform is proposed which transforms a q-Gaussian into a conjugate $\hat q$
-Gaussian, which has the same exponential decay as the Fourier transform of a
power-law function. The nonlinear statistical coupling is defined such that the
conjugate pair of q-Gaussians have equal strength but either couple
(compact-support) or decouple (heavy-tail) the statistical states. Many of the
nonextensive entropy applications can be shown to have physical parameters
proportional to the nonlinear statistical coupling.
| [
{
"version": "v1",
"created": "Sun, 23 Nov 2008 22:20:36 GMT"
}
]
| 2008-11-25T00:00:00 | [
[
"Nelson",
"Kenric P.",
""
],
[
"Umarov",
"Sabir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0811.3779 | Reid Andersen | Reid Andersen and Yuval Peres | Finding Sparse Cuts Locally Using Evolving Sets | 20 pages, no figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A {\em local graph partitioning algorithm} finds a set of vertices with small
conductance (i.e. a sparse cut) by adaptively exploring part of a large graph
$G$, starting from a specified vertex. For the algorithm to be local, its
complexity must be bounded in terms of the size of the set that it outputs,
with at most a weak dependence on the number $n$ of vertices in $G$. Previous
local partitioning algorithms find sparse cuts using random walks and
personalized PageRank. In this paper, we introduce a randomized local
partitioning algorithm that finds a sparse cut by simulating the {\em
volume-biased evolving set process}, which is a Markov chain on sets of
vertices. We prove that for any set of vertices $A$ that has conductance at
most $\phi$, for at least half of the starting vertices in $A$ our algorithm
will output (with probability at least half), a set of conductance
$O(\phi^{1/2} \log^{1/2} n)$. We prove that for a given run of the algorithm,
the expected ratio between its computational complexity and the volume of the
set that it outputs is $O(\phi^{-1/2} polylog(n))$. In comparison, the best
previous local partitioning algorithm, due to Andersen, Chung, and Lang, has
the same approximation guarantee, but a larger ratio of $O(\phi^{-1}
polylog(n))$ between the complexity and output volume. Using our local
partitioning algorithm as a subroutine, we construct a fast algorithm for
finding balanced cuts. Given a fixed value of $\phi$, the resulting algorithm
has complexity $O((m+n\phi^{-1/2}) polylog(n))$ and returns a cut with
conductance $O(\phi^{1/2} \log^{1/2} n)$ and volume at least $v_{\phi}/2$,
where $v_{\phi}$ is the largest volume of any set with conductance at most
$\phi$.
| [
{
"version": "v1",
"created": "Sun, 23 Nov 2008 22:39:38 GMT"
}
]
| 2008-11-25T00:00:00 | [
[
"Andersen",
"Reid",
""
],
[
"Peres",
"Yuval",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0811.3782 | Martin Ziegler | Martin Ziegler | Real Computation with Least Discrete Advice: A Complexity Theory of
Nonuniform Computability | added Sections 5.1 and 5.2 | null | null | null | cs.CC math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is folklore particularly in numerical and computer sciences that, instead
of solving some general problem f:A->B, additional structural information about
the input x in A (that is any kind of promise that x belongs to a certain
subset A' of A) should be taken advantage of. Some examples from real number
computation show that such discrete advice can even make the difference between
computability and uncomputability. We turn this into a both topological and
combinatorial complexity theory of information, investigating for several
practical problems how much advice is necessary and sufficient to render them
computable.
Specifically, finding a nontrivial solution to a homogeneous linear equation
A*x=0 for a given singular real NxN-matrix A is possible when knowing
rank(A)=0,1,...,N-1; and we show this to be best possible. Similarly,
diagonalizing (i.e. finding a BASIS of eigenvectors of) a given real symmetric
NxN-matrix is possible when knowing the number of distinct eigenvalues: an
integer between 1 and N (the latter corresponding to the nondegenerate case).
And again we show that N-fold (i.e. roughly log N bits of) additional
information is indeed necessary in order to render this problem (continuous
and) computable; whereas for finding SOME SINGLE eigenvector of A, providing
the truncated binary logarithm of the least-dimensional eigenspace of A--i.e.
Theta(log N)-fold advice--is sufficient and optimal.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2008 00:06:40 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Nov 2008 08:35:49 GMT"
},
{
"version": "v3",
"created": "Mon, 15 Dec 2008 16:10:56 GMT"
},
{
"version": "v4",
"created": "Tue, 23 Dec 2008 11:08:27 GMT"
},
{
"version": "v5",
"created": "Wed, 2 Sep 2009 14:52:59 GMT"
}
]
| 2009-09-02T00:00:00 | [
[
"Ziegler",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0811.3816 | Baris Baykant Alagoz | B. Baykant Alagoz | Adaptive Fault Masking With Incoherence Scoring | null | OncuBilim Algorithm And systems Lab, Vol.8,No:1,(2008) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An adaptive voting algorithm for digital media was introduced in this study.
Availability was improved by incoherence scoring in voting mechanism of
Multi-Modular Redundancy. Regulation parameters give the algorithm flexibility
of adjusting priorities in decision process. Proposed adaptive voting algorithm
was shown to be more aware of fault status of redundant modules
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2008 08:00:47 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Dec 2008 07:37:47 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Feb 2009 13:20:12 GMT"
}
]
| 2009-02-05T00:00:00 | [
[
"Alagoz",
"B. Baykant",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0811.3828 | Fabio Soldo | Fabio Soldo, Athina Markopoulou, Katerina Argyraki | Optimal Filtering of Malicious IP Sources | submitted to Infocom 09 | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | How can we protect the network infrastructure from malicious traffic, such as
scanning, malicious code propagation, and distributed denial-of-service (DDoS)
attacks? One mechanism for blocking malicious traffic is filtering: access
control lists (ACLs) can selectively block traffic based on fields of the IP
header. Filters (ACLs) are already available in the routers today but are a
scarce resource because they are stored in the expensive ternary content
addressable memory (TCAM).
In this paper, we develop, for the first time, a framework for studying
filter selection as a resource allocation problem. Within this framework, we
study five practical cases of source address/prefix filtering, which correspond
to different attack scenarios and operator's policies. We show that filter
selection optimization leads to novel variations of the multidimensional
knapsack problem and we design optimal, yet computationally efficient,
algorithms to solve them. We also evaluate our approach using data from
Dshield.org and demonstrate that it brings significant benefits in practice.
Our set of algorithms is a building block that can be immediately used by
operators and manufacturers to block malicious traffic in a cost-efficient way.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2008 09:37:37 GMT"
}
]
| 2008-11-25T00:00:00 | [
[
"Soldo",
"Fabio",
""
],
[
"Markopoulou",
"Athina",
""
],
[
"Argyraki",
"Katerina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0811.3859 | Raghavendra Rao | Raghavendra Rao B.V. and Jayalal M.N. Sarma | On the Complexity of Matroid Isomorphism Problem | null | null | null | null | cs.CC | http://creativecommons.org/licenses/by/3.0/ | We study the complexity of testing if two given matroids are isomorphic. The
problem is easily seen to be in $\Sigma_2^p$. In the case of linear matroids,
which are represented over polynomially growing fields, we note that the
problem is unlikely to be $\Sigma_2^p$-complete and is $\co\NP$-hard. We show
that when the rank of the matroid is bounded by a constant, linear matroid
isomorphism, and matroid isomorphism are both polynomial time many-one
equivalent to graph isomorphism. We give a polynomial time Turing reduction
from graphic matroid isomorphism problem to the graph isomorphism problem.
Using this, we are able to show that graphic matroid isomorphism testing for
planar graphs can be done in deterministic polynomial time. We then give a
polynomial time many-one reduction from bounded rank matroid isomorphism
problem to graphic matroid isomorphism, thus showing that all the above
problems are polynomial time equivalent. Further, for linear and graphic
matroids, we prove that the automorphism problem is polynomial time equivalent
to the corresponding isomorphism problems. In addition, we give a polynomial
time membership test algorithm for the automorphism group of a graphic matroid.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2008 14:19:02 GMT"
}
]
| 2008-11-25T00:00:00 | [
[
"V.",
"Raghavendra Rao B.",
""
],
[
"Sarma",
"Jayalal M. N.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0811.3887 | Nihar Jindal | Angel Lozano and Nihar Jindal | Transmit Diversity v. Spatial Multiplexing in Modern MIMO Systems | Submitted to IEEE Trans. Wireless Communications (revised Feb. 2009) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A contemporary perspective on the tradeoff between transmit antenna diversity
and spatial multiplexing is provided. It is argued that, in the context of most
modern wireless systems and for the operating points of interest, transmission
techniques that utilize all available spatial degrees of freedom for
multiplexing outperform techniques that explicitly sacrifice spatial
multiplexing for diversity. In the context of such systems, therefore, there
essentially is no decision to be made between transmit antenna diversity and
spatial multiplexing in MIMO communication. Reaching this conclusion, however,
requires that the channel and some key system features be adequately modeled
and that suitable performance metrics be adopted; failure to do so may bring
about starkly different conclusions. As a specific example, this contrast is
illustrated using the 3GPP Long-Term Evolution system design.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2008 15:00:20 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Mar 2009 15:49:44 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"Lozano",
"Angel",
""
],
[
"Jindal",
"Nihar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.3958 | Daniil Musatov | Daniil Musatov | Extractors and an efficient variant of Muchnik's theorem | 37 pages, in Russian | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Muchnik's theorem about simple conditional descriprion states that for all
words $a$ and $b$ there exists a short program $p$ transforming $a$ to $b$ that
has the least possible length and is simple conditional on $b$. This paper
presents a new proof of this theorem, based on extractors. Employing the
extractor technique, two new versions of Muchnik's theorem for space- and
time-bounded Kolmogorov complexity are proven.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2008 20:49:50 GMT"
}
]
| 2008-11-25T00:00:00 | [
[
"Musatov",
"Daniil",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0811.3959 | Michael Soltys | Grzegorz Herman and Michael Soltys | A polytime proof of correctness of the Rabin-Miller algorithm from
Fermat's little theorem | null | null | null | null | cs.CC cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although a deterministic polytime algorithm for primality testing is now
known, the Rabin-Miller randomized test of primality continues being the most
efficient and widely used algorithm.
We prove the correctness of the Rabin-Miller algorithm in the theory V1 for
polynomial time reasoning, from Fermat's little theorem. This is interesting
because the Rabin-Miller algorithm is a polytime randomized algorithm, which
runs in the class RP (i.e., the class of polytime Monte-Carlo algorithms), with
a sampling space exponential in the length of the binary encoding of the input
number. (The class RP contains polytime P.) However, we show how to express the
correctness in the language of V1, and we also show that we can prove the
formula expressing correctness with polytime reasoning from Fermat's Little
theorem, which is generally expected to be independent of V1.
Our proof is also conceptually very basic in the sense that we use the
extended Euclid's algorithm, for computing greatest common divisors, as the
main workhorse of the proof. For example, we make do without proving the
Chinese Reminder theorem, which is used in the standard proofs.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2008 20:34:32 GMT"
}
]
| 2008-11-25T00:00:00 | [
[
"Herman",
"Grzegorz",
""
],
[
"Soltys",
"Michael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0811.3975 | Hugo Gimbert | Nathalie Bertrand, Blaise Genest, Hugo Gimbert (LaBRI) | Determinacy and Decidability of Reachability Games with Partial
Observation on Both Sides | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove two determinacy and decidability results about two-players
stochastic reachability games with partial observation on both sides and
finitely many states, signals and actions.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2008 21:10:00 GMT"
}
]
| 2008-11-26T00:00:00 | [
[
"Bertrand",
"Nathalie",
"",
"LaBRI"
],
[
"Genest",
"Blaise",
"",
"LaBRI"
],
[
"Gimbert",
"Hugo",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0811.3978 | Hugo Gimbert | Hugo Gimbert (LaBRI), Florian Horn (LIAFA) | Optimal Strategies in Perfect-Information Stochastic Games with Tail
Winning Conditions | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that optimal strategies exist in every perfect-information
stochastic game with finitely many states and actions and a tail winning
condition.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2008 21:12:42 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Nov 2013 18:50:23 GMT"
}
]
| 2013-11-20T00:00:00 | [
[
"Gimbert",
"Hugo",
"",
"LaBRI"
],
[
"Horn",
"Florian",
"",
"LIAFA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0811.4007 | Krishnam Raju Jampani | Krishnam Raju Jampani and Anna Lubiw | The Simultaneous Membership Problem for Chordal, Comparability and
Permutation graphs | 15 pages, 1 figure | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce the 'simultaneous membership problem', defined for
any graph class C characterized in terms of representations, e.g. any class of
intersection graphs. Two graphs G_1 and G_2, sharing some vertices X (and the
corresponding induced edges), are said to be 'simultaneous members' of graph
class C, if there exist representations R_1 and R_2 of G_1 and G_2 that are
"consistent" on X. Equivalently (for the classes C that we consider) there
exist edges E' between G_1-X and G_2-X such that G_1 \cup G_2 \cup E' belongs
to class C.
Simultaneous membership problems have application in any situation where it
is desirable to consistently represent two related graphs, for example:
interval graphs capturing overlaps of DNA fragments of two similar organisms;
or graphs connected in time, where one is an updated version of the other.
Simultaneous membership problems are related to simultaneous planar embeddings,
graph sandwich problems and probe graph recognition problems.
In this paper we give efficient algorithms for the simultaneous membership
problem on chordal, comparability and permutation graphs. These results imply
that graph sandwich problems for the above classes are tractable for an
interesting special case: when the set of optional edges form a complete
bipartite graph. Our results complement the recent polynomial time recognition
algorithms for probe chordal, comparability, and permutation graphs, where the
set of optional edges form a clique.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 02:54:32 GMT"
}
]
| 2008-11-26T00:00:00 | [
[
"Jampani",
"Krishnam Raju",
""
],
[
"Lubiw",
"Anna",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0811.4030 | Bike Xie | Bike Xie, Mihaela van der Schaar and Richard D. Wesel | Analytical Framework for Optimizing Weighted Average Download Time in
Peer-to-Peer Networks | 12 pages, 16 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes an analytical framework for peer-to-peer (P2P) networks
and introduces schemes for building P2P networks to approach the minimum
weighted average download time (WADT). In the considered P2P framework, the
server, which has the information of all the download bandwidths and upload
bandwidths of the peers, minimizes the weighted average download time by
determining the optimal transmission rate from the server to the peers and from
the peers to the other peers. This paper first defines the static P2P network,
the hierarchical P2P network and the strictly hierarchical P2P network. Any
static P2P network can be decomposed into an equivalent network of sub-peers
that is strictly hierarchical. This paper shows that convex optimization can
minimize the WADT for P2P networks by equivalently minimizing the WADT for
strictly hierarchical networks of sub-peers. This paper then gives an upper
bound for minimizing WADT by constructing a hierarchical P2P network, and lower
bound by weakening the constraints of the convex problem. Both the upper bound
and the lower bound are very tight. This paper also provides several suboptimal
solutions for minimizing the WADT for strictly hierarchical networks, in which
peer selection algorithms and chunk selection algorithm can be locally
designed.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 09:20:28 GMT"
}
]
| 2008-11-26T00:00:00 | [
[
"Xie",
"Bike",
""
],
[
"van der Schaar",
"Mihaela",
""
],
[
"Wesel",
"Richard D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0811.4033 | Hajime Matsui | Vo Tam Van, Hajime Matsui, and Seiichi Mita | Computation of Grobner basis for systematic encoding of generalized
quasi-cyclic codes | 1 column, 36 pages, 7 figures, 1 table | null | null | null | cs.IT cs.DM math.AC math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generalized quasi-cyclic (GQC) codes form a wide and useful class of linear
codes that includes thoroughly quasi-cyclic codes, finite geometry (FG) low
density parity check (LDPC) codes, and Hermitian codes. Although it is known
that the systematic encoding of GQC codes is equivalent to the division
algorithm in the theory of Grobner basis of modules, there has been no
algorithm that computes Grobner basis for all types of GQC codes. In this
paper, we propose two algorithms to compute Grobner basis for GQC codes from
their parity check matrices: echelon canonical form algorithm and transpose
algorithm. Both algorithms require sufficiently small number of finite-field
operations with the order of the third power of code-length. Each algorithm has
its own characteristic; the first algorithm is composed of elementary methods,
and the second algorithm is based on a novel formula and is faster than the
first one for high-rate codes. Moreover, we show that a serial-in serial-out
encoder architecture for FG LDPC codes is composed of linear feedback shift
registers with the size of the linear order of code-length; to encode a binary
codeword of length n, it takes less than 2n adder and 2n memory elements.
Keywords: automorphism group, Buchberger's algorithm, division algorithm,
circulant matrix, finite geometry low density parity check (LDPC) codes.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 08:59:10 GMT"
}
]
| 2008-11-26T00:00:00 | [
[
"Van",
"Vo Tam",
""
],
[
"Matsui",
"Hajime",
""
],
[
"Mita",
"Seiichi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4040 | Ali Sydney | Ali Sydney, Caterina Scoglio, Phillip Schumm, Robert Kooij | ELASTICITY: Topological Characterization of Robustness in Complex
Networks | null | null | null | null | cs.NI physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Just as a herd of animals relies on its robust social structure to survive in
the wild, similarly robustness is a crucial characteristic for the survival of
a complex network under attack. The capacity to measure robustness in complex
networks defines the resolve of a network to maintain functionality in the
advent of classical component failures and at the onset of cryptic malicious
attacks. To date, robustness metrics are deficient and unfortunately the
following dilemmas exist: accurate models necessitate complex analysis while
conversely, simple models lack applicability to our definition of robustness.
In this paper, we define robustness and present a novel metric, elasticity- a
bridge between accuracy and complexity-a link in the chain of network
robustness. Additionally, we explore the performance of elasticity on Internet
topologies and online social networks, and articulate results.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 09:46:34 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Sydney",
"Ali",
""
],
[
"Scoglio",
"Caterina",
""
],
[
"Schumm",
"Phillip",
""
],
[
"Kooij",
"Robert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0811.4061 | Valery Pipin | Valery V. Pipin | Benchmarking the solar dynamo with Maxima | 8 pages, 1 figure | null | null | null | cs.SE cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, Jouve et al(A&A, 2008) published the paper that presents the
numerical benchmark for the solar dynamo models. Here, I would like to show a
way how to get it with help of computer algebra system Maxima. This way was
used in our paper (Pipin & Seehafer, A&A 2008, in print) to test some new ideas
in the large-scale stellar dynamos. In the present paper I complement the
dynamo benchmark with the standard test that address the problem of the
free-decay modes in the sphere which is submerged in vacuum.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 11:35:35 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Nov 2008 04:13:36 GMT"
}
]
| 2008-11-26T00:00:00 | [
[
"Pipin",
"Valery V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0811.4089 | Vadim E. Levit | Vadim E. Levit and Eugen Mandrescu | Interval greedoids and families of local maximum stable sets of graphs | 13 pages, 11 figures | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A maximum stable set in a graph G is a stable set of maximum cardinality. S
is a local maximum stable set of G, if S is a maximum stable set of the
subgraph induced by its closed neighborhood.
Nemhauser and Trotter Jr. proved in 1975 that any local maximum stable set is
a subset of a maximum stable set of G. In 2002 we showed that the family of all
local maximum stable sets of a forest forms a greedoid on its vertex set. The
cases where G is bipartite, triangle-free, well-covered, while the family of
all local maximum stable sets is a greedoid, were analyzed in 2004, 2007, and
2008, respectively.
In this paper we demonstrate that if the family of all local maximum stable
sets of the graph satisfies the accessibility property, then it is an interval
greedoid. We also characterize those graphs whose families of local maximum
stable sets are either antimatroids or matroids.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 14:11:44 GMT"
}
]
| 2011-01-25T00:00:00 | [
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0811.4121 | Sarad AV | Sankar K and Sarad AV | String Art: Circle Drawing Using Straight Lines | 12 pages, code included | null | null | null | cs.GR cs.OH | http://creativecommons.org/licenses/by-nc-sa/3.0/ | An algorithm to generate the locus of a circle using the intersection points
of straight lines is proposed. The pixels on the circle are plotted independent
of one another and the operations involved in finding the locus of the circle
from the intersection of straight lines are parallelizable. Integer only
arithmetic and algorithmic optimizations are used for speedup. The proposed
algorithm makes use of an envelope to form a parabolic arc which is consequent
transformed into a circle. The use of parabolic arcs for the transformation
results in higher pixel errors as the radius of the circle to be drawn
increases. At its current state, the algorithm presented may be suitable only
for generating circles for string art.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 17:12:22 GMT"
}
]
| 2008-11-26T00:00:00 | [
[
"K",
"Sankar",
""
],
[
"AV",
"Sarad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0811.4138 | Wojciech Mazurczyk | Wojciech Mazurczyk, Jozef Lubacz | LACK - a VoIP Steganographic Method | 13 pages, 11 figures, final version of this paper will be published
in Springer's Telecommunication Systems Journal | null | null | null | cs.CR cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents a new steganographic method called LACK (Lost Audio
PaCKets Steganography) which is intended mainly for VoIP. The method is
presented in a broader context of network steganography and of VoIP
steganography in particular. The analytical results presented in the paper
concern the influence of LACK's hidden data insertion procedure on the method's
impact on quality of voice transmission and its resistance to steganalysis.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 17:25:13 GMT"
}
]
| 2008-11-26T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Lubacz",
"Jozef",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0811.4139 | Venkatesan Guruswami | Venkatesan Guruswami | Artin automorphisms, Cyclotomic function fields, and Folded
list-decodable codes | 26 pages | null | null | null | math.NT cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Algebraic codes that achieve list decoding capacity were recently constructed
by a careful ``folding'' of the Reed-Solomon code. The ``low-degree'' nature of
this folding operation was crucial to the list decoding algorithm. We show how
such folding schemes conducive to list decoding arise out of the
Artin-Frobenius automorphism at primes in Galois extensions. Using this
approach, we construct new folded algebraic-geometric codes for list decoding
based on cyclotomic function fields with a cyclic Galois group. Such function
fields are obtained by adjoining torsion points of the Carlitz action of an
irreducible $M \in \F_q[T]$. The Reed-Solomon case corresponds to the simplest
such extension (corresponding to the case $M=T$). In the general case, we need
to descend to the fixed field of a suitable Galois subgroup in order to ensure
the existence of many degree one places that can be used for encoding.
Our methods shed new light on algebraic codes and their list decoding, and
lead to new codes achieving list decoding capacity. Quantitatively, these codes
provide list decoding (and list recovery/soft decoding) guarantees similar to
folded Reed-Solomon codes but with an alphabet size that is only
polylogarithmic in the block length. In comparison, for folded RS codes, the
alphabet size is a large polynomial in the block length. This has applications
to fully explicit (with no brute-force search) binary concatenated codes for
list decoding up to the Zyablov radius.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 17:44:42 GMT"
}
]
| 2008-11-26T00:00:00 | [
[
"Guruswami",
"Venkatesan",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4162 | Bike Xie | Bike Xie, Thomas Courtade, and Richard D. Wesel | Optimal Encoding Schemes for Several Classes of Discrete Degraded
Broadcast Channels | 50 pages, 18 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a memoryless degraded broadcast channel (DBC) in which the channel
output is a single-letter function of the channel input and the channel noise.
As examples, for the Gaussian broadcast channel (BC) this single-letter
function is regular Euclidian addition and for the binary-symmetric BC this
single-letter function is Galois-Field-two addition. This paper identifies
several classes of discrete memoryless DBCs for which a relatively simple
encoding scheme, which we call natural encoding, achieves capacity. Natural
Encoding (NE) combines symbols from independent codebooks (one for each
receiver) using the same single-letter function that adds distortion to the
channel. The alphabet size of each NE codebook is bounded by that of the
channel input.
Inspired by Witsenhausen and Wyner, this paper defines the conditional
entropy bound function $F^*$, studies its properties, and applies them to show
that NE achieves the boundary of the capacity region for the multi-receiver
broadcast Z channel. Then, this paper defines the input-symmetric DBC,
introduces permutation encoding for the input-symmetric DBC, and proves its
optimality. Because it is a special case of permutation encoding, NE is
capacity achieving for the two-receiver group-operation DBC. Combining the
broadcast Z channel and group-operation DBC results yields a proof that NE is
also optimal for the discrete multiplication DBC. Along the way, the paper also
provides explicit parametric expressions for the two-receiver binary-symmetric
DBC and broadcast Z channel.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 19:20:05 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jan 2009 05:18:07 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Feb 2009 07:12:46 GMT"
},
{
"version": "v4",
"created": "Fri, 8 May 2009 23:34:54 GMT"
},
{
"version": "v5",
"created": "Sun, 23 Oct 2011 05:15:30 GMT"
}
]
| 2011-10-25T00:00:00 | [
[
"Xie",
"Bike",
""
],
[
"Courtade",
"Thomas",
""
],
[
"Wesel",
"Richard D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4163 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | Packing and Covering Properties of Subspace Codes for Error Control in
Random Linear Network Coding | 12 pages, to appear in IEEE Transactions on Information Theory, May
2010 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Codes in the projective space and codes in the Grassmannian over a finite
field - referred to as subspace codes and constant-dimension codes (CDCs),
respectively - have been proposed for error control in random linear network
coding. For subspace codes and CDCs, a subspace metric was introduced to
correct both errors and erasures, and an injection metric was proposed to
correct adversarial errors. In this paper, we investigate the packing and
covering properties of subspace codes with both metrics. We first determine
some fundamental geometric properties of the projective space with both
metrics. Using these properties, we then derive bounds on the cardinalities of
packing and covering subspace codes, and determine the asymptotic rates of
optimal packing and optimal covering subspace codes with both metrics. Our
results not only provide guiding principles for the code design for error
control in random linear network coding, but also illustrate the difference
between the two metrics from a geometric perspective. In particular, our
results show that optimal packing CDCs are optimal packing subspace codes up to
a scalar for both metrics if and only if their dimension is half of their
length (up to rounding). In this case, CDCs suffer from only limited rate loss
as opposed to subspace codes with the same minimum distance. We also show that
optimal covering CDCs can be used to construct asymptotically optimal covering
subspace codes with the injection metric only.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 19:41:06 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Dec 2008 14:09:20 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Mar 2009 20:28:48 GMT"
},
{
"version": "v4",
"created": "Tue, 30 Mar 2010 09:38:53 GMT"
}
]
| 2010-03-31T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4170 | Alain Barrat | Alain Barrat, Ciro Cattuto, Vittoria Colizza, Jean-Francois Pinton,
Wouter Van den Broeck, Alessandro Vespignani | High resolution dynamical mapping of social interactions with active
RFID | null | PLoS ONE 5(7): e11596 (2010) | 10.1371/journal.pone.0011596 | null | cs.CY cs.HC physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present an experimental framework to gather data on
face-to-face social interactions between individuals, with a high spatial and
temporal resolution. We use active Radio Frequency Identification (RFID)
devices that assess contacts with one another by exchanging low-power radio
packets. When individuals wear the beacons as a badge, a persistent radio
contact between the RFID devices can be used as a proxy for a social
interaction between individuals. We present the results of a pilot study
recently performed during a conference, and a subsequent preliminary data
analysis, that provides an assessment of our method and highlights its
versatility and applicability in many areas concerned with human dynamics.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 20:54:34 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Nov 2008 21:01:28 GMT"
}
]
| 2010-08-18T00:00:00 | [
[
"Barrat",
"Alain",
""
],
[
"Cattuto",
"Ciro",
""
],
[
"Colizza",
"Vittoria",
""
],
[
"Pinton",
"Jean-Francois",
""
],
[
"Broeck",
"Wouter Van den",
""
],
[
"Vespignani",
"Alessandro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0811.4186 | Aleksandar Bradic M | Aleksandar Bradic | Search Result Clustering via Randomized Partitioning of Query-Induced
Subgraphs | 16th Telecommunications Forum TELFOR 2008 | null | null | null | cs.IR cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present an approach to search result clustering, using
partitioning of underlying link graph. We define the notion of "query-induced
subgraph" and formulate the problem of search result clustering as a problem of
efficient partitioning of given subgraph into topic-related clusters. Also, we
propose a novel algorithm for approximative partitioning of such graph, which
results in cluster quality comparable to the one obtained by deterministic
algorithms, while operating in more efficient computation time, suitable for
practical implementations. Finally, we present a practical clustering search
engine developed as a part of this research and use it to get results about
real-world performance of proposed concepts.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 23:11:55 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Bradic",
"Aleksandar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0811.4191 | Peng Wu | Peng Wu and Nihar Jindal | Performance of Hybrid-ARQ in Block-Fading Channels: A Fixed Outage
Probability Analysis | 28 pages, 11 figures, accepted at IEEE Trans. Communications | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper studies the performance of hybrid-ARQ (automatic repeat request)
in Rayleigh block fading channels. The long-term average transmitted rate is
analyzed in a fast-fading scenario where the transmitter only has knowledge of
channel statistics, and, consistent with contemporary wireless systems, rate
adaptation is performed such that a target outage probability (after a maximum
number of H-ARQ rounds) is maintained. H-ARQ allows for early termination once
decoding is possible, and thus is a coarse, and implicit, mechanism for rate
adaptation to the instantaneous channel quality. Although the rate with H-ARQ
is not as large as the ergodic capacity, which is achievable with rate
adaptation to the instantaneous channel conditions, even a few rounds of H-ARQ
make the gap to ergodic capacity reasonably small for operating points of
interest. Furthermore, the rate with H-ARQ provides a significant advantage
compared to systems that do not use H-ARQ and only adapt rate based on the
channel statistics.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2008 23:44:57 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Jun 2009 21:11:50 GMT"
},
{
"version": "v3",
"created": "Thu, 17 Sep 2009 20:18:18 GMT"
}
]
| 2009-09-17T00:00:00 | [
[
"Wu",
"Peng",
""
],
[
"Jindal",
"Nihar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4200 | Vaneet Aggarwal | Vaneet Aggarwal and Gajanana Krishna and Srikrishna Bhashyam and
Ashutosh Sabharwal | Two Models for Noisy Feedback in MIMO Channels | In Proceedings of Asilomar Conference on Signals, Systems, and
Computers, Oct. 2008, Pacific Grove, CA | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two distinct models of feedback, suited for FDD (Frequency Division Duplex)
and TDD (Frequency Division Duplex) systems respectively, have been widely
studied in the literature. In this paper, we compare these two models of
feedback in terms of the diversity multiplexing tradeoff for varying amount of
channel state information at the terminals. We find that, when all
imperfections are accounted for, the maximum achievable diversity order in FDD
systems matches the diversity order in TDD systems. TDD systems achieve better
diversity order at higher multiplexing gains. In FDD systems, the maximum
diversity order can be achieved with just a single bit of feedback. Additional
bits of feedback (perfect or imperfect) do not affect the diversity order if
the receiver does not know the channel state information.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 04:11:36 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Aggarwal",
"Vaneet",
""
],
[
"Krishna",
"Gajanana",
""
],
[
"Bhashyam",
"Srikrishna",
""
],
[
"Sabharwal",
"Ashutosh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4227 | Mark Wilde | Min-Hsiu Hsieh and Mark M. Wilde | Entanglement-assisted communication of classical and quantum information | 23 pages, 5 figures, 1 table, simplification of capacity region--it
now has the simple interpretation as the unit resource capacity region
translated along the classically-enhanced father trade-off curve | IEEE Transactions on Information Theory, vol. 56, no. 9, pp.
4682-4704, September 2010 | 10.1109/TIT.2010.2053903 | null | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of transmitting classical and quantum information
reliably over an entanglement-assisted quantum channel. Our main result is a
capacity theorem that gives a three-dimensional achievable rate region. Points
in the region are rate triples, consisting of the classical communication rate,
the quantum communication rate, and the entanglement consumption rate of a
particular coding scheme. The crucial protocol in achieving the boundary points
of the capacity region is a protocol that we name the classically-enhanced
father protocol. The classically-enhanced father protocol is more general than
other protocols in the family tree of quantum Shannon theoretic protocols, in
the sense that several previously known quantum protocols are now child
protocols of it. The classically-enhanced father protocol also shows an
improvement over a time-sharing strategy for the case of a qubit dephasing
channel--this result justifies the need for simultaneous coding of classical
and quantum information over an entanglement-assisted quantum channel. Our
capacity theorem is of a multi-letter nature (requiring a limit over many uses
of the channel), but it reduces to a single-letter characterization for at
least three channels: the completely depolarizing channel, the quantum erasure
channel, and the qubit dephasing channel.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 05:23:41 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Nov 2009 20:49:41 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Jan 2010 18:07:34 GMT"
},
{
"version": "v4",
"created": "Wed, 3 Mar 2010 03:26:06 GMT"
}
]
| 2010-08-23T00:00:00 | [
[
"Hsieh",
"Min-Hsiu",
""
],
[
"Wilde",
"Mark M.",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4257 | Juan Tapiador | Julio C. Hernandez-Castro, Juan M. E. Tapiador, Pedro Peris-Lopez,
Jean-Jacques Quisquater | Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol
with Modular Rotations | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we present the first passive attack over the SASI lightweight
authentication protocol with modular rotations. This can be used to fully
recover the secret $ID$ of the RFID tag, which is the value the protocol is
designed to conceal. The attack is described initially for recovering $\lfloor
log_2(96) \rfloor=6$ bits of the secret value $ID$, a result that by itself
allows to mount traceability attacks on any given tag. However, the proposed
scheme can be extended to obtain any amount of bits of the secret $ID$,
provided a sufficiently large number of successful consecutive sessions are
eavesdropped. We also present results on the attack's efficiency, and some
ideas to secure this version of the SASI protocol.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 09:40:18 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Hernandez-Castro",
"Julio C.",
""
],
[
"Tapiador",
"Juan M. E.",
""
],
[
"Peris-Lopez",
"Pedro",
""
],
[
"Quisquater",
"Jean-Jacques",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0811.4324 | Pierre Genev\`es | Pierre Genev\`es, Nabil Laya\"ida, and Vincent Quint | Ensuring Query Compatibility with Evolving XML Schemas | null | null | null | RR-6711 | cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | During the life cycle of an XML application, both schemas and queries may
change from one version to another. Schema evolutions may affect query results
and potentially the validity of produced data. Nowadays, a challenge is to
assess and accommodate the impact of theses changes in rapidly evolving XML
applications.
This article proposes a logical framework and tool for verifying
forward/backward compatibility issues involving schemas and queries. First, it
allows analyzing relations between schemas. Second, it allows XML designers to
identify queries that must be reformulated in order to produce the expected
results across successive schema versions. Third, it allows examining more
precisely the impact of schema changes over queries, therefore facilitating
their reformulation.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 14:37:01 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Genevès",
"Pierre",
""
],
[
"Layaïda",
"Nabil",
""
],
[
"Quint",
"Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0811.4339 | Christoph Studer | Christoph Studer, Dominik Seethaler, Helmut B\"olcskei | Finite Lattice-Size Effects in MIMO Detection | presented at the 42th Asilomar Conf. Signals, Systems, and Computers,
Pacific Grove, CA, 2008 | Proc. 42th Asilomar Conf. Signals, Systems, and Computers, Pacific
Grove, CA, Oct. 2008 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many powerful data detection algorithms employed in multiple-input
multiple-output (MIMO) communication systems, such as sphere decoding (SD) and
lattice-reduction (LR)-aided detection, were initially designed for infinite
lattices. Detection in MIMO systems is, however, based on finite lattices. In
this paper, we systematically study the consequences of finite lattice-size for
the performance and complexity of MIMO detection algorithms formulated for
infinite lattices. Specifically, we find, considering performance and
complexity, that LR does not seem to offer advantages when used in conjunction
with SD.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 15:15:01 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Studer",
"Christoph",
""
],
[
"Seethaler",
"Dominik",
""
],
[
"Bölcskei",
"Helmut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4346 | Ke Yi | Ke Yi | Dynamic Indexability: The Query-Update Tradeoff for One-Dimensional
Range Queries | 13 pages | null | null | null | cs.DS cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The B-tree is a fundamental secondary index structure that is widely used for
answering one-dimensional range reporting queries. Given a set of $N$ keys, a
range query can be answered in $O(\log_B \nm + \frac{K}{B})$ I/Os, where $B$ is
the disk block size, $K$ the output size, and $M$ the size of the main memory
buffer. When keys are inserted or deleted, the B-tree is updated in $O(\log_B
N)$ I/Os, if we require the resulting changes to be committed to disk right
away. Otherwise, the memory buffer can be used to buffer the recent updates,
and changes can be written to disk in batches, which significantly lowers the
amortized update cost. A systematic way of batching up updates is to use the
logarithmic method, combined with fractional cascading, resulting in a dynamic
B-tree that supports insertions in $O(\frac{1}{B}\log\nm)$ I/Os and queries in
$O(\log\nm + \frac{K}{B})$ I/Os. Such bounds have also been matched by several
known dynamic B-tree variants in the database literature.
In this paper, we prove that for any dynamic one-dimensional range query
index structure with query cost $O(q+\frac{K}{B})$ and amortized insertion cost
$O(u/B)$, the tradeoff $q\cdot \log(u/q) = \Omega(\log B)$ must hold if
$q=O(\log B)$. For most reasonable values of the parameters, we have $\nm =
B^{O(1)}$, in which case our query-insertion tradeoff implies that the bounds
mentioned above are already optimal. Our lower bounds hold in a dynamic version
of the {\em indexability model}, which is of independent interests.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 15:36:14 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Yi",
"Ke",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0811.4349 | Achmad Benny Mutiara | A.B.Mutiara and S.Agustina | Anti Plagiarism Application with Algorithm Karp-Rabin at Thesis in
Gunadarma University | 9 pages, 22 Figures | null | null | null | cs.IT cs.DL math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Plagiarism that is plagiarizing or composition retrieval, opinion, etcetera
from other people and makes it is likely composition and opinion him-self.
Plagiarism can be considered to be crime because stealing others copyrights.
Like action a student copying some part of writings without valid permission
from the original writer. In education world, plagiarism perpetrator can get
the devil to pay from school/university. Plagiarism perpetrator conceived of
plagiator. This thing is possible unable to be paid attention by the side of
campus because of limitation from some interconnected factors for example
student amounts Gunadarma University reaching thousands and incommensurate to
tester amounts or lecturer the side of campus in charge directs problem thesis.
In this paper, an application have been developed in order to check and look
for 5 type percentage similarity from a thesis with other one at certain part
or chapters. Percentage got that is 0%, under 15%, between 15-50%, up to 50%
and 100%. So it should be expected that the results could be used by thesis
advisor and also thesis examiner from the Student at Gunadarma University.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 15:55:22 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Mutiara",
"A. B.",
""
],
[
"Agustina",
"S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4354 | Christoph Studer | Christoph Studer and Helmut B\"olcskei | Soft-Input Soft-Output Sphere Decoding | presented at IEEE Int. Symposium on Information Theory (ISIT),
Toronto, ON, Canada | IEEE Int. Symposium on Information Theory (ISIT), Toronto, ON,
Canada, pp. 2007-2011, July 2008 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Soft-input soft-output (SISO) detection algorithms form the basis for
iterative decoding. The associated computational complexity often poses
significant challenges for practical receiver implementations, in particular in
the context of multiple-input multiple-output wireless systems. In this paper,
we present a low-complexity SISO sphere decoder which is based on the single
tree search paradigm, proposed originally for soft-output detection in Studer
et al., IEEE J-SAC, 2008. The algorithm incorporates clipping of the extrinsic
log-likelihood ratios in the tree search, which not only results in significant
complexity savings, but also allows to cover a large performance/complexity
trade-off region by adjusting a single parameter.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 16:06:25 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Studer",
"Christoph",
""
],
[
"Bölcskei",
"Helmut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4364 | Ivan Jureta | Ivan Jureta, John Mylopoulos, Stephane Faulkner | Revisiting the Core Ontology and Problem in Requirements Engineering | Appears in the proceedings of the 16th IEEE International
Requirements Engineering Conference, 2008 (RE'08). Best paper award | null | 10.1109/RE.2008.13 | null | cs.SE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In their seminal paper in the ACM Transactions on Software Engineering and
Methodology, Zave and Jackson established a core ontology for Requirements
Engineering (RE) and used it to formulate the "requirements problem", thereby
defining what it means to successfully complete RE. Given that stakeholders of
the system-to-be communicate the information needed to perform RE, we show that
Zave and Jackson's ontology is incomplete. It does not cover all types of basic
concerns that the stakeholders communicate. These include beliefs, desires,
intentions, and attitudes. In response, we propose a core ontology that covers
these concerns and is grounded in sound conceptual foundations resting on a
foundational ontology. The new core ontology for RE leads to a new formulation
of the requirements problem that extends Zave and Jackson's formulation. We
thereby establish new standards for what minimum information should be
represented in RE languages and new criteria for determining whether RE has
been successfully completed.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 16:36:29 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Jureta",
"Ivan",
""
],
[
"Mylopoulos",
"John",
""
],
[
"Faulkner",
"Stephane",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0811.4367 | Alberto Momigliano | Amy Felty and Alberto Momigliano | Hybrid: A Definitional Two-Level Approach to Reasoning with Higher-Order
Abstract Syntax | 58 pages, with 12 figures. To appear in the Journal of Automated
Reasoning, accepted April 2010. For associated code, see
http://hybrid.dsi.unimi.it/jar/index.html | null | null | University of Ottawa Technical Report, number TR-2008-03 | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Combining higher-order abstract syntax and (co)induction in a logical
framework is well known to be problematic. Previous work described the
implementation of a tool called Hybrid, within Isabelle HOL, which aims to
address many of these difficulties. It allows object logics to be represented
using higher-order abstract syntax, and reasoned about using tactical theorem
proving and principles of (co)induction. In this paper we describe how to use
it in a multi-level reasoning fashion, similar in spirit to other meta-logics
such as Twelf. By explicitly referencing provability in a middle layer called a
specification logic, we solve the problem of reasoning by (co)induction in the
presence of non-stratifiable hypothetical judgments, which allow very elegant
and succinct specifications of object logic inference rules.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 17:04:30 GMT"
},
{
"version": "v2",
"created": "Wed, 26 May 2010 13:22:10 GMT"
}
]
| 2010-05-27T00:00:00 | [
[
"Felty",
"Amy",
""
],
[
"Momigliano",
"Alberto",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0811.4376 | Soubhik Chakraborty | Suman Kumar Sourabh and Soubhik Chakraborty | How robust is quicksort average complexity? | 15 pages;12figures;2 tables | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper questions the robustness of average case time complexity of the
fast and popular quicksort algorithm. Among the six standard probability
distributions examined in the paper, only continuous uniform, exponential and
standard normal are supporting it whereas the others are supporting the worst
case complexity measure. To the question -why are we getting the worst case
complexity measure each time the average case measure is discredited? -- one
logical answer is average case complexity under the universal distribution
equals worst case complexity. This answer, which is hard to challenge, however
gives no idea as to which of the standard probability distributions come under
the umbrella of universality. The morale is that average case complexity
measures, in cases where they are different from those in worst case, should be
deemed as robust provided only they get the support from at least the standard
probability distributions, both discrete and continuous. Regretfully, this is
not the case with quicksort.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 17:23:22 GMT"
}
]
| 2016-11-27T00:00:00 | [
[
"Sourabh",
"Suman Kumar",
""
],
[
"Chakraborty",
"Soubhik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0811.4391 | Morteza Mardani | Morteza Mardani, Jalil S. Harsini and Farshad Lahouti | Cross-Layer Link Adaptation Design for Relay Channels with Cooperative
ARQ Protocol | 6 pages, 3 figures, Submitted | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The cooperative automatic repeat request (C-ARQ) is a link layer relaying
protocol which exploits the spatial diversity and allows the relay node to
retransmit the source data packet to the destination, when the latter is unable
to decode the source data correctly. This paper presents a cross-layer link
adaptation design for C-ARQ based relay channels in which both source and relay
nodes employ adaptive modulation coding and power adaptation at the physical
layer. For this scenario, we first derive closed-form expressions for the
system spectral efficiency and average power consumption. We then present a low
complexity iterative algorithm to find the optimized adaptation solution by
maximizing the spectral efficiency subject to a packet loss rate (PLR) and an
average power consumption constraint. The results indicate that the proposed
adaptation scheme enhances the spectral efficiency noticeably when compared to
other adaptive schemes, while guaranteeing the required PLR performance.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 18:18:31 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Dec 2008 11:48:16 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Feb 2009 19:45:20 GMT"
}
]
| 2009-02-17T00:00:00 | [
[
"Mardani",
"Morteza",
""
],
[
"Harsini",
"Jalil S.",
""
],
[
"Lahouti",
"Farshad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4395 | Venkatesan Guruswami | Parikshit Gopalan, Venkatesan Guruswami, and Prasad Raghavendra | List Decoding Tensor Products and Interleaved Codes | 32 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We design the first efficient algorithms and prove new combinatorial bounds
for list decoding tensor products of codes and interleaved codes. We show that
for {\em every} code, the ratio of its list decoding radius to its minimum
distance stays unchanged under the tensor product operation (rather than
squaring, as one might expect). This gives the first efficient list decoders
and new combinatorial bounds for some natural codes including multivariate
polynomials where the degree in each variable is bounded. We show that for {\em
every} code, its list decoding radius remains unchanged under $m$-wise
interleaving for an integer $m$. This generalizes a recent result of Dinur et
al \cite{DGKS}, who proved such a result for interleaved Hadamard codes
(equivalently, linear transformations). Using the notion of generalized Hamming
weights, we give better list size bounds for {\em both} tensoring and
interleaving of binary linear codes. By analyzing the weight distribution of
these codes, we reduce the task of bounding the list size to bounding the
number of close-by low-rank codewords. For decoding linear transformations,
using rank-reduction together with other ideas, we obtain list size bounds that
are tight over small fields.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 18:28:44 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Gopalan",
"Parikshit",
""
],
[
"Guruswami",
"Venkatesan",
""
],
[
"Raghavendra",
"Prasad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4397 | Morteza Mardani | Morteza Mardani, Jalil S. Harsini, Farshad Lahouti, Behrouz Eliasi | Joint Adaptive Modulation-Coding and Cooperative ARQ for Wireless Relay
Networks | 5 pages, 4 figures, To appear in the Proceedings of the 2008 IEEE
International Symposium on Wireless Communication Systems (ISWCS), Rykevick,
Island, Oct 2008 | null | 10.1109/ISWCS.2008.4726069 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a cross-layer approach to jointly design adaptive
modulation and coding (AMC) at the physical layer and cooperative truncated
automatic repeat request (ARQ) protocol at the data link layer. We first derive
an exact closed form expression for the spectral efficiency of the proposed
joint AMC-cooperative ARQ scheme. Aiming at maximizing this system performance
measure, we then optimize an AMC scheme which directly satisfies a prescribed
packet loss rate constraint at the data-link layer. The results indicate that
utilizing cooperative ARQ as a retransmission strategy, noticeably enhances the
spectral efficiency compared with the system that employs AMC alone at the
physical layer. Moreover, the proposed adaptive rate cooperative ARQ scheme
outperforms the fixed rate counterpart when the transmission modes at the
source and relay are chosen based on the channel statistics. This in turn
quantifies the possible gain achieved by joint design of AMC and ARQ in
wireless relay networks.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 18:41:52 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Mardani",
"Morteza",
""
],
[
"Harsini",
"Jalil S.",
""
],
[
"Lahouti",
"Farshad",
""
],
[
"Eliasi",
"Behrouz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4403 | Morteza Mardani | Morteza Mardani, Jalil S. Harsini, Farshad Lahouti, Behrouz Eliasi | Joint Adaptive Modulation Coding and Cooperative ARQ over Relay
Channels-Applications to Land Mobile Satellite Communications | 24 pages, 7 figures, 1 table, Submitted to the International Journal
on Wireless Communications and Mobile Computing, Wiley & Sons, Submitted July
2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a cooperative relay network, a relay node (R) facilitates data
transmission to the destination node (D), when the latter is unable to decode
the source node (S) data correctly. This paper considers such a system model
and presents a cross-layer approach to jointly design adaptive modulation and
coding (AMC) at the physical layer and cooperative truncated automatic repeat
request (ARQ) protocol at the data link layer. We first derive a closed form
expression for the spectral efficiency of the joint cooperative ARQ-AMC scheme.
Aiming at maximizing this performance measure, we then optimize two AMC schemes
for S-D and R-D links, which directly satisfy a prescribed packet loss rate
constraint. As an interesting application, we also consider the problem of
joint link adaptation and blockage mitigation in land mobile satellite
communications (LMSC). We also present a new relay-assisted transmission
protocol for LMSC, which delivers the source data to the destination via the
relaying link, when the S-D channel is in outage. Numerical results indicate
that the proposed schemes noticeably enhances the spectral efficiency compared
to a system, which uses a conventional ARQ-AMC scheme at the S-D link, or a
system which employs an optimized fixed rate cooperative-ARQ protocol.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 19:28:02 GMT"
}
]
| 2008-11-27T00:00:00 | [
[
"Mardani",
"Morteza",
""
],
[
"Harsini",
"Jalil S.",
""
],
[
"Lahouti",
"Farshad",
""
],
[
"Eliasi",
"Behrouz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4413 | Daniel Hsu | Daniel Hsu, Sham M. Kakade, Tong Zhang | A Spectral Algorithm for Learning Hidden Markov Models | Published in JCSS Special Issue "Learning Theory 2009" | Journal of Computer and System Sciences, 78(5):1460-1480, 2012 | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hidden Markov Models (HMMs) are one of the most fundamental and widely used
statistical tools for modeling discrete time series. In general, learning HMMs
from data is computationally hard (under cryptographic assumptions), and
practitioners typically resort to search heuristics which suffer from the usual
local optima issues. We prove that under a natural separation condition (bounds
on the smallest singular value of the HMM parameters), there is an efficient
and provably correct algorithm for learning HMMs. The sample complexity of the
algorithm does not explicitly depend on the number of distinct (discrete)
observations---it implicitly depends on this quantity through spectral
properties of the underlying HMM. This makes the algorithm particularly
applicable to settings with a large number of observations, such as those in
natural language processing where the space of observation is sometimes the
words in a language. The algorithm is also simple, employing only a singular
value decomposition and matrix multiplications.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2008 20:22:51 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Nov 2008 06:17:59 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Feb 2009 05:47:49 GMT"
},
{
"version": "v4",
"created": "Tue, 9 Jun 2009 16:15:49 GMT"
},
{
"version": "v5",
"created": "Wed, 19 Aug 2009 23:43:59 GMT"
},
{
"version": "v6",
"created": "Fri, 6 Jul 2012 23:29:02 GMT"
}
]
| 2012-07-10T00:00:00 | [
[
"Hsu",
"Daniel",
""
],
[
"Kakade",
"Sham M.",
""
],
[
"Zhang",
"Tong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0811.4458 | Oliver Schulte | Oliver Schulte, Hassan Khosravi, Flavia Moser, Martin Ester | Learning Class-Level Bayes Nets for Relational Data | 14 pages (2 column) | null | null | TR 2008-17, School of Computing Science, Simon Fraser University | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many databases store data in relational format, with different types of
entities and information about links between the entities. The field of
statistical-relational learning (SRL) has developed a number of new statistical
models for such data. In this paper we focus on learning class-level or
first-order dependencies, which model the general database statistics over
attributes of linked objects and links (e.g., the percentage of A grades given
in computer science classes). Class-level statistical relationships are
important in themselves, and they support applications like policy making,
strategic planning, and query optimization. Most current SRL methods find
class-level dependencies, but their main task is to support instance-level
predictions about the attributes or links of specific entities. We focus only
on class-level prediction, and describe algorithms for learning class-level
models that are orders of magnitude faster for this task. Our algorithms learn
Bayes nets with relational structure, leveraging the efficiency of single-table
nonrelational Bayes net learners. An evaluation of our methods on three data
sets shows that they are computationally feasible for realistic table sizes,
and that the learned structures represent the statistical information in the
databases well. After learning compiles the database statistics into a Bayes
net, querying these statistics via Bayes net inference is faster than with SQL
queries, and does not depend on the size of the database.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2008 01:02:33 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Oct 2009 18:58:20 GMT"
}
]
| 2009-10-20T00:00:00 | [
[
"Schulte",
"Oliver",
""
],
[
"Khosravi",
"Hassan",
""
],
[
"Moser",
"Flavia",
""
],
[
"Ester",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0811.4483 | Ga\"etan Le Guelvouit | Ga\"etan Le Guelvouit, St\'ephane Pateux | Wide spread spectrum watermarking with side information and interference
cancellation | 12 pages, 8 figures | Proc. IS&T/SPIE Electronic Imaging, vol. 5020, Santa Clara, CA,
Jan. 2003 | 10.1117/12.476839 | null | cs.MM cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nowadays, a popular method used for additive watermarking is wide spread
spectrum. It consists in adding a spread signal into the host document. This
signal is obtained by the sum of a set of carrier vectors, which are modulated
by the bits to be embedded. To extract these embedded bits, weighted
correlations between the watermarked document and the carriers are computed.
Unfortunately, even without any attack, the obtained set of bits can be
corrupted due to the interference with the host signal (host interference) and
also due to the interference with the others carriers (inter-symbols
interference (ISI) due to the non-orthogonality of the carriers). Some recent
watermarking algorithms deal with host interference using side informed
methods, but inter-symbols interference problem is still open. In this paper,
we deal with interference cancellation methods, and we propose to consider ISI
as side information and to integrate it into the host signal. This leads to a
great improvement of extraction performance in term of signal-to-noise ratio
and/or watermark robustness.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 16:28:59 GMT"
}
]
| 2008-12-01T00:00:00 | [
[
"Guelvouit",
"Gaëtan Le",
""
],
[
"Pateux",
"Stéphane",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4489 | Bin Jiang | Bin Jiang and Xintao Liu | Automatic Generation of the Axial Lines of Urban Environments to Capture
What We Perceive | 13 pages, 9 figures submitted to International Journal of
Geographical Information Science. With version 2, the concept of bucket has
been explained and illustrated in more detail. With version 3, better
formating and finetune | International Journal of Geographical Information Science, 24(4),
2010, 545-558 | null | null | cs.CG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Based on the concepts of isovists and medial axes, we developed a set of
algorithms that can automatically generate axial lines for representing
individual linearly stretched parts of open space of an urban environment. Open
space is the space between buildings, where people can freely move around. The
generation of the axial lines has been a key aspect of space syntax research,
conventionally relying on hand-drawn axial lines of an urban environment, often
called axial map, for urban morphological analysis. Although various attempts
have been made towards an automatic solution, few of them can produce the axial
map that consists of the least number of longest visibility lines, and none of
them really works for different urban environments. Our algorithms provide a
better solution than existing ones. Throughout this paper, we have also argued
and demonstrated that the axial lines constitute a true skeleton, superior to
medial axes, in capturing what we perceive about the urban environment.
Keywords: Visibility, space syntax, topological analysis, medial axes, axial
lines, isovists
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2008 09:04:36 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Jan 2009 20:36:22 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Mar 2009 23:17:06 GMT"
}
]
| 2013-07-17T00:00:00 | [
[
"Jiang",
"Bin",
""
],
[
"Liu",
"Xintao",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0811.4497 | Anuj Dawar | Anuj Dawar | Homomorphism Preservation on Quasi-Wide Classes | 13 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A class of structures is said to have the homomorphism-preservation property
just in case every first-order formula that is preserved by homomorphisms on
this class is equivalent to an existential-positive formula. It is known by a
result of Rossman that the class of finite structures has this property and by
previous work of Atserias et al. that various of its subclasses do. We extend
the latter results by introducing the notion of a quasi-wide class and showing
that any quasi-wide class that is closed under taking substructures and
disjoint unions has the homomorphism-preservation property. We show, in
particular, that classes of structures of bounded expansion and that locally
exclude minors are quasi-wide. We also construct an example of a class of
finite structures which is closed under substructures and disjoint unions but
does not admit the homomorphism-preservation property.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2008 09:50:22 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Mar 2009 17:48:07 GMT"
}
]
| 2009-03-08T00:00:00 | [
[
"Dawar",
"Anuj",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0811.4565 | Shi Jin | Shi Jin, Matthew R. McKay, Caijun Zhong, Kai-Kit Wong | Ergodic Capacity Analysis of Amplify-and-Forward MIMO Dual-Hop Systems | 40 pages, 9 figures, Submitted to to IEEE Transactions on Information
Theory | null | 10.1109/TIT.2010.2043765 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an analytical characterization of the ergodic capacity of
amplify-and-forward (AF) MIMO dual-hop relay channels, assuming that the
channel state information is available at the destination terminal only. In
contrast to prior results, our expressions apply for arbitrary numbers of
antennas and arbitrary relay configurations. We derive an expression for the
exact ergodic capacity, simplified closed-form expressions for the high SNR
regime, and tight closed-form upper and lower bounds. These results are made
possible to employing recent tools from finite-dimensional random matrix theory
to derive new closed-form expressions for various statistical properties of the
equivalent AF MIMO dual-hop relay channel, such as the distribution of an
unordered eigenvalue and certain random determinant properties. Based on the
analytical capacity expressions, we investigate the impact of the system and
channel characteristics, such as the antenna configuration and the relay power
gain. We also demonstrate a number of interesting relationships between the
dual-hop AF MIMO relay channel and conventional point-to-point MIMO channels in
various asymptotic regimes.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2008 15:33:45 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Jin",
"Shi",
""
],
[
"McKay",
"Matthew R.",
""
],
[
"Zhong",
"Caijun",
""
],
[
"Wong",
"Kai-Kit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4603 | Massimo Franceschet | Massimo Franceschet | Frozen Footprints | Added section about bibliometric distributions; improved section
about bibliometric maps; added references; changed title; latex format | null | null | null | cs.DL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bibliometrics has the ambitious goal of measuring science. To this end, it
exploits the way science is disseminated trough scientific publications and the
resulting citation network of scientific papers. We survey the main historical
contributions to the field, the most interesting bibliometric indicators, and
the most popular bibliometric data sources. Moreover, we discuss distributions
commonly used to model bibliometric phenomena and give an overview of methods
to build bibliometric maps of science.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2008 18:12:28 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Jul 2009 08:36:07 GMT"
}
]
| 2009-07-17T00:00:00 | [
[
"Franceschet",
"Massimo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0811.4630 | Hooman Shirani-Mehr | Hooman Shirani-Mehr, Daniel N. Liu and Giuseppe Caire | Channel State Prediction, Feedback and Scheduling for a Multiuser
MIMO-OFDM Downlink | In Proceedings of 42th Asilomar Conference on Signals, Systems, and
Computers, Oct. 2008, Pacific Grove, CA | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the downlink of a MIMO-OFDM wireless systems where the
base-station (BS) has M antennas and serves K single-antenna user terminals
(UT) with K larger than or equal to M. Users estimate their channel vectors
from common downlink pilot symbols and feed back a prediction, which is used by
the BS to compute the linear beamforming matrix for the next time slot and to
select the users to be served according to the proportional fair scheduling
(PFS) algorithm. We consider a realistic physical channel model used as a
benchmark in standardization and some alternatives for the channel estimation
and prediction scheme. We show that a parametric method based on ESPRIT is able
to accurately predict the channel even for relatively high user mobility.
However, there exists a class of channels characterized by large Doppler spread
(high mobility) and clustered angular spread for which prediction is
intrinsically difficult and all considered methods fail. We propose a modified
PFS that take into account the "predictability" state of the UTs, and
significantly outperform the classical PFS in the presence of prediction
errors. The main conclusion of this work is that multiuser MIMO downlink yields
very good performance even in the presence of high mobility users, provided
that the nonpredictable users are handled appropriately
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2008 23:24:51 GMT"
}
]
| 2008-12-01T00:00:00 | [
[
"Shirani-Mehr",
"Hooman",
""
],
[
"Liu",
"Daniel N.",
""
],
[
"Caire",
"Giuseppe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4672 | Kui Wu | Emad Soroush, Kui Wu, Jian Pei | Fast and Quality-Guaranteed Data Streaming in Resource-Constrained
Sensor Networks | Published in ACM MobiHoc 2008 | null | null | null | cs.DS cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In many emerging applications, data streams are monitored in a network
environment. Due to limited communication bandwidth and other resource
constraints, a critical and practical demand is to online compress data streams
continuously with quality guarantee. Although many data compression and digital
signal processing methods have been developed to reduce data volume, their
super-linear time and more-than-constant space complexity prevents them from
being applied directly on data streams, particularly over resource-constrained
sensor networks. In this paper, we tackle the problem of online quality
guaranteed compression of data streams using fast linear approximation (i.e.,
using line segments to approximate a time series). Technically, we address two
versions of the problem which explore quality guarantees in different forms. We
develop online algorithms with linear time complexity and constant cost in
space. Our algorithms are optimal in the sense they generate the minimum number
of segments that approximate a time series with the required quality guarantee.
To meet the resource constraints in sensor networks, we also develop a fast
algorithm which creates connecting segments with very simple computation. The
low cost nature of our methods leads to a unique edge on the applications of
massive and fast streaming environment, low bandwidth networks, and heavily
constrained nodes in computational power. We implement and evaluate our methods
in the application of an acoustic wireless sensor network.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 20:59:55 GMT"
}
]
| 2008-12-01T00:00:00 | [
[
"Soroush",
"Emad",
""
],
[
"Wu",
"Kui",
""
],
[
"Pei",
"Jian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0811.4681 | Ga?tan Le Guelvouit | Ga\"etan Le Guelvouit, Teddy Furon, Fran\c{c}ois Cayre | The Good, the Bad, and the Ugly: three different approaches to break
their watermarking system | 8 pages, 8 figures | Proc. IS&T/SPIE Electronic Imaging, vol. 6505, San Jose, CA, Jan.
2007 | 10.1117/12.703968 | null | cs.GR cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Good is Blondie, a wandering gunman with a strong personal sense of
honor. The Bad is Angel Eyes, a sadistic hitman who always hits his mark. The
Ugly is Tuco, a Mexican bandit who's always only looking out for himself.
Against the backdrop of the BOWS contest, they search for a watermark in gold
buried in three images. Each knows only a portion of the gold's exact location,
so for the moment they're dependent on each other. However, none are
particularly inclined to share...
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 16:31:12 GMT"
}
]
| 2008-12-01T00:00:00 | [
[
"Guelvouit",
"Gaëtan Le",
""
],
[
"Furon",
"Teddy",
""
],
[
"Cayre",
"François",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0811.4697 | Ga\"etan Le Guelvouit | Sofiane Braci, Claude Delpha, R\'emy Boyer, Ga\"etan Le Guelvouit | Informed stego-systems in active warden context: statistical
undetectability and capacity | 6 pages, 8 figures | Proc. IEEE Conf. on Multimedia Signal Processing, Cairns,
Australia, Oct. 2008 | 10.1109/MMSP.2008.4665167 | null | cs.IT cs.MM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several authors have studied stego-systems based on Costa scheme, but just a
few ones gave both theoretical and experimental justifications of these schemes
performance in an active warden context. We provide in this paper a
steganographic and comparative study of three informed stego-systems in active
warden context: scalar Costa scheme, trellis-coded quantization and spread
transform scalar Costa scheme. By leading on analytical formulations and on
experimental evaluations, we show the advantages and limits of each scheme in
term of statistical undetectability and capacity in the case of active warden.
Such as the undetectability is given by the distance between the stego-signal
and the cover distance. It is measured by the Kullback-Leibler distance.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 12:04:51 GMT"
}
]
| 2008-12-01T00:00:00 | [
[
"Braci",
"Sofiane",
""
],
[
"Delpha",
"Claude",
""
],
[
"Boyer",
"Rémy",
""
],
[
"Guelvouit",
"Gaëtan Le",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4699 | Amelia Sparavigna | A. Sparavigna, R. Marazzato | Mapping Images with the Coherence Length Diagrams | null | International Journal of Software Engineering and Computing, pp.
53-57, 2009, Vol. 1 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Statistical pattern recognition methods based on the Coherence Length Diagram
(CLD) have been proposed for medical image analyses, such as quantitative
characterisation of human skin textures, and for polarized light microscopy of
liquid crystal textures. Further investigations are made on image maps
originated from such diagram and some examples related to irregularity of
microstructures are shown.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 12:11:21 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Mar 2009 09:49:07 GMT"
}
]
| 2010-05-11T00:00:00 | [
[
"Sparavigna",
"A.",
""
],
[
"Marazzato",
"R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0811.4700 | Ga\"etan Le Guelvouit | Ga\"etan Le Guelvouit | Trellis-coded quantization for public-key steganography | 4 pages, 5 figures | null | null | null | cs.MM cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with public-key steganography in the presence of a passive
warden. The aim is to hide secret messages within cover-documents without
making the warden suspicious, and without any preliminar secret key sharing.
Whereas a practical attempt has been already done to provide a solution to this
problem, it suffers of poor flexibility (since embedding and decoding steps
highly depend on cover-signals statistics) and of little capacity compared to
recent data hiding techniques. Using the same framework, this paper explores
the use of trellis-coded quantization techniques (TCQ and turbo TCQ) to design
a more efficient public-key scheme. Experiments on audio signals show great
improvements considering Cachin's security criterion.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 16:07:33 GMT"
}
]
| 2008-12-01T00:00:00 | [
[
"Guelvouit",
"Gaëtan Le",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4702 | Ga\"etan Le Guelvouit | St\'ephane Pateux, Ga\"etan Le Guelvouit, Christine Guillemot | Information-theoretic resolution of perceptual WSS watermarking of non
i.i.d. Gaussian signals | 4 pages, 3 figures | Proc. European Signal Processing Conf., Toulouse, France, Sep.
2002 | null | null | cs.IT cs.MM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The theoretical foundations of data hiding have been revealed by formulating
the problem as message communication over a noisy channel. We revisit the
problem in light of a more general characterization of the watermark channel
and of weighted distortion measures. Considering spread spectrum based
information hiding, we release the usual assumption of an i.i.d. cover signal.
The game-theoretic resolution of the problem reveals a generalized
characterization of optimum attacks. The paper then derives closed-form
expressions for the different parameters exhibiting a practical embedding and
extraction technique.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 12:41:23 GMT"
}
]
| 2008-12-01T00:00:00 | [
[
"Pateux",
"Stéphane",
""
],
[
"Guelvouit",
"Gaëtan Le",
""
],
[
"Guillemot",
"Christine",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4706 | Niall Hurley | Niall P. Hurley and Scott T. Rickard | Comparing Measures of Sparsity | submitted to IEEE Transactions on Information Theory (November 2008),
17 pages, 6 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sparsity of representations of signals has been shown to be a key concept of
fundamental importance in fields such as blind source separation, compression,
sampling and signal analysis. The aim of this paper is to compare several
commonlyused sparsity measures based on intuitive attributes. Intuitively, a
sparse representation is one in which a small number of coefficients contain a
large proportion of the energy. In this paper six properties are discussed:
(Robin Hood, Scaling, Rising Tide, Cloning, Bill Gates and Babies), each of
which a sparsity measure should have. The main contributions of this paper are
the proofs and the associated summary table which classify commonly-used
sparsity measures based on whether or not they satisfy these six propositions
and the corresponding proofs. Only one of these measures satisfies all six: The
Gini Index. measures based on whether or not they satisfy these six
propositions and the corresponding proofs. Only one of these measures satisfies
all six: The Gini Index.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 13:09:51 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Apr 2009 09:15:21 GMT"
}
]
| 2009-04-27T00:00:00 | [
[
"Hurley",
"Niall P.",
""
],
[
"Rickard",
"Scott T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4713 | Mamadou Moustapha Kant\'e | Bruno Courcelle (LaBRI, IUF), Cyril Gavoille (LaBRI, INRIA Futurs),
Mamadou Moustapha Kant\'e (LaBRI) | Compact Labelings For Efficient First-Order Model-Checking | null | Journal of Combinatorial Optimisation 21(1):19-46(2011) | 10.1007/s10878-009-9260-7 | null | cs.DS cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider graph properties that can be checked from labels, i.e., bit
sequences, of logarithmic length attached to vertices. We prove that there
exists such a labeling for checking a first-order formula with free set
variables in the graphs of every class that is \emph{nicely locally
cwd-decomposable}. This notion generalizes that of a \emph{nicely locally
tree-decomposable} class. The graphs of such classes can be covered by graphs
of bounded \emph{clique-width} with limited overlaps. We also consider such
labelings for \emph{bounded} first-order formulas on graph classes of
\emph{bounded expansion}. Some of these results are extended to counting
queries.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 13:29:15 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Jul 2014 11:29:27 GMT"
}
]
| 2014-07-09T00:00:00 | [
[
"Courcelle",
"Bruno",
"",
"LaBRI, IUF"
],
[
"Gavoille",
"Cyril",
"",
"LaBRI, INRIA Futurs"
],
[
"Kanté",
"Mamadou Moustapha",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0811.4717 | Daniel Racoceanu | Roxana Teodorescu (UPT, LAB), Daniel Racoceanu (LAB, IPAAL), Wee-Kheng
Leow (IPAAL, NUS), Vladimir Cretu (UPT) | Prospective Study for Semantic Inter-Media Fusion in Content-Based
Medical Image Retrieval | 11 pages | null | null | Onco-media Teodorescu 2008 | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One important challenge in modern Content-Based Medical Image Retrieval
(CBMIR) approaches is represented by the semantic gap, related to the
complexity of the medical knowledge. Among the methods that are able to close
this gap in CBMIR, the use of medical thesauri/ontologies has interesting
perspectives due to the possibility of accessing on-line updated relevant
webservices and to extract real-time medical semantic structured information.
The CBMIR approach proposed in this paper uses the Unified Medical Language
System's (UMLS) Metathesaurus to perform a semantic indexing and fusion of
medical media. This fusion operates before the query processing (retrieval) and
works at an UMLS-compliant conceptual indexing level. Our purpose is to study
various techniques related to semantic data alignment, preprocessing, fusion,
clustering and retrieval, by evaluating the various techniques and highlighting
future research directions. The alignment and the preprocessing are based on
partial text/image retrieval feedback and on the data structure. We analyze
various probabilistic, fuzzy and evidence-based approaches for the fusion
process and different similarity functions for the retrieval process. All the
proposed methods are evaluated on the Cross Language Evaluation Forum's (CLEF)
medical image retrieval benchmark, by focusing also on a more homogeneous
component medical image database: the Pathology Education Instructional
Resource (PEIR).
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 13:30:23 GMT"
}
]
| 2008-12-01T00:00:00 | [
[
"Teodorescu",
"Roxana",
"",
"UPT, LAB"
],
[
"Racoceanu",
"Daniel",
"",
"LAB, IPAAL"
],
[
"Leow",
"Wee-Kheng",
"",
"IPAAL, NUS"
],
[
"Cretu",
"Vladimir",
"",
"UPT"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0811.4718 | Carl Bracken | Carl Bracken, Zhengbang Zha | On the Fourier Spectra of the Infinite Families of Quadratic APN
Functions | 12 pages, submitted to Adavances in the Mathematics of communication | null | null | null | cs.IT cs.CR cs.DM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well known that a quadratic function defined on a finite field of odd
degree is almost bent (AB) if and only if it is almost perfect nonlinear (APN).
For the even degree case there is no apparent relationship between the values
in the Fourier spectrum of a function and the APN property. In this article we
compute the Fourier spectrum of the new quadranomial family of APN functions.
With this result, all known infinite families of APN functions now have their
Fourier spectra and hence their nonlinearities computed.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 13:51:21 GMT"
}
]
| 2008-12-01T00:00:00 | [
[
"Bracken",
"Carl",
""
],
[
"Zha",
"Zhengbang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0811.4720 | Florent Jacquemard | Adel Bouhoula and Florent Jacquemard | Automated Induction for Complex Data Structures | This is the long version of a paper which appeared in IJCAR 2008. 38
pages | null | null | null | cs.LO cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a procedure for automated implicit inductive theorem proving for
equational specifications made of rewrite rules with conditions and
constraints. The constraints are interpreted over constructor terms
(representing data values), and may express syntactic equality, disequality,
ordering and also membership in a fixed tree language. Constrained equational
axioms between constructor terms are supported and can be used in order to
specify complex data structures like sets, sorted lists, trees, powerlists...
Our procedure is based on tree grammars with constraints, a formalism which
can describe exactly the initial model of the given specification (when it is
sufficiently complete and terminating). They are used in the inductive proofs
first as an induction scheme for the generation of subgoals at induction steps,
second for checking validity and redundancy criteria by reduction to an
emptiness problem, and third for defining and solving membership constraints.
We show that the procedure is sound and refutationally complete. It
generalizes former test set induction techniques and yields natural proofs for
several non-trivial examples presented in the paper, these examples are
difficult to specify and carry on automatically with related induction
procedures.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 13:58:46 GMT"
}
]
| 2008-12-01T00:00:00 | [
[
"Bouhoula",
"Adel",
""
],
[
"Jacquemard",
"Florent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0811.4733 | Damien Chablat | Daniel Kanaan (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat
(IRCCyN) | Kinematic Analysis of a Serial - Parallel Machine Tool: the VERNE
machine | null | Mechanism and Machine Theory 44, 2 (2009) 487-498 | 10.1016/j.mechmachtheory.2008.03.002 | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper derives the inverse and the forward kinematic equations of a serial
- parallel 5-axis machine tool: the VERNE machine. This machine is composed of
a three-degree-of-freedom (DOF) parallel module and a two-DOF serial tilting
table. The parallel module consists of a moving platform that is connected to a
fixed base by three non-identical legs. These legs are connected in a way that
the combined effects of the three legs lead to an over-constrained mechanism
with complex motion. This motion is defined as a simultaneous combination of
rotation and translation. In this paper we propose symbolical methods that able
to calculate all kinematic solutions and identify the acceptable one by adding
analytical constraint on the disposition of legs of the parallel module.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 15:32:24 GMT"
}
]
| 2008-12-01T00:00:00 | [
[
"Kanaan",
"Daniel",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0811.4773 | Haim Permuter Henry | Haim Permuter, Yossi Steinberg and Tsachy Weissman | Two-way source coding with a helper | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider the two-way rate-distortion problem in which a helper sends a common
limited-rate message to both users based on side information at its disposal.
We characterize the region of achievable rates and distortions where a Markov
form (Helper)-(User 1)-(User 2) holds. The main insight of the result is that
in order to achieve the optimal rate, the helper may use a binning scheme, as
in Wyner-Ziv, where the side information at the decoder is the "further" user,
namely, User 2. We derive these regions explicitly for the Gaussian sources
with square error distortion, analyze a trade-off between the rate from the
helper and the rate from the source, and examine a special case where the
helper has the freedom to send different messages, at different rates, to the
encoder and the decoder.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2008 20:01:31 GMT"
},
{
"version": "v2",
"created": "Sun, 5 Apr 2009 17:11:16 GMT"
}
]
| 2009-04-06T00:00:00 | [
[
"Permuter",
"Haim",
""
],
[
"Steinberg",
"Yossi",
""
],
[
"Weissman",
"Tsachy",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.