id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0812.0038 | Liang-Liang Xie | Liang-Liang Xie | Omnidirectional Relay in Wireless Networks | Revised | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For wireless networks with multiple sources, an omnidirectional relay scheme
is developed, where each node can simultaneously relay different messages in
different directions. This is accomplished by the decode-and-forward relay
strategy, with each relay binning the multiple messages to be transmitted, in
the same spirit of network coding. Specially for the all-source all-cast
problem, where each node is an independent source to be transmitted to all the
other nodes, this scheme completely eliminates interference in the whole
network, and the signal transmitted by any node can be used by any other node.
For networks with some kind of symmetry, assuming no beamforming is to be
performed, this omnidirectional relay scheme is capable of achieving the
maximum achievable rate.
| [
{
"version": "v1",
"created": "Sat, 29 Nov 2008 01:04:30 GMT"
},
{
"version": "v2",
"created": "Sun, 14 Nov 2010 21:53:09 GMT"
}
]
| 2010-11-16T00:00:00 | [
[
"Xie",
"Liang-Liang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.0067 | Bernard Mourrain | Bernard Mourrain (INRIA Sophia Antipolis), Philippe Tr\'ebuchet (LIP6) | Stable normal forms for polynomial system solving | null | Theoretical Computer Science 409, 2 (2008) 229-240 | 10.1016/j.tcs.2008.09.004 | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes and analyzes a method for computing border bases of a
zero-dimensional ideal $I$. The criterion used in the computation involves
specific commutation polynomials and leads to an algorithm and an
implementation extending the one provided in [MT'05]. This general border basis
algorithm weakens the monomial ordering requirement for \grob bases
computations. It is up to date the most general setting for representing
quotient algebras, embedding into a single formalism Gr\"obner bases, Macaulay
bases and new representation that do not fit into the previous categories. With
this formalism we show how the syzygies of the border basis are generated by
commutation relations. We also show that our construction of normal form is
stable under small perturbations of the ideal, if the number of solutions
remains constant. This new feature for a symbolic algorithm has a huge impact
on the practical efficiency as it is illustrated by the experiments on
classical benchmark polynomial systems, at the end of the paper.
| [
{
"version": "v1",
"created": "Sat, 29 Nov 2008 11:26:50 GMT"
}
]
| 2008-12-02T00:00:00 | [
[
"Mourrain",
"Bernard",
"",
"INRIA Sophia Antipolis"
],
[
"Trébuchet",
"Philippe",
"",
"LIP6"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0812.0070 | L.T. Handoko | I. Firmansyah, Z. Akbar, B. Hermanto and L.T. Handoko | An Integrated Software-based Solution for Modular and Self-independent
Networked Robot | 9 pages, Proceeding of the 10th International Conference on Control,
Automation, Robotics and Vision | null | 10.1109/ICARCV.2008.4795695 | FISIKALIPI-08078 | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An integrated software-based solution for a modular and self-independent
networked robot is introduced. The wirelessly operatable robot has been
developed mainly for autonomous monitoring works with full control over web.
The integrated software solution covers three components : a) the digital
signal processing unit for data retrieval and monitoring system; b) the
externally executable codes for control system; and c) the web programming for
interfacing the end-users with the robot. It is argued that this integrated
software-based approach is crucial to realize a flexible, modular and low
development cost mobile monitoring apparatus.
| [
{
"version": "v1",
"created": "Sat, 29 Nov 2008 12:52:54 GMT"
}
]
| 2009-03-06T00:00:00 | [
[
"Firmansyah",
"I.",
""
],
[
"Akbar",
"Z.",
""
],
[
"Hermanto",
"B.",
""
],
[
"Handoko",
"L. T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0812.0088 | Bernard Mourrain | Itnuit Janovitz-Freireich, Agnes Szanto, Bernard Mourrain (INRIA
Sophia Antipolis), Lajos Ronyai | Moment matrices, trace matrices and the radical of ideals | null | nternational Conference on Symbolic and Algebraic Computation
(2008) 125-132 | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $f_1,...,f_s \in \mathbb{K}[x_1,...,x_m]$ be a system of polynomials
generating a zero-dimensional ideal $\I$, where $\mathbb{K}$ is an arbitrary
algebraically closed field. Assume that the factor algebra
$\A=\mathbb{K}[x_1,...,x_m]/\I$ is Gorenstein and that we have a bound
$\delta>0$ such that a basis for $\A$ can be computed from multiples of
$f_1,...,f_s$ of degrees at most $\delta$. We propose a method using Sylvester
or Macaulay type resultant matrices of $f_1,...,f_s$ and $J$, where $J$ is a
polynomial of degree $\delta$ generalizing the Jacobian, to compute moment
matrices, and in particular matrices of traces for $\A$. These matrices of
traces in turn allow us to compute a system of multiplication matrices
$\{M_{x_i}|i=1,...,m\}$ of the radical $\sqrt{\I}$, following the approach in
the previous work by Janovitz-Freireich, R\'{o}nyai and Sz\'ant\'o.
Additionally, we give bounds for $\delta$ for the case when $\I$ has finitely
many projective roots in $\mathbb{P}^m_\CC$.
| [
{
"version": "v1",
"created": "Sat, 29 Nov 2008 16:14:07 GMT"
}
]
| 2009-01-23T00:00:00 | [
[
"Janovitz-Freireich",
"Itnuit",
"",
"INRIA\n Sophia Antipolis"
],
[
"Szanto",
"Agnes",
"",
"INRIA\n Sophia Antipolis"
],
[
"Mourrain",
"Bernard",
"",
"INRIA\n Sophia Antipolis"
],
[
"Ronyai",
"Lajos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0812.0146 | Vladimir Pestov | Vladimir Pestov | Lower Bounds on Performance of Metric Tree Indexing Schemes for Exact
Similarity Search in High Dimensions | 21 pages, revised submission to Algorithmica, an improved and
extended journal version of the conference paper arXiv:0812.0146v3 [cs.DS],
with lower bounds strengthened, and the proof of the main Theorem 4
simplified | Algorithmica 66 (2013), 310-328 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Within a mathematically rigorous model, we analyse the curse of
dimensionality for deterministic exact similarity search in the context of
popular indexing schemes: metric trees. The datasets $X$ are sampled randomly
from a domain $\Omega$, equipped with a distance, $\rho$, and an underlying
probability distribution, $\mu$. While performing an asymptotic analysis, we
send the intrinsic dimension $d$ of $\Omega$ to infinity, and assume that the
size of a dataset, $n$, grows superpolynomially yet subexponentially in $d$.
Exact similarity search refers to finding the nearest neighbour in the dataset
$X$ to a query point $\omega\in\Omega$, where the query points are subject to
the same probability distribution $\mu$ as datapoints. Let $\mathscr F$ denote
a class of all 1-Lipschitz functions on $\Omega$ that can be used as decision
functions in constructing a hierarchical metric tree indexing scheme. Suppose
the VC dimension of the class of all sets $\{\omega\colon f(\omega)\geq a\}$,
$a\in\R$ is $o(n^{1/4}/\log^2n)$. (In view of a 1995 result of Goldberg and
Jerrum, even a stronger complexity assumption $d^{O(1)}$ is reasonable.) We
deduce the $\Omega(n^{1/4})$ lower bound on the expected average case
performance of hierarchical metric-tree based indexing schemes for exact
similarity search in $(\Omega,X)$. In paricular, this bound is superpolynomial
in $d$.
| [
{
"version": "v1",
"created": "Sun, 30 Nov 2008 15:17:22 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Aug 2010 03:42:50 GMT"
},
{
"version": "v3",
"created": "Tue, 10 May 2011 16:17:39 GMT"
},
{
"version": "v4",
"created": "Fri, 24 Feb 2012 18:38:50 GMT"
}
]
| 2013-03-27T00:00:00 | [
[
"Pestov",
"Vladimir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.0192 | Mohamed Hamdy Morsy Osman | Mohamed H. S. Morsy, Mohammad Y. S. Sowailem and Hossam M. H. Shalaby | A Simple Performance Analysis of a Core Node in an Optical Burst
Switched Network | This paper has been withdrawn | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 00:55:14 GMT"
},
{
"version": "v2",
"created": "Sun, 6 Dec 2009 01:14:22 GMT"
}
]
| 2009-12-07T00:00:00 | [
[
"Morsy",
"Mohamed H. S.",
""
],
[
"Sowailem",
"Mohammad Y. S.",
""
],
[
"Shalaby",
"Hossam M. H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0812.0193 | Mohamed Hamdy Morsy Osman | Mohamed Y. S. Sowailem, Mohamed H. S. Morsy and Hossam M. H. Shalaby | Contention Resolution in Optical Burst Switched Networks using Spectral-
Amplitude-Coding Optical Code Division Multiple Access | This paper has been withdrawn by the authors | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn by the authors.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 01:02:14 GMT"
},
{
"version": "v2",
"created": "Sun, 6 Dec 2009 01:32:43 GMT"
}
]
| 2009-12-07T00:00:00 | [
[
"Sowailem",
"Mohamed Y. S.",
""
],
[
"Morsy",
"Mohamed H. S.",
""
],
[
"Shalaby",
"Hossam M. H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.0197 | Vin de Silva | Gunnar Carlsson, Vin de Silva | Zigzag Persistence | 32 pages, 7 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a new methodology for studying persistence of topological
features across a family of spaces or point-cloud data sets, called zigzag
persistence. Building on classical results about quiver representations, zigzag
persistence generalises the highly successful theory of persistent homology and
addresses several situations which are not covered by that theory. In this
paper we develop theoretical and algorithmic foundations with a view towards
applications in topological statistics.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 02:08:08 GMT"
}
]
| 2008-12-02T00:00:00 | [
[
"Carlsson",
"Gunnar",
""
],
[
"de Silva",
"Vin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0812.0198 | Andrea Montanari | Andrea Montanari and Amin Saberi | Convergence to Equilibrium in Local Interaction Games and Ising Models | 17 pages, 2 eps figures | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Coordination games describe social or economic interactions in which the
adoption of a common strategy has a higher payoff. They are classically used to
model the spread of conventions, behaviors, and technologies in societies. Here
we consider a two-strategies coordination game played asynchronously between
the nodes of a network. Agents behave according to a noisy best-response
dynamics.
It is known that noise removes the degeneracy among equilibria: In the long
run, the ``risk-dominant'' behavior spreads throughout the network. Here we
consider the problem of computing the typical time scale for the spread of this
behavior. In particular, we study its dependence on the network structure and
derive a dichotomy between highly-connected, non-local graphs that show slow
convergence, and poorly connected, low dimensional graphs that show fast
convergence.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 02:16:04 GMT"
}
]
| 2008-12-02T00:00:00 | [
[
"Montanari",
"Andrea",
""
],
[
"Saberi",
"Amin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.0209 | Qin Zhang | Ke Yi, Qin Zhang | Optimal Tracking of Distributed Heavy Hitters and Quantiles | 10 pages, 1 figure | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the the problem of tracking heavy hitters and quantiles in the
distributed streaming model. The heavy hitters and quantiles are two important
statistics for characterizing a data distribution. Let $A$ be a multiset of
elements, drawn from the universe $U=\{1,...,u\}$. For a given $0 \le \phi \le
1$, the $\phi$-heavy hitters are those elements of $A$ whose frequency in $A$
is at least $\phi |A|$; the $\phi$-quantile of $A$ is an element $x$ of $U$
such that at most $\phi|A|$ elements of $A$ are smaller than $A$ and at most
$(1-\phi)|A|$ elements of $A$ are greater than $x$. Suppose the elements of $A$
are received at $k$ remote {\em sites} over time, and each of the sites has a
two-way communication channel to a designated {\em coordinator}, whose goal is
to track the set of $\phi$-heavy hitters and the $\phi$-quantile of $A$
approximately at all times with minimum communication. We give tracking
algorithms with worst-case communication cost $O(k/\eps \cdot \log n)$ for both
problems, where $n$ is the total number of items in $A$, and $\eps$ is the
approximation error. This substantially improves upon the previous known
algorithms. We also give matching lower bounds on the communication costs for
both problems, showing that our algorithms are optimal. We also consider a more
general version of the problem where we simultaneously track the
$\phi$-quantiles for all $0 \le \phi \le 1$.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 03:51:12 GMT"
}
]
| 2008-12-02T00:00:00 | [
[
"Yi",
"Ke",
""
],
[
"Zhang",
"Qin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.0262 | Philipp Mayr | Philipp Mayr | An evaluation of Bradfordizing effects | 8 pages, 9th COLLNET Meeting | null | null | null | cs.DL | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The purpose of this paper is to apply and evaluate the bibliometric method
Bradfordizing for information retrieval (IR) experiments. Bradfordizing is used
for generating core document sets for subject-specific questions and to reorder
result sets from distributed searches. The method will be applied and tested in
a controlled scenario of scientific literature databases from social and
political sciences, economics, psychology and medical science (SOLIS, SoLit,
USB Koeln Opac, CSA Sociological Abstracts, World Affairs Online, Psyndex and
Medline) and 164 standardized topics. An evaluation of the method and its
effects is carried out in two laboratory-based information retrieval
experiments (CLEF and KoMoHe) using a controlled document corpus and human
relevance assessments. The results show that Bradfordizing is a very robust
method for re-ranking the main document types (journal articles and monographs)
in today's digital libraries (DL). The IR tests show that relevance
distributions after re-ranking improve at a significant level if articles in
the core are compared with articles in the succeeding zones. The items in the
core are significantly more often assessed as relevant, than items in zone 2
(z2) or zone 3 (z3). The improvements between the zones are statistically
significant based on the Wilcoxon signed-rank test and the paired T-Test.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 10:44:25 GMT"
}
]
| 2008-12-02T00:00:00 | [
[
"Mayr",
"Philipp",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0812.0283 | Sven Kosub | Christopher M. Homan and Sven Kosub | Dichotomy Results for Fixed Point Counting in Boolean Dynamical Systems | 16 pages, extended abstract presented at 10th Italian Conference on
Theoretical Computer Science (ICTCS'2007) | null | null | revised version of TR No. TUM-I0706, Institut fuer Informatik, TU
Muenchen | cs.CC cond-mat.dis-nn cs.DM nlin.AO nlin.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present dichotomy theorems regarding the computational complexity of
counting fixed points in boolean (discrete) dynamical systems, i.e., finite
discrete dynamical systems over the domain {0,1}. For a class F of boolean
functions and a class G of graphs, an (F,G)-system is a boolean dynamical
system with local transitions functions lying in F and graphs in G. We show
that, if local transition functions are given by lookup tables, then the
following complexity classification holds: Let F be a class of boolean
functions closed under superposition and let G be a graph class closed under
taking minors. If F contains all min-functions, all max-functions, or all
self-dual and monotone functions, and G contains all planar graphs, then it is
#P-complete to compute the number of fixed points in an (F,G)-system; otherwise
it is computable in polynomial time. We also prove a dichotomy theorem for the
case that local transition functions are given by formulas (over logical
bases). This theorem has a significantly more complicated structure than the
theorem for lookup tables. A corresponding theorem for boolean circuits
coincides with the theorem for formulas.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 12:56:42 GMT"
}
]
| 2008-12-02T00:00:00 | [
[
"Homan",
"Christopher M.",
""
],
[
"Kosub",
"Sven",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
}
]
|
0812.0319 | Ersen Ekrem | Ersen Ekrem and Sennur Ulukus | Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper | Submitted to EURASIP Journal on Wireless Communications and
Networking (Special Issue on Wireless Physical Layer Security) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the security of communication between a single transmitter and
multiple receivers in a broadcast channel in the presence of an eavesdropper.
We consider several special classes of channels. As the first model, we
consider the degraded multi-receiver wiretap channel where the legitimate
receivers exhibit a degradedness order while the eavesdropper is more noisy
with respect to all legitimate receivers. We establish the secrecy capacity
region of this channel model. Secondly, we consider the parallel multi-receiver
wiretap channel with a less noisiness order in each sub-channel, where this
order is not necessarily the same for all sub-channels. We establish the common
message secrecy capacity and sum secrecy capacity of this channel. Thirdly, we
study a special class of degraded parallel multi-receiver wiretap channels and
provide a stronger result. In particular, we study the case with two
sub-channels two users and one eavesdropper, where there is a degradedness
order in each sub-channel such that in the first (resp. second) sub-channel the
second (resp. first) receiver is degraded with respect to the first (resp.
second) receiver, while the eavesdropper is degraded with respect to both
legitimate receivers in both sub-channels. We determine the secrecy capacity
region of this channel. Finally, we focus on a variant of this previous channel
model where the transmitter can use only one of the sub-channels at any time.
We characterize the secrecy capacity region of this channel as well.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 16:11:22 GMT"
}
]
| 2008-12-02T00:00:00 | [
[
"Ekrem",
"Ersen",
""
],
[
"Ulukus",
"Sennur",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.0320 | Gwena\"el Joret | Gwena\"el Joret | Stackelberg Network Pricing is Hard to Approximate | null | Networks, vol. 57, no. 2, pp. 117--120, 2011 | 10.1002/net.20391 | null | cs.DS cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the Stackelberg Network Pricing problem, one has to assign tariffs to a
certain subset of the arcs of a given transportation network. The aim is to
maximize the amount paid by the user of the network, knowing that the user will
take a shortest st-path once the tariffs are fixed. Roch, Savard, and Marcotte
(Networks, Vol. 46(1), 57-67, 2005) proved that this problem is NP-hard, and
gave an O(log m)-approximation algorithm, where m denote the number of arcs to
be priced. In this note, we show that the problem is also APX-hard.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 16:15:58 GMT"
}
]
| 2011-03-07T00:00:00 | [
[
"Joret",
"Gwenaël",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.0329 | Yonina C. Eldar | Yonina C. Eldar and Helmut Bolcskei | Block-Sparsity: Coherence and Efficient Recovery | Submitted to ICASSP 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider compressed sensing of block-sparse signals, i.e., sparse signals
that have nonzero coefficients occuring in clusters. Based on an uncertainty
relation for block-sparse signals, we define a block-coherence measure and we
show that a block-version of the orthogonal matching pursuit algorithm recovers
block k-sparse signals in no more than k steps if the block-coherence is
sufficiently small. The same condition on block-sparsity is shown to guarantee
successful recovery through a mixed l2/l1 optimization approach. The
significance of the results lies in the fact that making explicit use of
block-sparsity can yield better reconstruction properties than treating the
signal as being sparse in the conventional sense thereby ignoring the
additional structure in the problem.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 16:53:19 GMT"
}
]
| 2008-12-02T00:00:00 | [
[
"Eldar",
"Yonina C.",
""
],
[
"Bolcskei",
"Helmut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.0340 | Simon Morgan | Simon P. Morgan, Wotao Yin, Kevin R. Vixie | A Matlab Implementation of a Flat Norm Motivated Polygonal Edge Matching
Method using a Decomposition of Boundary into Four 1-Dimensional Currents | Contains Matlab code and 4 figures | null | null | null | cs.CV cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe and provide code and examples for a polygonal edge matching
method.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 18:59:52 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Oct 2009 18:44:03 GMT"
}
]
| 2013-08-12T00:00:00 | [
[
"Morgan",
"Simon P.",
""
],
[
"Yin",
"Wotao",
""
],
[
"Vixie",
"Kevin R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0812.0372 | Nikolay Gravin | Nikolay Gravin | Non-degenerate colorings in the Brook's Theorem | 18 pages, 10 figures | Diskretnaya Matematika, 2009 N4 pp. 105-128 | 10.1515/DMA.2009.036 | MR2641023 | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $c\geq 2$ and $p\geq c$ be two integers. We will call a proper coloring
of the graph $G$ a \textit{$(c,p)$-nondegenerate}, if for any vertex of $G$
with degree at least $p$ there are at least $c$ vertices of different colors
adjacent to it. In our work we prove the following result, which generalizes
Brook's Theorem. Let $D\geq 3$ and $G$ be a graph without cliques on $D+1$
vertices and the degree of any vertex in this graph is not greater than $D$.
Then for every integer $c\geq 2$ there is a proper $(c,p)$-nondegenerate vertex
$D$-coloring of $G$, where $p=(c^3+8c^2+19c+6)(c+1).$ During the primary proof,
some interesting corollaries are derived.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 21:10:46 GMT"
}
]
| 2012-06-20T00:00:00 | [
[
"Gravin",
"Nikolay",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.0382 | Andrea Vattani | Andrea Vattani | k-means requires exponentially many iterations even in the plane | Submitted to SoCG 2009 | null | null | null | cs.CG cs.DS cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The k-means algorithm is a well-known method for partitioning n points that
lie in the d-dimensional space into k clusters. Its main features are
simplicity and speed in practice. Theoretically, however, the best known upper
bound on its running time (i.e. O(n^{kd})) can be exponential in the number of
points. Recently, Arthur and Vassilvitskii [3] showed a super-polynomial
worst-case analysis, improving the best known lower bound from \Omega(n) to
2^{\Omega(\sqrt{n})} with a construction in d=\Omega(\sqrt{n}) dimensions. In
[3] they also conjectured the existence of superpolynomial lower bounds for any
d >= 2.
Our contribution is twofold: we prove this conjecture and we improve the
lower bound, by presenting a simple construction in the plane that leads to the
exponential lower bound 2^{\Omega(n)}.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 22:55:39 GMT"
}
]
| 2008-12-03T00:00:00 | [
[
"Vattani",
"Andrea",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.0387 | Kevin Buchin | Kevin Buchin | Delaunay Triangulations in Linear Time? (Part I) | 8 pages, no figures; added footnote about newer algorithm | null | null | null | cs.CG cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new and simple randomized algorithm for constructing the
Delaunay triangulation using nearest neighbor graphs for point location. Under
suitable assumptions, it runs in linear expected time for points in the plane
with polynomially bounded spread, i.e., if the ratio between the largest and
smallest pointwise distance is polynomially bounded. This also holds for point
sets with bounded spread in higher dimensions as long as the expected
complexity of the Delaunay triangulation of a sample of the points is linear in
the sample size.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 23:09:13 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Feb 2009 08:58:17 GMT"
},
{
"version": "v3",
"created": "Sun, 13 Dec 2009 21:54:48 GMT"
}
]
| 2009-12-13T00:00:00 | [
[
"Buchin",
"Kevin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.0389 | Stefanie Jegelka | Stefanie Jegelka, Suvrit Sra, Arindam Banerjee | Approximation Algorithms for Bregman Co-clustering and Tensor Clustering | 18 pages; improved metric case | short version in ALT 2009 | null | null | cs.DS cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the past few years powerful generalizations to the Euclidean k-means
problem have been made, such as Bregman clustering [7], co-clustering (i.e.,
simultaneous clustering of rows and columns of an input matrix) [9,18], and
tensor clustering [8,34]. Like k-means, these more general problems also suffer
from the NP-hardness of the associated optimization. Researchers have developed
approximation algorithms of varying degrees of sophistication for k-means,
k-medians, and more recently also for Bregman clustering [2]. However, there
seem to be no approximation algorithms for Bregman co- and tensor clustering.
In this paper we derive the first (to our knowledge) guaranteed methods for
these increasingly important clustering settings. Going beyond Bregman
divergences, we also prove an approximation factor for tensor clustering with
arbitrary separable metrics. Through extensive experiments we evaluate the
characteristics of our method, and show that it also has practical impact.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2008 23:17:35 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Feb 2009 12:40:18 GMT"
},
{
"version": "v3",
"created": "Fri, 15 May 2009 22:23:02 GMT"
},
{
"version": "v4",
"created": "Mon, 9 Nov 2009 15:50:32 GMT"
}
]
| 2009-11-09T00:00:00 | [
[
"Jegelka",
"Stefanie",
""
],
[
"Sra",
"Suvrit",
""
],
[
"Banerjee",
"Arindam",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.0438 | Sabu Thampi m | Sabu M. Thampi | An Introduction to Knowledge Management | null | null | null | null | cs.DB cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowledge has been lately recognized as one of the most important assets of
organizations. Managing knowledge has grown to be imperative for the success of
a company. This paper presents an overview of Knowledge Management and various
aspects of secure knowledge management. A case study of knowledge management
activities at Tata Steel is also discussed
| [
{
"version": "v1",
"created": "Tue, 2 Dec 2008 09:00:27 GMT"
}
]
| 2008-12-03T00:00:00 | [
[
"Thampi",
"Sabu M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0812.0486 | Peter Bro Miltersen | Vladimir Gurvich and Peter Bro Miltersen | On the computational complexity of solving stochastic mean-payoff games | s | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider some well-known families of two-player, zero-sum, perfect
information games that can be viewed as special cases of Shapley's stochastic
games. We show that the following tasks are polynomial time equivalent:
- Solving simple stochastic games.
- Solving stochastic mean-payoff games with rewards and probabilities given
in unary. - Solving stochastic mean-payoff games with rewards and probabilities
given in binary.
| [
{
"version": "v1",
"created": "Tue, 2 Dec 2008 12:28:58 GMT"
}
]
| 2008-12-03T00:00:00 | [
[
"Gurvich",
"Vladimir",
""
],
[
"Miltersen",
"Peter Bro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.0492 | Peter Bro Miltersen | Peter Bro Miltersen | Trembling hand perfection is NP-hard | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is NP-hard to decide if a given pure-strategy Nash equilibrium of a given
three-player game in strategic form with integer payoffs is trembling hand
perfect.
| [
{
"version": "v1",
"created": "Tue, 2 Dec 2008 12:42:06 GMT"
}
]
| 2008-12-03T00:00:00 | [
[
"Miltersen",
"Peter Bro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.0515 | Cuilian Li | Cuilian Li (1 and 2), Zhen Yang (1), Feng Tian (1) ((1) Nanjing
University of Posts & Telecommunications, (2) Zhejiang Wanli University) | A Relaying Incentive Scheme in Multihop Cellular Networks Based on
Coalitional Game with Externalities | 21 pages,9 figures, 11 tables. Submitted to Wireless Personal
Communications | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cooperative multihop communication can greatly increase network throughput,
yet packet forwarding for other nodes involves opportunity and energy cost for
relays. Thus one of the pre-requisite problems in the successful implementation
of multihop transmission is how to foster cooperation among selfish nodes.
Existing researches mainly adopt monetary stimulating. In this manuscript, we
propose instead a simple and self-enforcing forwarding incentive scheme free of
indirect monetary remunerating for asymmetric (uplink multihop, downlink
single-hop) cellar network based on coalitional game theory, which comprises
double compensation, namely, Inter- BEA, global stimulating policy allotting
resources among relaying coalitions according to group size, and Intra-BEA,
local compensating and allocating rule within coalitions. Firstly, given the
global allotting policy, we introduce a fair allocation estimating approach
which includes remunerating for relaying cost using Myerson value for partition
function game, to enlighten the design of local allocating rules. Secondly,
given the inter- and intra-BEA relay fostering approach, we check stability of
coalition structures in terms of internal and external stability as well as
inductive core. Theoretic analysis and numerical simulation show that our
measure can provide communication opportunities for outer ring nodes and
enlarge system coverage, while at the same time provide enough motivation with
respect to resource allocation and energy saving for nodes in inner and middle
ring to relay for own profits.
| [
{
"version": "v1",
"created": "Tue, 2 Dec 2008 14:28:35 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Dec 2008 01:16:59 GMT"
}
]
| 2008-12-03T00:00:00 | [
[
"Li",
"Cuilian",
"",
"1 and 2"
],
[
"Yang",
"Zhen",
""
],
[
"Tian",
"Feng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.0564 | James Cheney | James Cheney, Umut Acar, Amal Ahmed | Provenance Traces | Technical report | null | null | null | cs.PL cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Provenance is information about the origin, derivation, ownership, or history
of an object. It has recently been studied extensively in scientific databases
and other settings due to its importance in helping scientists judge data
validity, quality and integrity. However, most models of provenance have been
stated as ad hoc definitions motivated by informal concepts such as "comes
from", "influences", "produces", or "depends on". These models lack clear
formalizations describing in what sense the definitions capture these intuitive
concepts. This makes it difficult to compare approaches, evaluate their
effectiveness, or argue about their validity.
We introduce provenance traces, a general form of provenance for the nested
relational calculus (NRC), a core database query language. Provenance traces
can be thought of as concrete data structures representing the operational
semantics derivation of a computation; they are related to the traces that have
been used in self-adjusting computation, but differ in important respects. We
define a tracing operational semantics for NRC queries that produces both an
ordinary result and a trace of the execution. We show that three pre-existing
forms of provenance for the NRC can be extracted from provenance traces.
Moreover, traces satisfy two semantic guarantees: consistency, meaning that the
traces describe what actually happened during execution, and fidelity, meaning
that the traces "explain" how the expression would behave if the input were
changed. These guarantees are much stronger than those contemplated for
previous approaches to provenance; thus, provenance traces provide a general
semantic foundation for comparing and unifying models of provenance in
databases.
| [
{
"version": "v1",
"created": "Tue, 2 Dec 2008 18:17:23 GMT"
}
]
| 2008-12-03T00:00:00 | [
[
"Cheney",
"James",
""
],
[
"Acar",
"Umut",
""
],
[
"Ahmed",
"Amal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0812.0581 | Arnaud Legout | Stevens Le Blond (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes),
Arnaud Legout (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Walid Dabbous
(INRIA Sophia Antipolis / INRIA Rh\^one-Alpes) | Pushing BitTorrent Locality to the Limit | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Peer-to-peer (P2P) locality has recently raised a lot of interest in the
community. Indeed, whereas P2P content distribution enables financial savings
for the content providers, it dramatically increases the traffic on inter-ISP
links. To solve this issue, the idea to keep a fraction of the P2P traffic
local to each ISP was introduced a few years ago. Since then, P2P solutions
exploiting locality have been introduced. However, several fundamental issues
on locality still need to be explored. In particular, how far can we push
locality, and what is, at the scale of the Internet, the reduction of traffic
that can be achieved with locality? In this paper, we perform extensive
experiments on a controlled environment with up to 10 000 BitTorrent clients to
evaluate the impact of high locality on inter-ISP links traffic and peers
download completion time. We introduce two simple mechanisms that make high
locality possible in challenging scenarios and we show that we save up to
several orders of magnitude inter-ISP traffic compared to traditional locality
without adversely impacting peers download completion time. In addition, we
crawled 214 443 torrents representing 6 113 224 unique peers spread among 9 605
ASes. We show that whereas the torrents we crawled generated 11.6 petabytes of
inter-ISP traffic, our locality policy implemented for all torrents would have
reduced the global inter-ISP traffic by 40%.
| [
{
"version": "v1",
"created": "Tue, 2 Dec 2008 20:07:47 GMT"
},
{
"version": "v2",
"created": "Tue, 12 May 2009 15:06:58 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Blond",
"Stevens Le",
"",
"INRIA Sophia Antipolis / INRIA Rhône-Alpes"
],
[
"Legout",
"Arnaud",
"",
"INRIA Sophia Antipolis / INRIA Rhône-Alpes"
],
[
"Dabbous",
"Walid",
"",
"INRIA Sophia Antipolis / INRIA Rhône-Alpes"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.0598 | Laura Poplawski | Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram and Shang-Hua
Teng | Preference Games and Personalized Equilibria, with Applications to
Fractional BGP | 25 pages, 3 figures, v2: minor editorial changes | null | null | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the complexity of computing equilibria in two classes of network
games based on flows - fractional BGP (Border Gateway Protocol) games and
fractional BBC (Bounded Budget Connection) games. BGP is the glue that holds
the Internet together and hence its stability, i.e. the equilibria of
fractional BGP games (Haxell, Wilfong), is a matter of practical importance.
BBC games (Laoutaris et al) follow in the tradition of the large body of work
on network formation games and capture a variety of applications ranging from
social networks and overlay networks to peer-to-peer networks.
The central result of this paper is that there are no fully polynomial-time
approximation schemes (unless PPAD is in FP) for computing equilibria in both
fractional BGP games and fractional BBC games. We obtain this result by proving
the hardness for a new and surprisingly simple game, the fractional preference
game, which is reducible to both fractional BGP and BBC games.
We define a new flow-based notion of equilibrium for matrix games --
personalized equilibria -- generalizing both fractional BBC and fractional BGP
games. We prove not just the existence, but the existence of rational
personalized equilibria for all matrix games, which implies the existence of
rational equilibria for fractional BGP and BBC games. In particular, this
provides an alternative proof and strengthening of the main result in [Haxell,
Wilfong]. For k-player matrix games, where k = 2, we provide a combinatorial
characterization leading to a polynomial-time algorithm for computing all
personalized equilibria. For k >= 5, we prove that personalized equilibria are
PPAD-hard to approximate in fully polynomial time. We believe that the concept
of personalized equilibria has potential for real-world significance.
| [
{
"version": "v1",
"created": "Tue, 2 Dec 2008 21:12:03 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Dec 2008 16:35:26 GMT"
}
]
| 2008-12-05T00:00:00 | [
[
"Poplawski",
"Laura J.",
""
],
[
"Rajaraman",
"Rajmohan",
""
],
[
"Sundaram",
"Ravi",
""
],
[
"Teng",
"Shang-Hua",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.0601 | Shaowei Lin | Shaowei Lin, Bernd Sturmfels | Polynomial relations among principal minors of a 4x4-matrix | 16 pages, v2: Remark 14 | null | null | null | math.AG cs.SC math.AC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The image of the principal minor map for n x n-matrices is shown to be
closed. In the 19th century, Nansen and Muir studied the implicitization
problem of finding all relations among principal minors when n=4. We complete
their partial results by constructing explicit polynomials of degree 12 that
scheme-theoretically define this affine variety and also its projective closure
in $\PP^{15}$. The latter is the main component in the singular locus of the 2
x 2 x 2 x 2-hyperdeterminant.
| [
{
"version": "v1",
"created": "Tue, 2 Dec 2008 21:34:51 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2008 17:12:26 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Jun 2009 20:31:19 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"Lin",
"Shaowei",
""
],
[
"Sturmfels",
"Bernd",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
]
|
0812.0607 | Kevin Wortman | Matthew Dickerson, David Eppstein, and Kevin A. Wortman | Dilation, smoothed distance, and minimization diagrams of convex
functions | 10 pages, 6 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study Voronoi diagrams for distance functions that add together two convex
functions, each taking as its argument the difference between Cartesian
coordinates of two planar points. When the functions do not grow too quickly,
then the Voronoi diagram has linear complexity and can be constructed in
near-linear randomized expected time. Additionally, the level sets of the
distances from the sites form a family of pseudocircles in the plane, all cells
in the Voronoi diagram are connected, and the set of bisectors separating any
one cell in the diagram from each of the others forms an arrangement of
pseudolines in the plane. We apply these results to the smoothed distance or
biotope transform metric, a geometric analogue of the Jaccard distance whose
Voronoi diagrams can be used to determine the dilation of a star network with a
given hub. For sufficiently closely spaced points in the plane, the Voronoi
diagram of smoothed distance has linear complexity and can be computed
efficiently. We also experiment with a variant of Lloyd's algorithm, adapted to
smoothed distance, to find uniformly spaced point samples with exponentially
decreasing density around a given point.
| [
{
"version": "v1",
"created": "Tue, 2 Dec 2008 22:09:31 GMT"
},
{
"version": "v2",
"created": "Thu, 13 May 2010 05:30:09 GMT"
}
]
| 2010-05-14T00:00:00 | [
[
"Dickerson",
"Matthew",
""
],
[
"Eppstein",
"David",
""
],
[
"Wortman",
"Kevin A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0812.0617 | Nan Liu | Nan Liu, Ivana Maric, Andrea Goldsmith and Shlomo Shamai (Shitz) | The Capacity Region of the Cognitive Z-interference Channel with One
Noiseless Component | The conference version has been submitted to ISIT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the discrete memoryless Z-interference channel (ZIC) where the
transmitter of the pair that suffers from interference is cognitive. We first
provide upper and lower bounds on the capacity of this channel. We then show
that, when the channel of the transmitter-receiver pair that does not face
interference is noiseless, the two bounds coincide and therefore yield the
capacity region. The obtained results imply that, unlike in the Gaussian
cognitive ZIC, in the considered channel superposition encoding at the
non-cognitive transmitter as well as Gel'fand-Pinsker encoding at the cognitive
transmitter are needed in order to minimize the impact of interference. As a
byproduct of the obtained capacity region, we obtain the capacity result for a
generalized Gel'fand-Pinsker problem.
| [
{
"version": "v1",
"created": "Tue, 2 Dec 2008 23:18:26 GMT"
}
]
| 2008-12-04T00:00:00 | [
[
"Liu",
"Nan",
"",
"Shitz"
],
[
"Maric",
"Ivana",
"",
"Shitz"
],
[
"Goldsmith",
"Andrea",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.0621 | Jubin Jose | Jubin Jose, Alexei Ashikhmin, Phil Whiting, Sriram Vishwanath | Channel Estimation and Linear Precoding in Multiuser Multiple-Antenna
TDD Systems | null | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 5, JUNE
2011 | 10.1109/TVT.2011.2146797 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional approaches in the analysis of downlink systems decouple the
precoding and the channel estimation problems. However, in cellular systems
with mobile users, these two problems are in fact tightly coupled. In this
paper, this coupling is explicitly studied by accounting for channel training
overhead and estimation error while determining the overall system throughput.
The paper studies the problem of utilizing imperfect channel estimates for
efficient linear precoding and user selection. It presents precoding methods
that take into account the degree of channel estimation error.
Information-theoretic lower and upper bounds are derived to evaluate the
performance of these precoding methods. In typical scenarios, these bounds are
close.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 00:16:19 GMT"
},
{
"version": "v2",
"created": "Mon, 10 May 2010 19:50:57 GMT"
},
{
"version": "v3",
"created": "Mon, 27 Jun 2011 22:25:26 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Jose",
"Jubin",
""
],
[
"Ashikhmin",
"Alexei",
""
],
[
"Whiting",
"Phil",
""
],
[
"Vishwanath",
"Sriram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.0629 | Cuilian Li | Cuilian Li (1 and 2), Zhen Yang (1), Jun Li (2), Feng Tian (1) ((1)
Nanjing University of Posts & Telecommunications, (2) Zhejiang Wanli
University) | Dynamic spectrum sharing game by lease | 15 pages, 4 figures, 1 table. Revision | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose and analyze a dynamic implementation of the property-rights model
of cognitive radio. A primary link has the possibility to lease the owned
spectrum to a MAC network of secondary nodes, in exchange for cooperation in
the form of distributed space-time coding (DSTC). The cooperation and
competition between the primary and secondary network are cast in the framework
of sequential game. On one hand, the primary link attempts to maximize its
quality of service in terms of signal-to-interference-plus-noise ratio (SINR);
on the other hand, nodes in the secondary network compete for transmission
within the leased time-slot following a power control mechanism. We consider
both a baseline model with complete information and a more practical version
with incomplete information, using the backward induction approach for the
former and providing approximate algorithm for the latter. Analysis and
numerical results show that our models and algorithms provide a promising
framework for fair and effective spectrum sharing, both between primary and
secondary networks and among secondary nodes.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 01:12:23 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Jun 2009 01:05:25 GMT"
}
]
| 2009-06-19T00:00:00 | [
[
"Li",
"Cuilian",
"",
"1 and 2"
],
[
"Yang",
"Zhen",
""
],
[
"Li",
"Jun",
""
],
[
"Tian",
"Feng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.0635 | Cuilian Li | Cuilian Li (1 and 2), Zhen Yang (1) ((1) Nanjing University of Posts &
Telecommunications, (2) Zhejiang Wanli University) | Analysis of Group Multiuser Detection Based on Coalitional Game | 4 pages, 5 figures. Accepted by ICWMMN2008 | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The issue of group-blind multiuser detection in MAC channel among wireless
nodes in the environment of multiple networks coexisting and sharing spectrum
is addressed under the Framework of coalitional game. We investigate the
performance and stability of multiple access channel (MAC) with linear
decorrelating multiuser detection under varying SNR, channel gains and
coalitional structures, in which both single BS and multiple BSs cases were
considered. The main results and conclusion are as follows: (1) the grand
coalition is payoff maximizing under loose SNR; (2) it is in conformity with
group and coalitional rationality forming coalition among nodes that have
comparative channel gains.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 02:16:45 GMT"
}
]
| 2008-12-04T00:00:00 | [
[
"Li",
"Cuilian",
"",
"1 and 2"
],
[
"Yang",
"Zhen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.0659 | Chitta Baral | Chitta Baral, Michael Gelfond and Nelson Rushton | Probabilistic reasoning with answer sets | 77 pages. To appear in Theory and Practice of Logic Programming
(TPLP) | null | null | null | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper develops a declarative language, P-log, that combines logical and
probabilistic arguments in its reasoning. Answer Set Prolog is used as the
logical foundation, while causal Bayes nets serve as a probabilistic
foundation. We give several non-trivial examples and illustrate the use of
P-log for knowledge representation and updating of knowledge. We argue that our
approach to updates is more appealing than existing approaches. We give
sufficiency conditions for the coherency of P-log programs and show that Bayes
nets can be easily mapped to coherent P-log programs.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 06:36:16 GMT"
}
]
| 2008-12-04T00:00:00 | [
[
"Baral",
"Chitta",
""
],
[
"Gelfond",
"Michael",
""
],
[
"Rushton",
"Nelson",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0812.0686 | Juan Tapiador | Juan M. E. Tapiador, Almudena Alcaide, Julio C. Hernandez-Castro,
Arturo Ribagorda | Cryptanalysis of the RSA-CEGD protocol | 8 pages, 1 figure | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, Nenadi\'c et al. (2004) proposed the RSA-CEGD protocol for
certified delivery of e-goods. This is a relatively complex scheme based on
verifiable and recoverable encrypted signatures (VRES) to guarantee properties
such as strong fairness and non-repudiation, among others. In this paper, we
demonstrate how this protocol cannot achieve fairness by presenting a severe
attack and also pointing out some other weaknesses.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 10:42:48 GMT"
}
]
| 2008-12-04T00:00:00 | [
[
"Tapiador",
"Juan M. E.",
""
],
[
"Alcaide",
"Almudena",
""
],
[
"Hernandez-Castro",
"Julio C.",
""
],
[
"Ribagorda",
"Arturo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0812.0698 | Andrea Baldassarri | Ciro Cattuto, Andrea Baldassarri, Vito D.P. Servedio, and Vittorio
Loreto | Emergent Community Structure in Social Tagging Systems | 14 pages, 8 figures | Advances in Complex Systems 11, 597 (2008) | null | null | cs.IR cs.CY cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A distributed classification paradigm known as collaborative tagging has been
widely adopted in new Web applications designed to manage and share online
resources. Users of these applications organize resources (Web pages, digital
photographs, academic papers) by associating with them freely chosen text
labels, or tags. Here we leverage the social aspects of collaborative tagging
and introduce a notion of resource distance based on the collective tagging
activity of users. We collect data from a popular system and perform
experiments showing that our definition of distance can be used to build a
weighted network of resources with a detectable community structure. We show
that this community structure clearly exposes the semantic relations among
resources. The communities of resources that we observe are a genuinely
emergent feature, resulting from the uncoordinated activity of a large number
of users, and their detection paves the way for mapping emergent semantics in
social tagging systems.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 11:40:46 GMT"
}
]
| 2008-12-04T00:00:00 | [
[
"Cattuto",
"Ciro",
""
],
[
"Baldassarri",
"Andrea",
""
],
[
"Servedio",
"Vito D. P.",
""
],
[
"Loreto",
"Vittorio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0812.0706 | Soubhik Chakraborty | Soubhik Chakraborty, Rayalla Ranganayakulu, Shivee Chauhan, Sandeep
Singh Solanki and Kartik Mahto | Which notes are Vadi-Samvadi in Raga Rageshree? | 20 pages;04 figures | null | null | null | cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The notes which play the most important and second most important roles in
expressing a raga are called Vadi and Samvadi swars respectively in (North)
Indian Classical music. Like Bageshree, Bhairavi, Shankara, Hamir and Kalingra,
Rageshree is another controversial raga so far as the choice of Vadi-Samvadi
selection is concerned where there are two different opinions. In the present
work, a two minute vocal recording of raga Rageshree is subjected to a careful
statistical analysis. Our analysis is broken into three phases: first half,
middle half and last half. Under a multinomial model set up holding appreciably
in the first two phases, only one opinion is found acceptable. In the last
phase the distribution seems to be quasi multinomial, characterized by an
unstable nature of relative occurrence of pitch of all the notes and although
the note whose relative occurrence of pitch suddenly shoots is the Vadi swar
selected from our analysis of the first two phases, we take it as an outlier
demanding a separate treatment like any other in statistics. Selection of
Vadi-Samvadi notes in a quasi-multinomial set up is still an open research
problem. An interesting musical cocktail is proposed, however, embedding
several ideas like melodic property of notes, note combinations and pitch
movements between notes, using some weighted combination of psychological and
statistical stability of notes along with watching carefully the sudden shoot
of one or more notes whenever there is enough evidence that multinomial model
has broken down.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 12:47:08 GMT"
}
]
| 2008-12-04T00:00:00 | [
[
"Chakraborty",
"Soubhik",
""
],
[
"Ranganayakulu",
"Rayalla",
""
],
[
"Chauhan",
"Shivee",
""
],
[
"Solanki",
"Sandeep Singh",
""
],
[
"Mahto",
"Kartik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
]
|
0812.0736 | Alain Bui | Alain Bui, Olivier Flauzac, Cyril Rabat | Fully distributed and fault tolerant task management based on diffusions | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The task management is a critical component for the computational grids. The
aim is to assign tasks on nodes according to a global scheduling policy and a
view of local resources of nodes. A peer-to-peer approach for the task
management involves a better scalability for the grid and a higher fault
tolerance. But some mechanisms have to be proposed to avoid the computation of
replicated tasks that can reduce the efficiency and increase the load of nodes.
In the same way, these mechanisms have to limit the number of exchanged
messages to avoid the overload of the network.
In a previous paper, we have proposed two methods for the task management
called active and passive. These methods are based on a random walk: they are
fully distributed and fault tolerant. Each node owns a local tasks states set
updated thanks to a random walk and each node is in charge of the local
assignment. Here, we propose three methods to improve the efficiency of the
active method. These new methods are based on a circulating word. The nodes
local tasks states sets are updated thanks to periodical diffusions along trees
built from the circulating word. Particularly, we show that these methods
increase the efficiency of the active method: they produce less replicated
tasks. These three methods are also fully distributed and fault tolerant. On
the other way, the circulating word can be exploited for other applications
like the resources management or the nodes synchronization.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 14:58:19 GMT"
}
]
| 2008-12-04T00:00:00 | [
[
"Bui",
"Alain",
""
],
[
"Flauzac",
"Olivier",
""
],
[
"Rabat",
"Cyril",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0812.0743 | Qiang Li | Qiang Li, Yan He, Jing-ping Jiang | A Novel Clustering Algorithm Based on Quantum Games | 19 pages, 5 figures, 5 tables | 2009 J. Phys. A: Math. Theor. 42 445303 | 10.1088/1751-8113/42/44/445303 | null | cs.LG cs.AI cs.CV cs.GT cs.MA cs.NE quant-ph | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Enormous successes have been made by quantum algorithms during the last
decade. In this paper, we combine the quantum game with the problem of data
clustering, and then develop a quantum-game-based clustering algorithm, in
which data points in a dataset are considered as players who can make decisions
and implement quantum strategies in quantum games. After each round of a
quantum game, each player's expected payoff is calculated. Later, he uses a
link-removing-and-rewiring (LRR) function to change his neighbors and adjust
the strength of links connecting to them in order to maximize his payoff.
Further, algorithms are discussed and analyzed in two cases of strategies, two
payoff matrixes and two LRR functions. Consequently, the simulation results
have demonstrated that data points in datasets are clustered reasonably and
efficiently, and the clustering algorithms have fast rates of convergence.
Moreover, the comparison with other algorithms also provides an indication of
the effectiveness of the proposed approach.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 15:46:03 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Oct 2009 09:10:36 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Li",
"Qiang",
""
],
[
"He",
"Yan",
""
],
[
"Jiang",
"Jing-ping",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0812.0754 | Jinshan Zhang | Jinshan Zhang | Strong Spatial Mixing and Approximating Partition Functions of Two-State
Spin Systems without Hard Constrains | 9 pages | null | null | null | cs.DM cs.GR | http://creativecommons.org/licenses/by/3.0/ | We prove Gibbs distribution of two-state spin systems(also known as binary
Markov random fields) without hard constrains on a tree exhibits strong spatial
mixing(also known as strong correlation decay), under the assumption that, for
arbitrary `external field', the absolute value of `inverse temperature' is
small, or the `external field' is uniformly large or small. The first condition
on `inverse temperature' is tight if the distribution is restricted to
ferromagnetic or antiferromagnetic Ising models.
Thanks to Weitz's self-avoiding tree, we extends the result for sparse on
average graphs, which generalizes part of the recent work of Mossel and
Sly\cite{MS08}, who proved the strong spatial mixing property for ferromagnetic
Ising model. Our proof yields a different approach, carefully exploiting the
monotonicity of local recursion. To our best knowledge, the second condition of
`external field' for strong spatial mixing in this paper is first considered
and stated in term of `maximum average degree' and `interaction energy'. As an
application, we present an FPTAS for partition functions of two-state spin
models without hard constrains under the above assumptions in a general family
of graphs including interesting bounded degree graphs.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 16:56:53 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Mar 2009 03:16:17 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"Zhang",
"Jinshan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
]
|
0812.0759 | Gaurav Bhatnagar Mr. | R. Balasubramanian, Gaurav Bhatnagar | A new Contrast Based Image Fusion using Wavelet Packets | 5 Pages, 10 Figures, 1 Table | Proc. of IEEE Conference on Applications of Intelligent Systems
(AIS 2008), March 13-15, 2008, Sonepat, India, pp. 141-145.
(ISBN:978-81-906531-0-7) | null | null | cs.IT cs.MM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image Fusion, a technique which combines complimentary information from
different images of the same scene so that the fused image is more suitable for
segmentation, feature extraction, object recognition and Human Visual System.
In this paper, a simple yet efficient algorithm is presented based on contrast
using wavelet packet decomposition. First, all the source images are decomposed
into low and high frequency sub-bands and then fusion of high frequency
sub-bands is done by the means of Directive Contrast. Now, inverse wavelet
packet transform is performed to reconstruct the fused image. The performance
of the algorithm is carried out by the comparison made between proposed and
existing algorithm.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 17:29:19 GMT"
}
]
| 2008-12-04T00:00:00 | [
[
"Balasubramanian",
"R.",
""
],
[
"Bhatnagar",
"Gaurav",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.0790 | Tran Cao Son | Enrico Pontelli, Tran Cao Son, and Omar Elkhatib | Justifications for Logic Programs under Answer Set Semantics | 59 pages, 7 figures | null | null | null | cs.AI cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper introduces the notion of off-line justification for Answer Set
Programming (ASP). Justifications provide a graph-based explanation of the
truth value of an atom w.r.t. a given answer set. The paper extends also this
notion to provide justification of atoms during the computation of an answer
set (on-line justification), and presents an integration of on-line
justifications within the computation model of Smodels. Off-line and on-line
justifications provide useful tools to enhance understanding of ASP, and they
offer a basic data structure to support methodologies and tools for debugging
answer set programs. A preliminary implementation has been developed in
ASP-PROLOG.
(To appear in Theory and Practice of Logic Programming (TPLP))
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 20:10:00 GMT"
}
]
| 2008-12-04T00:00:00 | [
[
"Pontelli",
"Enrico",
""
],
[
"Son",
"Tran Cao",
""
],
[
"Elkhatib",
"Omar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0812.0852 | Daowen Qiu | Daowen Qiu, Sheng Yu | Hierarchy and equivalence of multi-letter quantum finite automata | 22 pages, 8 figures. The is a further revised version, and it has
been accepted for publication in Theoretical Computer Science | Theoretical Computer Science, 410 (30-32) (2009) 3006-3017. | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-letter {\it quantum finite automata} (QFAs) were a new one-way QFA
model proposed recently by Belovs, Rosmanis, and Smotrovs (LNCS, Vol. 4588,
Springer, Berlin, 2007, pp. 60-71), and they showed that multi-letter QFAs can
accept with no error some regular languages ($(a+b)^{*}b$) that are
unacceptable by the one-way QFAs. In this paper, we continue to study
multi-letter QFAs. We mainly focus on two issues: (1) we show that
$(k+1)$-letter QFAs are computationally more powerful than $k$-letter QFAs,
that is, $(k+1)$-letter QFAs can accept some regular languages that are
unacceptable by any $k$-letter QFA. A comparison with the one-way QFAs is made
by some examples; (2) we prove that a $k_{1}$-letter QFA ${\cal A}_1$ and
another $k_{2}$-letter QFA ${\cal A}_2$ are equivalent if and only if they are
$(n_{1}+n_{2})^{4}+k-1$-equivalent, and the time complexity of determining the
equivalence of two multi-letter QFAs using this method is
$O(n^{12}+k^{2}n^{4}+kn^{8})$, where $n_{1}$ and $n_{2}$ are the numbers of
states of ${\cal A}_{1}$ and ${\cal A}_{2}$, respectively, and
$k=\max(k_{1},k_{2})$. Some other issues are addressed for further
consideration.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 03:10:29 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2008 04:04:11 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Mar 2009 19:55:01 GMT"
}
]
| 2010-03-10T00:00:00 | [
[
"Qiu",
"Daowen",
""
],
[
"Yu",
"Sheng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0812.0872 | Louis Theran | Louis Theran | Rigid Components of Random Graphs | null | null | null | null | math.CO cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The planar rigidity problem asks, given a set of m pairwise distances among a
set P of n unknown points, whether it is possible to reconstruct P, up to a
finite set of possibilities (modulo rigid motions of the plane). The celebrated
Maxwell-Laman Theorem from Rigidity Theory says that, generically, the rigidity
problem has a combinatorial answer: the underlying combinatorial structure must
contain a spanning minimally-rigid graph (Laman graph). In the case where the
system is not rigid, its inclusion-wise maximal rigid substructures (rigid
components) are also combinatorially characterized via the Maxwell-Laman
theorem, and may be found efficiently.
Physicists have used planar combinatorial rigidity has been used to study the
phase transition between liquid and solid in network glasses. The approach has
been to generate a graph via a stochastic process and then experimentally
analyze its rigidity properties. Of particular interest is the size of the
largest rigid components.
In this paper, we study the emergence of rigid components in an Erdos-Renyi
random graph G(n,p), using the parameterization p=c/n for a fixed constant c>0.
Our first result is that for all c>0, almost surely all rigid components have
size 2, 3 or Omega(n). We also show that for c>4, almost surely the largest
rigid components have size at least n/10.
While the G(n,p) model is simpler than those appearing in the physics
literature, these results are the first of this type where the distribution is
over all graphs on n vertices and the expected number of edges is O(n).
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 07:23:25 GMT"
}
]
| 2008-12-05T00:00:00 | [
[
"Theran",
"Louis",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0812.0874 | Florent Autrusseau | Guihuan Feng (IRCCyN), Christian Viard-Gaudin (IRCCyN) | Stroke Fragmentation based on Geometry Features and HMM | null | null | null | null | cs.HC cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Stroke fragmentation is one of the key steps in pen-based interaction. In
this letter, we present a unified HMM-based stroke fragmentation technique that
can do segment point location and primitive type determination simultaneously.
The geometry features included are used to evaluate local features, and the HMM
model is utilized to measure the global drawing context. Experiments prove that
the model can efficiently represent smooth curves as well as strokes made up of
arbitrary lines and circular arcs.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 07:35:48 GMT"
}
]
| 2008-12-05T00:00:00 | [
[
"Feng",
"Guihuan",
"",
"IRCCyN"
],
[
"Viard-Gaudin",
"Christian",
"",
"IRCCyN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0812.0882 | Philippe Thomas | Philippe Thomas (CRAN), Andr\'e Thomas (CRAN) | Elagage d'un perceptron multicouches : utilisation de l'analyse de la
variance de la sensibilit\'e des param\`etres | 6 pages | Conf\'erence Internationale Francophone d'Automatique CIFA'08,
Bucarest : Roumanie (2008) | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The stucture determination of a neural network for the modelisation of a
system remain the core of the problem. Within this framework, we propose a
pruning algorithm of the network based on the use of the analysis of the
sensitivity of the variance of all the parameters of the network. This
algorithm will be tested on two examples of simulation and its performances
will be compared with three other algorithms of pruning of the literature
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 09:12:14 GMT"
}
]
| 2008-12-05T00:00:00 | [
[
"Thomas",
"Philippe",
"",
"CRAN"
],
[
"Thomas",
"André",
"",
"CRAN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0812.0885 | Marko Horvat | Marko Horvat | Elementary epistemological features of machine intelligence | The paper needs to be redesigned | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Theoretical analysis of machine intelligence (MI) is useful for defining a
common platform in both theoretical and applied artificial intelligence (AI).
The goal of this paper is to set canonical definitions that can assist
pragmatic research in both strong and weak AI. Described epistemological
features of machine intelligence include relationship between intelligent
behavior, intelligent and unintelligent machine characteristics, observable and
unobservable entities and classification of intelligence. The paper also
establishes algebraic definitions of efficiency and accuracy of MI tests as
their quality measure. The last part of the paper addresses the learning
process with respect to the traditional epistemology and the epistemology of MI
described here. The proposed views on MI positively correlate to the Hegelian
monistic epistemology and contribute towards amalgamating idealistic
deliberations with the AI theory, particularly in a local frame of reference.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 09:25:37 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Dec 2012 23:10:50 GMT"
},
{
"version": "v3",
"created": "Sat, 9 Feb 2013 11:27:50 GMT"
},
{
"version": "v4",
"created": "Fri, 30 Jun 2017 14:10:03 GMT"
}
]
| 2017-07-03T00:00:00 | [
[
"Horvat",
"Marko",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.0893 | Darren Strash | David Eppstein, Michael T. Goodrich and Darren Strash | Linear-Time Algorithms for Geometric Graphs with Sublinearly Many Edge
Crossings | Expanded version of a paper appearing at the 20th ACM-SIAM Symposium
on Discrete Algorithms (SODA09) | SIAM J. Computing 39(8): 3814-3829, 2010 | 10.1137/090759112 | null | cs.CG cs.DM cs.DS cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide linear-time algorithms for geometric graphs with sublinearly many
crossings. That is, we provide algorithms running in O(n) time on connected
geometric graphs having n vertices and k crossings, where k is smaller than n
by an iterated logarithmic factor. Specific problems we study include Voronoi
diagrams and single-source shortest paths. Our algorithms all run in linear
time in the standard comparison-based computational model; hence, we make no
assumptions about the distribution or bit complexities of edge weights, nor do
we utilize unusual bit-level operations on memory words. Instead, our
algorithms are based on a planarization method that "zeroes in" on edge
crossings, together with methods for extending planar separator decompositions
to geometric graphs with sublinearly many crossings. Incidentally, our
planarization algorithm also solves an open computational geometry problem of
Chazelle for triangulating a self-intersecting polygonal chain having n
segments and k crossings in linear time, for the case when k is sublinear in n
by an iterated logarithmic factor.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 10:29:00 GMT"
},
{
"version": "v2",
"created": "Thu, 14 May 2009 02:07:34 GMT"
}
]
| 2010-12-16T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Strash",
"Darren",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
]
|
0812.0904 | Jun Kyoung Lee | Jun Kyoung Lee, Janghoon Yang, Dong Ku Kim | An Approximation of the Outage Probability for Multi-hop AF Fixed Gain
Relay | 3 pages, 3 figures, Submitted to IEEE Communication Letters | null | null | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this letter, we present a closed-form approximation of the outage
probability for the multi-hop amplify-and-forward (AF) relaying systems with
fixed gain in Rayleigh fading channel. The approximation is derived from the
outage event for each hop. The simulation results show the tightness of the
proposed approximation in low and high signal-to-noise ratio (SNR) region.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 11:45:48 GMT"
}
]
| 2008-12-05T00:00:00 | [
[
"Lee",
"Jun Kyoung",
""
],
[
"Yang",
"Janghoon",
""
],
[
"Kim",
"Dong Ku",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0812.0933 | Adam Kalai | Adam Tauman Kalai and Shang-Hua Teng | Decision trees are PAC-learnable from most product distributions: a
smoothed analysis | null | null | null | null | cs.LG cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of PAC-learning decision trees, i.e., learning a
decision tree over the n-dimensional hypercube from independent random labeled
examples. Despite significant effort, no polynomial-time algorithm is known for
learning polynomial-sized decision trees (even trees of any super-constant
size), even when examples are assumed to be drawn from the uniform distribution
on {0,1}^n. We give an algorithm that learns arbitrary polynomial-sized
decision trees for {\em most product distributions}. In particular, consider a
random product distribution where the bias of each bit is chosen independently
and uniformly from, say, [.49,.51]. Then with high probability over the
parameters of the product distribution and the random examples drawn from it,
the algorithm will learn any tree. More generally, in the spirit of smoothed
analysis, we consider an arbitrary product distribution whose parameters are
specified only up to a [-c,c] accuracy (perturbation), for an arbitrarily small
positive constant c.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 13:34:26 GMT"
}
]
| 2008-12-05T00:00:00 | [
[
"Kalai",
"Adam Tauman",
""
],
[
"Teng",
"Shang-Hua",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0812.0956 | Florian Hartig | Florian Hartig, Martin Horn, Martin Drechsler | EcoTRADE - a multi player network game of a tradable permit market for
biodiversity credits | 3 pages, 1 figure | Environmental Modelling & Software, 2010, 25, 1479-1480 | 10.1016/j.envsoft.2009.01.003 | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | EcoTRADE is a multi player network game of a virtual biodiversity credit
market. Each player controls the land use of a certain amount of parcels on a
virtual landscape. The biodiversity credits of a particular parcel depend on
neighboring parcels, which may be owned by other players. The game can be used
to study the strategies of players in experiments or classroom games and also
as a communication tool for stakeholders participating in credit markets that
include spatially interdependent credits.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 15:43:16 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Sep 2010 16:53:24 GMT"
}
]
| 2010-09-06T00:00:00 | [
[
"Hartig",
"Florian",
""
],
[
"Horn",
"Martin",
""
],
[
"Drechsler",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.0972 | Salah A. Aly | Salah A. Aly, Ahmed E. Kamal | Network Protection Codes: Providing Self-healing in Autonomic Networks
Using Network Coding | 12 pages, 2 figures, and 3 tables | null | null | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Agile recovery from link failures in autonomic communication networks is
essential to increase robustness, accessibility, and reliability of data
transmission. However, this must be done with the least amount of protection
resources, while using simple management plane functionality. Recently, network
coding has been proposed as a solution to provide agile and cost efficient
network self-healing against link failures, in a manner that does not require
data rerouting, packet retransmission, or failure localization, hence leading
to simple control and management planes. To achieve this, separate paths have
to be provisioned to carry encoded packets, hence requiring either the addition
of extra links, or reserving some of the resources for this purpose.
In this paper we introduce autonomic self-healing strategies for autonomic
networks in order to protect against link failures. The strategies are based on
network coding and reduced capacity, which is a technique that we call network
protection codes (NPC). In these strategies, an autonomic network is able to
provide self-healing from various network failures affecting network operation.
The techniques improve service and enhance reliability of autonomic
communication.
Network protection codes are extended to provide self-healing from multiple
link failures in autonomic networks. We provide implementation aspects of the
proposed strategies. We present bounds and network protection code
constructions. Finally, we study the construction of such codes over the binary
field. The paper also develops an Integer Linear Program formulation to
evaluate the cost of provisioning connections using the proposed strategies.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 20:59:28 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Dec 2008 05:13:13 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Aly",
"Salah A.",
""
],
[
"Kamal",
"Ahmed E.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1012 | Kamesh Munagala | Sudipto Guha and Kamesh Munagala | Adaptive Uncertainty Resolution in Bayesian Combinatorial Optimization
Problems | Journal version of the paper "Model-driven Optimization using
Adaptive Probes" that appeared in the ACM-SIAM Symposium on Discrete
Algorithms (SODA), 2007 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In several applications such as databases, planning, and sensor networks,
parameters such as selectivity, load, or sensed values are known only with some
associated uncertainty. The performance of such a system (as captured by some
objective function over the parameters) is significantly improved if some of
these parameters can be probed or observed. In a resource constrained
situation, deciding which parameters to observe in order to optimize system
performance itself becomes an interesting and important optimization problem.
This general problem is the focus of this paper.
One of the most important considerations in this framework is whether
adaptivity is required for the observations. Adaptive observations introduce
blocking or sequential operations in the system whereas non-adaptive
observations can be performed in parallel. One of the important questions in
this regard is to characterize the benefit of adaptivity for probes and
observation.
We present general techniques for designing constant factor approximations to
the optimal observation schemes for several widely used scheduling and metric
objective functions. We show a unifying technique that relates this
optimization problem to the outlier version of the corresponding deterministic
optimization. By making this connection, our technique shows constant factor
upper bounds for the benefit of adaptivity of the observation schemes. We show
that while probing yields significant improvement in the objective function,
being adaptive about the probing is not beneficial beyond constant factors.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 19:48:16 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Sep 2009 14:17:22 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Jan 2010 15:08:30 GMT"
}
]
| 2010-01-28T00:00:00 | [
[
"Guha",
"Sudipto",
""
],
[
"Munagala",
"Kamesh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.1014 | Alaa Abi Haidar | Alaa Abi-Haidar and Luis M. Rocha | Adaptive Spam Detection Inspired by a Cross-Regulation Model of Immune
Dynamics: A Study of Concept Drift | null | Artificial Immune Systems: 7th International Conference, (ICARIS
2008). Bentley, Peter; Lee, Doheon; Jung, Sungwon (Eds.) Lecture Notes in
Computer Science. Springer-Verlag, 5132: 36-47 | 10.1007/978-3-540-85072-4_4 | null | cs.AI cs.IR nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a novel solution to spam detection inspired by a model of
the adaptive immune system known as the crossregulation model. We report on the
testing of a preliminary algorithm on six e-mail corpora. We also compare our
results statically and dynamically with those obtained by the Naive Bayes
classifier and another binary classification method we developed previously for
biomedical text-mining applications. We show that the cross-regulation model is
competitive against those and thus promising as a bio-inspired algorithm for
spam detection in particular, and binary classification in general.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 20:40:32 GMT"
}
]
| 2008-12-05T00:00:00 | [
[
"Abi-Haidar",
"Alaa",
""
],
[
"Rocha",
"Luis M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
]
|
0812.1029 | Alaa Abi Haidar | Alaa Abi-Haidar, Jasleen Kaur, Ana G. Maguitman, Predrag Radivojac,
Andreas Retchsteiner, Karin Verspoor, Zhiping Wang, Luis M. Rocha | Uncovering protein interaction in abstracts and text using a novel
linear model and word proximity networks | null | Genome Biology 2008, 9(Suppl 2):S11 | 10.1186/gb-2008-9-s2-s11 | null | cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We participated in three of the protein-protein interaction subtasks of the
Second BioCreative Challenge: classification of abstracts relevant for
protein-protein interaction (IAS), discovery of protein pairs (IPS) and text
passages characterizing protein interaction (ISS) in full text documents. We
approached the abstract classification task with a novel, lightweight linear
model inspired by spam-detection techniques, as well as an uncertainty-based
integration scheme. We also used a Support Vector Machine and the Singular
Value Decomposition on the same features for comparison purposes. Our approach
to the full text subtasks (protein pair and passage identification) includes a
feature expansion method based on word-proximity networks. Our approach to the
abstract classification task (IAS) was among the top submissions for this task
in terms of the measures of performance used in the challenge evaluation
(accuracy, F-score and AUC). We also report on a web-tool we produced using our
approach: the Protein Interaction Abstract Relevance Evaluator (PIARE). Our
approach to the full text tasks resulted in one of the highest recall rates as
well as mean reciprocal rank of correct passages. Our approach to abstract
classification shows that a simple linear model, using relatively few features,
is capable of generalizing and uncovering the conceptual nature of
protein-protein interaction from the bibliome. Since the novel approach is
based on a very lightweight linear model, it can be easily ported and applied
to similar problems. In full text problems, the expansion of word features with
word-proximity networks is shown to be useful, though the need for some
improvements is discussed.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 21:37:35 GMT"
}
]
| 2008-12-08T00:00:00 | [
[
"Abi-Haidar",
"Alaa",
""
],
[
"Kaur",
"Jasleen",
""
],
[
"Maguitman",
"Ana G.",
""
],
[
"Radivojac",
"Predrag",
""
],
[
"Retchsteiner",
"Andreas",
""
],
[
"Verspoor",
"Karin",
""
],
[
"Wang",
"Zhiping",
""
],
[
"Rocha",
"Luis M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.1045 | Bernardo Huberman | Bernardo A. Huberman, Daniel M. Romero, and Fang Wu | Social networks that matter: Twitter under the microscope | null | null | null | null | cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scholars, advertisers and political activists see massive online social
networks as a representation of social interactions that can be used to study
the propagation of ideas, social bond dynamics and viral marketing, among
others. But the linked structures of social networks do not reveal actual
interactions among people. Scarcity of attention and the daily rythms of life
and work makes people default to interacting with those few that matter and
that reciprocate their attention. A study of social interactions within Twitter
reveals that the driver of usage is a sparse and hidden network of connections
underlying the declared set of friends and followers.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2008 22:52:20 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Huberman",
"Bernardo A.",
""
],
[
"Romero",
"Daniel M.",
""
],
[
"Wu",
"Fang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0812.1061 | Daowen Qiu | Daowen Qiu, Xiangfu Zou, Lvzhou Li, Paulo Mateus | Decidability of the Equivalence of Multi-Letter Quantum Finite Automata | 18 pages; this is a further revised version | null | null | null | cs.FL cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-letter {\it quantum finite automata} (QFAs) were a quantum variant of
classical {\it one-way multi-head finite automata} (J. Hromkovi\v{c}, Acta
Informatica 19 (1983) 377-384), and it has been shown that this new one-way
QFAs (multi-letter QFAs) can accept with no error some regular languages
$(a+b)^{*}b$ that are unacceptable by the previous one-way QFAs. In this paper,
we study the decidability of the equivalence of multi-letter QFAs, and the main
technical contributions are as follows: (1) We show that any two automata, a
$k_{1}$-letter QFA ${\cal A}_1$ and a $k_{2}$-letter QFA ${\cal A}_2$, over the
same input alphabet $\Sigma$ are equivalent if and only if they are
$(n^2m^{k-1}-m^{k-1}+k)$-equivalent, where $m=|\Sigma|$ is the cardinality of
$\Sigma$, $k=\max(k_{1},k_{2})$, and $n=n_{1}+n_{2}$, with $n_{1}$ and $n_{2}$
being the numbers of states of ${\cal A}_{1}$ and ${\cal A}_{2}$, respectively.
When $k=1$, we obtain the decidability of equivalence of measure-once QFAs in
the literature. It is worth mentioning that our technical method is essentially
different from that for the decidability of the case of single input alphabet
(i.e., $m=1$). (2) However, if we determine the equivalence of multi-letter
QFAs by checking all strings of length not more than $ n^2m^{k-1}-m^{k-1}+k$,
then the worst time complexity is exponential, i.e.,
$O(n^6m^{n^2m^{k-1}-m^{k-1}+2k-1})$. Therefore, we design a polynomial-time
$O(m^{2k-1}n^{8}+km^kn^{6})$ algorithm for determining the equivalence of any
two multi-letter QFAs. Here, the time complexity is concerning the number of
states in the multi-letter QFAs, and $k$ is thought of as a constant.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 00:53:20 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jan 2009 03:06:42 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Mar 2009 19:47:59 GMT"
},
{
"version": "v4",
"created": "Wed, 23 Dec 2009 13:42:54 GMT"
},
{
"version": "v5",
"created": "Tue, 19 Oct 2010 02:21:30 GMT"
},
{
"version": "v6",
"created": "Sun, 24 Oct 2010 10:05:51 GMT"
}
]
| 2010-11-01T00:00:00 | [
[
"Qiu",
"Daowen",
""
],
[
"Zou",
"Xiangfu",
""
],
[
"Li",
"Lvzhou",
""
],
[
"Mateus",
"Paulo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0812.1091 | Rajiv Soundararajan Mr. | Rajiv Soundararajan and Sriram Vishwanath | Communicating the Difference of Correlated Gaussian Sources Over a MAC | 8 pages, 2 figures, submitted to DCC 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the problem of transmitting the difference of two
jointly Gaussian sources over a two-user additive Gaussian noise multiple
access channel (MAC). The goal is to recover this difference within an average
mean squared error distortion criterion. Each transmitter has access to only
one of the two Gaussian sources and is limited by an average power constraint.
In this work, a lattice coding scheme that achieves a distortion within a
constant of a distortion lower bound is presented if the signal to noise ratio
(SNR) is greater than a threshold. Further, uncoded transmission is shown to be
worse in performance to lattice coding methods. An alternative lattice coding
scheme is presented that can potentially improve on the performance of uncoded
transmission.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 08:34:12 GMT"
}
]
| 2008-12-08T00:00:00 | [
[
"Soundararajan",
"Rajiv",
""
],
[
"Vishwanath",
"Sriram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1093 | Stephane Devismes | Ajoy K. Datta (UNLV), St\'ephane Devismes (VERIMAG - IMAG), Florian
Horn (LIAFA), Lawrence L. Larmore (UNLV) | Self-stabilizing K-out-of-L exclusion on tree network | 15 pages | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we address the problem of K-out-of-L exclusion, a
generalization of the mutual exclusion problem, in which there are $\ell$ units
of a shared resource, and any process can request up to $\mathtt k$ units
($1\leq\mathtt k\leq\ell$). We propose the first deterministic self-stabilizing
distributed K-out-of-L exclusion protocol in message-passing systems for
asynchronous oriented tree networks which assumes bounded local memory for each
process.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 08:47:25 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Dec 2008 20:19:29 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Dec 2008 07:49:35 GMT"
},
{
"version": "v4",
"created": "Fri, 13 Feb 2009 12:37:39 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Datta",
"Ajoy K.",
"",
"UNLV"
],
[
"Devismes",
"Stéphane",
"",
"VERIMAG - IMAG"
],
[
"Horn",
"Florian",
"",
"LIAFA"
],
[
"Larmore",
"Lawrence L.",
"",
"UNLV"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.1094 | Philippe Thomas | Philippe Thomas (CRAN), Andr\'e Thomas (CRAN) | S\'election de la structure d'un perceptron multicouches pour la
r\'eduction dun mod\`ele de simulation d'une scierie | 7 pages | Conf\'erence Internationale Francophone d'Automatique CIFA'08,
Bucarest : Roumanie (2008) | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Simulation is often used to evaluate the relevance of a Directing Program of
Production (PDP) or to evaluate its impact on detailed sc\'enarii of
scheduling. Within this framework, we propose to reduce the complexity of a
model of simulation by exploiting a multilayer perceptron. A main phase of the
modeling of one system using a multilayer perceptron remains the determination
of the structure of the network. We propose to compare and use various pruning
algorithms in order to determine the optimal structure of the network used to
reduce the complexity of the model of simulation of our case of application: a
sawmill.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 08:49:53 GMT"
}
]
| 2008-12-08T00:00:00 | [
[
"Thomas",
"Philippe",
"",
"CRAN"
],
[
"Thomas",
"André",
"",
"CRAN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0812.1119 | Jinshan Zhang | Jinshan Zhang | An analysis of a random algorithm for estimating all the matchings | 10 pages | null | null | null | cs.GR cs.AI | http://creativecommons.org/licenses/by/3.0/ | Counting the number of all the matchings on a bipartite graph has been
transformed into calculating the permanent of a matrix obtained from the
extended bipartite graph by Yan Huo, and Rasmussen presents a simple approach
(RM) to approximate the permanent, which just yields a critical ratio
O($n\omega(n)$) for almost all the 0-1 matrices, provided it's a simple
promising practical way to compute this #P-complete problem. In this paper, the
performance of this method will be shown when it's applied to compute all the
matchings based on that transformation. The critical ratio will be proved to be
very large with a certain probability, owning an increasing factor larger than
any polynomial of $n$ even in the sense for almost all the 0-1 matrices. Hence,
RM fails to work well when counting all the matchings via computing the
permanent of the matrix. In other words, we must carefully utilize the known
methods of estimating the permanent to count all the matchings through that
transformation.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 12:16:53 GMT"
}
]
| 2008-12-08T00:00:00 | [
[
"Zhang",
"Jinshan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.1123 | Jinshan Zhang | Jinshan Zhang | Improved Approximation for the Number of Hamiltonian Cycles in Dense
Digraphs | 20 pages | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an improved algorithm for counting the number of Hamiltonian
cycles in a directed graph. The basic idea of the method is sequential
acceptance/rejection, which is successfully used in approximating the number of
perfect matchings in dense bipartite graphs. As a consequence, a new bound on
the number of Hamiltonian cycles in a directed graph is proved, by using the
ratio of the number of 1-factors. Based on this bound, we prove that our
algorithm runs in expected time of $O(n^{8.5})$ for dense problems. This
improves the Markov chain method, the most powerful existing method, a factor
of at least $n^{4.5}(\log n)^{4}$ in running time. This class of dense problems
is shown to be nontrivial in counting, in the sense that it is $#$P-Complete.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 12:28:57 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Dec 2008 17:15:05 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Jan 2009 13:05:39 GMT"
},
{
"version": "v4",
"created": "Sat, 21 Nov 2009 08:13:36 GMT"
}
]
| 2009-11-23T00:00:00 | [
[
"Zhang",
"Jinshan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.1126 | Dimitris Kalles | Dimitris Kalles, Alexis Kaporis | Emerge-Sort: Converging to Ordered Sequences by Simple Local Operators | Contains 16 pages, 17 figures, 1 table. Text updated as of March 10,
2009. Submitted to a journal | null | null | null | cs.AI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we examine sorting on the assumption that we do not know in
advance which way to sort a sequence of numbers and we set at work simple local
comparison and swap operators whose repeating application ends up in sorted
sequences. These are the basic elements of Emerge-Sort, our approach to
self-organizing sorting, which we then validate experimentally across a range
of samples. Observing an O(n2) run-time behaviour, we note that the n/logn
delay coefficient that differentiates Emerge-Sort from the classical comparison
based algorithms is an instantiation of the price of anarchy we pay for not
imposing a sorting order and for letting that order emerge through the local
interactions.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 12:57:00 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Mar 2009 22:42:43 GMT"
}
]
| 2009-03-11T00:00:00 | [
[
"Kalles",
"Dimitris",
""
],
[
"Kaporis",
"Alexis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.1155 | Shan Mei | Shan Mei, P.M.A Sloot, Rick Quax, Yifan Zhu, Weiping Wang | Complex Agent Networks explaining the HIV epidemic among homosexual men
in Amsterdam | 21 pages, 4 figures, Mathematics and Computers in Simulation, added
references | null | null | null | cs.MA q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Simulating the evolution of the Human Immunodeficiency Virus (HIV) epidemic
requires a detailed description of the population network, especially for small
populations in which individuals can be represented in detail and accuracy. In
this paper, we introduce the concept of a Complex Agent Network(CAN) to model
the HIV epidemics by combining agent-based modelling and complex networks, in
which agents represent individuals that have sexual interactions. The
applicability of CANs is demonstrated by constructing and executing a detailed
HIV epidemic model for men who have sex with men (MSM) in Amsterdam, including
a distinction between steady and casual relationships. We focus on MSM contacts
because they play an important role in HIV epidemics and have been tracked in
Amsterdam for a long time. Our experiments show good correspondence between the
historical data of the Amsterdam cohort and the simulation results.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 15:18:38 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Feb 2009 13:02:54 GMT"
}
]
| 2009-02-16T00:00:00 | [
[
"Mei",
"Shan",
""
],
[
"Sloot",
"P. M. A",
""
],
[
"Quax",
"Rick",
""
],
[
"Zhu",
"Yifan",
""
],
[
"Wang",
"Weiping",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
}
]
|
0812.1194 | Gabriel Istrate | Gabriel Istrate, Madhav V. Marathe and S. S. Ravi | Adversarial Scheduling in Evolutionary Game Dynamics | null | null | null | null | cs.DM cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a system in which players at nodes of an underlying graph G
repeatedly play Prisoner's Dilemma against their neighbors. The players adapt
their strategies based on the past behavior of their opponents by applying the
so-called win-stay lose-shift strategy. This dynamics has been studied in
(Kittock 94), (Dyer et al. 2002), (Mossel and Roch, 2006).
With random scheduling, starting from any initial configuration with high
probability the system reaches the unique fixed point in which all players
cooperate. This paper investigates the validity of this result under various
classes of adversarial schedulers. Our results can be sumarized as follows:
1. An adversarial scheduler that can select both participants to the game can
preclude the system from reaching the unique fixed point on most graph
topologies. 2. A nonadaptive scheduler that is only allowed to choose one of
the participants is no more powerful than a random scheduler. With this
restriction even an adaptive scheduler is not significantly more powerful than
the random scheduler, provided it is "reasonably fair".
The results exemplify the adversarial scheduling approach we propose as a
foundational basis for the generative approach to social science (Epstein
2007).
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 18:50:20 GMT"
}
]
| 2008-12-08T00:00:00 | [
[
"Istrate",
"Gabriel",
""
],
[
"Marathe",
"Madhav V.",
""
],
[
"Ravi",
"S. S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.1200 | Saugata Basu | Saugata Basu and Thierry Zell | Polynomial hierarchy, Betti numbers and a real analogue of Toda's
theorem | Final version to appear in Found. Comput. Math | Found. Comput. Math, 10:429-454, 2010 | null | null | cs.CC math.AT math.CO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Toda proved in 1989 that the (discrete) polynomial time hierarchy,
$\mathbf{PH}$, is contained in the class $\mathbf{P}^{#\mathbf{P}}$, namely the
class of languages that can be decided by a Turing machine in polynomial time
given access to an oracle with the power to compute a function in the counting
complexity class $#\mathbf{P}$. This result which illustrates the power of
counting is considered to be a seminal result in computational complexity
theory. An analogous result in the complexity theory over the reals (in the
sense of Blum-Shub-Smale real machines) has been missing so far. In this paper
we formulate and prove a real analogue of Toda's theorem. Unlike Toda's proof
in the discrete case, which relied on sophisticated combinatorial arguments,
our proof is topological in nature. As a consequence of our techniques we are
also able to relate the computational hardness of two extremely well-studied
problems in algorithmic semi-algebraic geometry -- namely the problem of
deciding sentences in the first order theory of the reals with a constant
number of quantifier alternations, and that of computing Betti numbers of
semi-algebraic sets. We obtain a polynomial time reduction of the compact
version of the first problem to the second. This latter result might be of
independent interest to researchers in algorithmic semi-algebraic geometry.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 19:09:27 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Apr 2009 18:23:05 GMT"
},
{
"version": "v3",
"created": "Sat, 9 Jan 2010 20:45:52 GMT"
}
]
| 2011-02-02T00:00:00 | [
[
"Basu",
"Saugata",
""
],
[
"Zell",
"Thierry",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0812.1203 | Jamshid Abouei | Jamshid Abouei, Hossein Bagheri, and Amir K. Khandani | An Efficient Adaptive Distributed Space-Time Coding Scheme for
Cooperative Relaying | submitted to IEEE Transactions on Wireless Communications (24 pages) | IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp.
4957-4962, Oct. 2009 | 10.1109/TWC.2009.081615 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A non-regenerative dual-hop wireless system based on a distributed space-time
coding strategy is considered. It is assumed that each relay retransmits an
appropriately scaled space-time coded version of its received signal. The main
goal of this paper is to investigate a power allocation strategy in relay
stations, which is based on minimizing the outage probability. In the high
signal-to-noise ratio regime for the relay-destination link, it is shown that a
threshold-based power allocation scheme (i.e., the relay remains silent if its
channel gain with the source is less than a prespecified threshold) is optimum.
Monte-Carlo simulations show that the derived on-off power allocation scheme
performs close to optimum for finite signal-to-noise ratio values. Numerical
results demonstrate a dramatic improvement in system performance as compared to
the case that the relay stations forward their received signals with full
power. In addition, a hybrid amplify-and-forward/detect-and-forward scheme is
proposed for the case that the quality of the source-relay link is good.
Finally, the robustness of the proposed scheme in the presence of channel
estimation errors is numerically evaluated.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 19:34:03 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Dec 2008 02:02:57 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Abouei",
"Jamshid",
""
],
[
"Bagheri",
"Hossein",
""
],
[
"Khandani",
"Amir K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1218 | Amos David | Amos David (LORIA) | The Impact of New Technologies in Public Financial Management and
Performance: Agenda for Public Financial Management Reformance in the Context
of Global Best Practices | null | 6th Nigeria Development Forum Retreat (2008) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Information and Communication Technologies (ICT) has practically penetrated
into all spheres of life. Therefore a closer look at the impact of ICT in
public financial management and performance is highly justified. Public finance
is defined as a field of economics concerned with paying for collective or
governmental activities, and with the administration and design of those
activities. Activities will be viewed as services or more precisely as public
services. We believe that there is need to consider performance from the
perspective of effective performance and the perceived performance. In fact the
real or effective performance might not correspond to the perceived
performance. A service can be considered from the perspective of the
decision-maker, who in our case could be a government or a collectivity. ICT
can be employed in the three phases that concern the decision-maker: design,
implementation and evaluation. The beneficiaries of a service can employ ICT in
any of the three phases - awareness, exploitation and assessment - for
guarantying a high level of efficiency. Each phase in the environment of a
service will be presented as well as illustrations of how ICT can be employed
in order to improve the end-result of each one of them. We believe that a high
efficiency of each phase will produce a high global efficiency. It should be
noted however that the effectiveness of any system is highly dependent on the
human engagement in the system. Therefore, the impact of ICT in public
financial management will be felt only if the decision-makers and the end-users
of the services engage themselves in the success of the system. Instead of
giving a catalog of services, the focus has been on the model (or methodology)
to adopt in designing services for which ICT could enhance the implementation.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 20:49:47 GMT"
}
]
| 2008-12-08T00:00:00 | [
[
"David",
"Amos",
"",
"LORIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0812.1244 | Fangwen Fu | Fangwen Fu, Mihaela van der Schaar | Decomposition Principles and Online Learning in Cross-Layer Optimization
for Delay-Sensitive Applications | 30 pages, 10 figures | null | null | null | cs.MM cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a general cross-layer optimization framework in
which we explicitly consider both the heterogeneous and dynamically changing
characteristics of delay-sensitive applications and the underlying time-varying
network conditions. We consider both the independently decodable data units
(DUs, e.g. packets) and the interdependent DUs whose dependencies are captured
by a directed acyclic graph (DAG). We first formulate the cross-layer design as
a non-linear constrained optimization problem by assuming complete knowledge of
the application characteristics and the underlying network conditions. The
constrained cross-layer optimization is decomposed into several cross-layer
optimization subproblems for each DU and two master problems. The proposed
decomposition method determines the necessary message exchanges between layers
for achieving the optimal cross-layer solution. However, the attributes (e.g.
distortion impact, delay deadline etc) of future DUs as well as the network
conditions are often unknown in the considered real-time applications. The
impact of current cross-layer actions on the future DUs can be characterized by
a state-value function in the Markov decision process (MDP) framework. Based on
the dynamic programming solution to the MDP, we develop a low-complexity
cross-layer optimization algorithm using online learning for each DU
transmission. This online algorithm can be implemented in real-time in order to
cope with unknown source characteristics, network dynamics and resource
constraints. Our numerical results demonstrate the efficiency of the proposed
online algorithm.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2008 23:14:41 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Fu",
"Fangwen",
""
],
[
"van der Schaar",
"Mihaela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.1291 | Anthony Widjaja To | Anthony Widjaja To | Unary finite automata vs. arithmetic progressions | Journal paper submitted | null | null | null | cs.CC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We point out a subtle error in the proof of Chrobak's theorem that every
unary NFA can be represented as a union of arithmetic progressions that is at
most quadratically large. We propose a correction for this and show how
Martinez's polynomial time algorithm, which realizes Chrobak's theorem, can be
made correct accordingly. We also show that Martinez's algorithm cannot be
improved to have logarithmic space, unless L = NL.
| [
{
"version": "v1",
"created": "Sat, 6 Dec 2008 14:18:05 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"To",
"Anthony Widjaja",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0812.1321 | Aleksandrs Slivkins | Matthew Andrews and Aleksandrs Slivkins | Oscillations with TCP-like Flow Control in Networks of Queues | Preliminary version has appeared in IEEE INFOCOM 2006. The current
version is dated November 2005, with a minor revision in December 2008 | null | null | null | cs.NI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a set of flows passing through a set of servers. The injection
rate into each flow is governed by a flow control that increases the injection
rate when all the servers on the flow's path are empty and decreases the
injection rate when some server is congested. We show that if each server's
congestion is governed by the arriving traffic at the server then the system
can *oscillate*. This is in contrast to previous work on flow control where
congestion was modeled as a function of the flow injection rates and the system
was shown to converge to a steady state that maximizes an overall network
utility.
| [
{
"version": "v1",
"created": "Sat, 6 Dec 2008 23:57:44 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Andrews",
"Matthew",
""
],
[
"Slivkins",
"Aleksandrs",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.1340 | Baris Baykant Alagoz | B. Baykant Alagoz | Obtaining Depth Maps From Color Images By Region Based Stereo Matching
Algorithms | New figures were added | OncuBilim Algorithm And Systems Labs. Vol.08, Art.No:04,(2008) | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the paper, region based stereo matching algorithms are developed for
extraction depth information from two color stereo image pair. A filter
eliminating unreliable disparity estimation was used for increasing reliability
of the disparity map. Obtained results by algorithms were represented and
compared.
| [
{
"version": "v1",
"created": "Sun, 7 Dec 2008 11:42:41 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Feb 2009 16:31:46 GMT"
}
]
| 2009-02-03T00:00:00 | [
[
"Alagoz",
"B. Baykant",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0812.1357 | Qiang Li | Qiang Li, Yan He, Jing-ping Jiang | A Novel Clustering Algorithm Based on Quantum Random Walk | 14 pages, 6 figures, 3 tables | null | null | null | cs.LG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The enormous successes have been made by quantum algorithms during the last
decade. In this paper, we combine the quantum random walk (QRW) with the
problem of data clustering, and develop two clustering algorithms based on the
one dimensional QRW. Then, the probability distributions on the positions
induced by QRW in these algorithms are investigated, which also indicates the
possibility of obtaining better results. Consequently, the experimental results
have demonstrated that data points in datasets are clustered reasonably and
efficiently, and the clustering algorithms are of fast rates of convergence.
Moreover, the comparison with other algorithms also provides an indication of
the effectiveness of the proposed approach.
| [
{
"version": "v1",
"created": "Sun, 7 Dec 2008 15:22:27 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Li",
"Qiang",
""
],
[
"He",
"Yan",
""
],
[
"Jiang",
"Jing-ping",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.1364 | Johann Makowsky | Benny Godlin, Emilia Katz, Johann A. Makowsky | Graph Polynomials: From Recursive Definitions To Subset Expansion
Formulas | 25 pages, 2 figures | Journal of Logic and Computation, Volume 22(2), (2012) Pages
237-265 | null | null | cs.LO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many graph polynomials, such as the Tutte polynomial, the interlace
polynomial and the matching polynomial, have both a recursive definition and a
defining subset expansion formula. In this paper we present a general,
logic-based framework which gives a precise meaning to recursive definitions of
graph polynomials. We then prove that in this framework every recursive
definition of a graph polynomial can be converted into a subset expansion
formula.
| [
{
"version": "v1",
"created": "Sun, 7 Dec 2008 16:50:53 GMT"
}
]
| 2013-09-10T00:00:00 | [
[
"Godlin",
"Benny",
""
],
[
"Katz",
"Emilia",
""
],
[
"Makowsky",
"Johann A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.1379 | Leonid Barenboim | Leonid Barenboim and Michael Elkin | Distributed (Delta + 1)-coloring in linear (in Delta) time | 12 pages, 2 figures. Contents added: pages 11-12 | null | null | null | cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The distributed (Delta + 1)-coloring problem is one of most fundamental and
well-studied problems of Distributed Algorithms. Starting with the work of Cole
and Vishkin in 86, there was a long line of gradually improving algorithms
published. The current state-of-the-art running time is O(Delta log Delta +
log^* n), due to Kuhn and Wattenhofer, PODC'06. Linial (FOCS'87) has proved a
lower bound of 1/2 \log^* n for the problem, and Szegedy and Vishwanathan
(STOC'93) provided a heuristic argument that shows that algorithms from a wide
family of locally iterative algorithms are unlikely to achieve running time
smaller than \Theta(Delta log Delta).
We present a deterministic (Delta + 1)-coloring distributed algorithm with
running time O(Delta) + 1/2 log^* n. We also present a tradeoff between the
running time and the number of colors, and devise an O(Delta * t)-coloring
algorithm with running time O(Delta / t + \log^* n), for any parameter t, 1 < t
< Delta^{1-epsilon}, for an arbitrarily small constant epsilon, 0 < epsilon <
1.
On the way to this result we study a generalization of the notion of graph
coloring, which is called defective coloring. In an m-defective p-coloring the
vertices are colored with p colors so that each vertex has up to m neighbors
with the same color. We show that an m-defective p-coloring with reasonably
small m and p can be computed very efficiently. We also develop a technique to
employ multiple defect colorings of various subgraphs of the original graph G
for computing a (Delta+1)-coloring of G. We believe that these techniques are
of independent interest.
| [
{
"version": "v1",
"created": "Sun, 7 Dec 2008 20:44:28 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Dec 2008 10:45:09 GMT"
}
]
| 2008-12-26T00:00:00 | [
[
"Barenboim",
"Leonid",
""
],
[
"Elkin",
"Michael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.1385 | Javaid Aslam | Javaid Aslam | An Extension of the Permutation Group Enumeration Technique (Collapse of
the Polynomial Hierarchy: $\mathbf{NP = P}$) | Revisions: Some re-organization-- created a new Section 5 and minor
revisions | null | null | null | cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The distinguishing result of this paper is a $\mathbf{P}$-time enumerable
partition of all the potential perfect matchings in a bipartite graph. This
partition is a set of equivalence classes induced by the missing edges in the
potential perfect matchings.
We capture the behavior of these missing edges in a polynomially bounded
representation of the exponentially many perfect matchings by a graph theoretic
structure, called MinSet Sequence, where MinSet is a P-time enumerable
structure derived from a graph theoretic counterpart of a generating set of the
symmetric group. This leads to a polynomially bounded generating set of all the
classes, enabling the enumeration of perfect matchings in polynomial time. The
sequential time complexity of this $\mathbf{\#P}$-complete problem is shown to
be $O(n^{45}\log n)$.
And thus we prove a result even more surprising than $\mathbf{NP = P}$, that
is, $\mathbf{\#P}=\mathbf{FP}$, where $\mathbf{FP}$ is the class of functions,
$f: \{0, 1\}^* \rightarrow \mathbb{N} $, computable in polynomial time on a
deterministic model of computation.
| [
{
"version": "v1",
"created": "Sun, 7 Dec 2008 19:47:28 GMT"
},
{
"version": "v10",
"created": "Mon, 30 Mar 2009 19:41:25 GMT"
},
{
"version": "v11",
"created": "Tue, 7 Apr 2009 18:35:11 GMT"
},
{
"version": "v12",
"created": "Mon, 19 Jan 2015 20:21:59 GMT"
},
{
"version": "v13",
"created": "Thu, 22 Jan 2015 20:45:26 GMT"
},
{
"version": "v14",
"created": "Thu, 5 Feb 2015 20:56:47 GMT"
},
{
"version": "v15",
"created": "Sun, 22 Feb 2015 20:36:42 GMT"
},
{
"version": "v16",
"created": "Wed, 15 Jul 2015 18:44:43 GMT"
},
{
"version": "v17",
"created": "Thu, 30 Jul 2015 19:48:56 GMT"
},
{
"version": "v18",
"created": "Thu, 8 Oct 2015 19:04:26 GMT"
},
{
"version": "v19",
"created": "Mon, 12 Oct 2015 19:57:44 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2008 19:30:19 GMT"
},
{
"version": "v20",
"created": "Thu, 15 Oct 2015 19:48:04 GMT"
},
{
"version": "v21",
"created": "Sun, 18 Oct 2015 19:20:04 GMT"
},
{
"version": "v22",
"created": "Sat, 2 Jan 2016 01:31:54 GMT"
},
{
"version": "v23",
"created": "Thu, 3 Mar 2016 20:53:32 GMT"
},
{
"version": "v24",
"created": "Sat, 26 Aug 2017 06:08:03 GMT"
},
{
"version": "v25",
"created": "Sun, 17 Sep 2017 22:52:14 GMT"
},
{
"version": "v26",
"created": "Mon, 30 Oct 2017 08:01:46 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Dec 2008 20:43:33 GMT"
},
{
"version": "v4",
"created": "Mon, 12 Jan 2009 17:03:53 GMT"
},
{
"version": "v5",
"created": "Tue, 20 Jan 2009 21:05:32 GMT"
},
{
"version": "v6",
"created": "Mon, 26 Jan 2009 20:56:54 GMT"
},
{
"version": "v7",
"created": "Wed, 28 Jan 2009 20:50:44 GMT"
},
{
"version": "v8",
"created": "Fri, 6 Feb 2009 20:43:25 GMT"
},
{
"version": "v9",
"created": "Mon, 9 Mar 2009 18:58:19 GMT"
}
]
| 2017-10-31T00:00:00 | [
[
"Aslam",
"Javaid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.1390 | Frederic Chazal | Fr\'ed\'eric Chazal (INRIA Sophia Antipolis, INRIA Sophia Antipolis /
INRIA Futurs), David Cohen-Steiner (INRIA Sophia Antipolis, INRIA Sophia
Antipolis / INRIA Futurs), Andr\'e Lieutier (LJK), Boris Thibert (LJK, LMC -
IMAG) | Stability of Curvature Measures | null | null | null | RR-6756 | cs.CG math.DG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of curvature estimation from sampled compact sets. The
main contribution is a stability result: we show that the gaussian, mean or
anisotropic curvature measures of the offset of a compact set K with positive
$\mu$-reach can be estimated by the same curvature measures of the offset of a
compact set K' close to K in the Hausdorff sense. We show how these curvature
measures can be computed for finite unions of balls. The curvature measures of
the offset of a compact set with positive $\mu$-reach can thus be approximated
by the curvature measures of the offset of a point-cloud sample. These results
can also be interpreted as a framework for an effective and robust notion of
curvature.
| [
{
"version": "v1",
"created": "Sun, 7 Dec 2008 19:58:52 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Chazal",
"Frédéric",
"",
"INRIA Sophia Antipolis, INRIA Sophia Antipolis /\n INRIA Futurs"
],
[
"Cohen-Steiner",
"David",
"",
"INRIA Sophia Antipolis, INRIA Sophia\n Antipolis / INRIA Futurs"
],
[
"Lieutier",
"André",
"",
"LJK"
],
[
"Thibert",
"Boris",
"",
"LJK, LMC -\n IMAG"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
}
]
|
0812.1394 | Sahbi Sidhom | Sahbi Sidhom (LORIA, Sii) | Conceptual approach through an annotation process for the representation
and the information contents enhancement in economic intelligence (EI) | null | Journal of Global Management Research (2008) 15 pages | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the era of the information society, the impact of the information systems
on the economy of material and immaterial is certainly perceptible. With
regards to the information resources of an organization, the annotation
involved to enrich informational content, to track the intellectual activities
on a document and to set the added value on information for the benefit of
solving a decision-making problem in the context of economic intelligence. Our
contribution is distinguished by the representation of an annotation process
and its inherent concepts to lead the decisionmaker to an anticipated decision:
the provision of relevant and annotated information. Such information in the
system is made easy by taking into account the diversity of resources and those
that are well annotated so formally and informally by the EI actors. A capital
research framework consist of integrating in the decision-making process the
annotator activity, the software agent (or the reasoning mechanisms) and the
information resources enhancement.
| [
{
"version": "v1",
"created": "Sun, 7 Dec 2008 20:07:37 GMT"
}
]
| 2008-12-10T00:00:00 | [
[
"Sidhom",
"Sahbi",
"",
"LORIA, Sii"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0812.1405 | Stefan Geirhofer | Stefan Geirhofer, Lang Tong, and Brian M. Sadler | Cognitive Coexistence between Infrastructure and Ad-hoc Systems | Submitted to IEEE Transactions on Wireless Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rapid proliferation of wireless systems makes interference management
more and more important. This paper presents a novel cognitive coexistence
framework, which enables an infrastructure system to reduce interference to
ad-hoc or peer-to-peer communication links in close proximity. Motivated by the
superior resources of the infrastructure system, we study how its centralized
resource allocation can accommodate the ad-hoc links based on sensing and
predicting their interference patterns.
Based on an ON/OFF continuous-time Markov chain model, the optimal allocation
of power and transmission time is formulated as a convex optimization problem
and closed-form solutions are derived. The optimal scheduling is extended to
the case where the infrastructure channel is random and rate constraints need
only be met in the long-term average. Finally, the multi-terminal case is
addressed and the problem of optimal sub-channel allocation discussed.
Numerical performance analysis illustrates that utilizing the superior
flexibility of the infrastructure links can effectively mitigate interference.
| [
{
"version": "v1",
"created": "Sun, 7 Dec 2008 22:49:12 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Geirhofer",
"Stefan",
""
],
[
"Tong",
"Lang",
""
],
[
"Sadler",
"Brian M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1462 | Paolo Ferraris | Paolo Ferraris | Logic programs with propositional connectives and aggregates | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Answer set programming (ASP) is a logic programming paradigm that can be used
to solve complex combinatorial search problems. Aggregates are an ASP construct
that plays an important role in many applications. Defining a satisfactory
semantics of aggregates turned out to be a difficult problem, and in this paper
we propose a new approach, based on an analogy between aggregates and
propositional connectives. First, we extend the definition of an answer
set/stable model to cover arbitrary propositional theories; then we define
aggregates on top of them both as primitive constructs and as abbreviations for
formulas. Our definition of an aggregate combines expressiveness and
simplicity, and it inherits many theorems about programs with nested
expressions, such as theorems about strong equivalence and splitting.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2008 11:09:14 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Ferraris",
"Paolo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.1553 | Mustafa Cenk Gursoy | Mustafa Cenk Gursoy, Deli Qiao, and Senem Velipasalar | Analysis of Energy Efficiency in Fading Channels under QoS Constraints | conference version appeared at Globecom 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Energy efficiency in fading channels in the presence of Quality of Service
(QoS) constraints is studied. Effective capacity, which provides the maximum
arrival rate that a wireless channel can sustain while satisfying statistical
QoS constraints, is considered. Spectral efficiency--bit energy tradeoff is
analyzed in the low-power and wideband regimes by employing the effective
capacity formulation, rather than the Shannon capacity. Through this analysis,
energy requirements under QoS constraints are identified. The analysis is
conducted under two assumptions: perfect channel side information (CSI)
available only at the receiver and perfect CSI available at both the receiver
and transmitter. In particular, it is shown in the low-power regime that the
minimum bit energy required under QoS constraints is the same as that attained
when there are no such limitations. However, this performance is achieved as
the transmitted power vanishes. Through the wideband slope analysis, the
increased energy requirements at low but nonzero power levels in the presence
of QoS constraints are determined. A similar analysis is also conducted in the
wideband regime, and minimum bit energy and wideband slope expressions are
obtained. In this regime, the required bit energy levels are found to be
strictly greater than those achieved when Shannon capacity is considered.
Overall, a characterization of the energy-bandwidth-delay tradeoff is provided.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2008 20:34:54 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Gursoy",
"Mustafa Cenk",
""
],
[
"Qiao",
"Deli",
""
],
[
"Velipasalar",
"Senem",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1554 | Andrew Eckford | Andrew W. Eckford | Molecular communication: Physically realistic models and achievable
information rates | Submitted to IEEE Transactions on Information Theory. 28 pages, 8
figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Molecular communication is a biologically-inspired method of communication
with attractive properties for microscale and nanoscale devices. In molecular
communication, messages are transmitted by releasing a pattern of molecules at
a transmitter, which propagate through a fluid medium towards a receiver. In
this paper, molecular communication is formulated as a mathematical
communication problem in an information-theoretic context. Physically realistic
models are obtained, with sufficient abstraction to allow manipulation by
communication and information theorists. Although mutual information in these
channels is intractable, we give sequences of upper and lower bounds on the
mutual information which trade off complexity and performance, and present
results to illustrate the feasibility of these bounds in estimating the true
mutual information.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2008 20:41:02 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Eckford",
"Andrew W.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1557 | Mustafa Cenk Gursoy | Junwei Zhang and Mustafa Cenk Gursoy | To Cooperate, or Not to Cooperate in Imperfectly-Known Fading Channels | appeared at IEEE SPAWC 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, communication over imperfectly-known fading channels with
different degrees of cooperation is studied. The three-node relay channel is
considered. It is assumed that communication starts with the network training
phase in which the receivers estimate the fading coefficients of their
respective channels. In the data transmission phase, amplify-and-forward and
decode-and-forward relaying schemes are employed. For different cooperation
protocols, achievable rate expressions are obtained. These achievable rate
expressions are then used to find the optimal resource allocation strategies.
In particular, the fraction of total time or bandwidth that needs to be
allocated to the relay for best performance is identified. Under a total power
constraint, optimal allocation of power between the source and relay is
investigated. Finally, bit energy requirements in the low-power regime are
studied.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2008 20:49:30 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Zhang",
"Junwei",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1558 | Mustafa Cenk Gursoy | Sami Akin and Mustafa Cenk Gursoy | Pilot-Symbol-Assisted Communications with Noncausal and Causal Wiener
Filters | appeared at IEEE SPAWC 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, pilot-assisted transmission over time-selective flat fading
channels is studied. It is assumed that noncausal and causal Wiener filters are
employed at the receiver to perform channel estimation with the aid of training
symbols sent periodically by the transmitter. For both filters, the variances
of estimate errors are obtained from the Doppler power spectrum of the channel.
Subsequently, achievable rate expressions are provided. The training period,
and data and training power allocations are jointly optimized by maximizing the
achievable rate expressions. Numerical results are obtained by modeling the
fading as a Gauss-Markov process. The achievable rates of causal and noncausal
filtering approaches are compared. For the particular ranges of parameters
considered in the paper, the performance loss incurred by using a causal filter
as opposed to a noncausal filter is shown to be small. The impact of aliasing
that occurs in the undersampled version of the channel Doppler spectrum due to
fast fading is analyzed. Finally, energy-per-bit requirements are investigated
in the presence of noncausal and causal Wiener filters.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2008 20:54:32 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Akin",
"Sami",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1560 | Mustafa Cenk Gursoy | Sami Akin and Mustafa Cenk Gursoy | Achievable Rates and Training Optimization for Fading Relay Channels
with Memory | appeared at CISS 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, transmission over time-selective, flat fading relay channels
is studied. It is assumed that channel fading coefficients are not known a
priori. Transmission takes place in two phases: network training phase and data
transmission phase. In the training phase, pilot symbols are sent and the
receivers employ single-pilot MMSE estimation or noncausal Wiener filter to
learn the channel. Amplify-and-Forward (AF) and Decode-and-Forward (DF)
techniques are considered in the data transmission phase and achievable rate
expressions are obtained. The training period, and data and training power
allocations are jointly optimized by using the achievable rate expressions.
Numerical results are obtained considering Gauss-Markov and lowpass fading
models. Achievable rates are computed and energy-per-bit requirements are
investigated. The optimal power distributions among pilot and data symbols are
provided.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2008 20:59:12 GMT"
}
]
| 2008-12-09T00:00:00 | [
[
"Akin",
"Sami",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1587 | Radu Mihaescu | Radu Mihaescu, Cameron Hill, Satish Rao | Fast phylogeny reconstruction through learning of ancestral sequences | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given natural limitations on the length DNA sequences, designing phylogenetic
reconstruction methods which are reliable under limited information is a
crucial endeavor. There have been two approaches to this problem:
reconstructing partial but reliable information about the tree (\cite{Mo07,
DMR08,DHJ06,GMS08}), and reaching "deeper" in the tree through reconstruction
of ancestral sequences. In the latter category, \cite{DMR06} settled an
important conjecture of M.Steel, showing that, under the CFN model of
evolution, all trees on $n$ leaves with edge lengths bounded by the Ising model
phase transition can be recovered with high probability from genomes of length
$O(\log n)$ with a polynomial time algorithm. Their methods had a running time
of $O(n^{10})$.
Here we enhance our methods from \cite{DHJ06} with the learning of ancestral
sequences and provide an algorithm for reconstructing a sub-forest of the tree
which is reliable given available data, without requiring a-priori known bounds
on the edge lengths of the tree. Our methods are based on an intuitive minimum
spanning tree approach and run in $O(n^3)$ time. For the case of full
reconstruction of trees with edges under the phase transition, we maintain the
same sequence length requirements as \cite{DMR06}, despite the considerably
faster running time.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2008 22:51:02 GMT"
}
]
| 2008-12-10T00:00:00 | [
[
"Mihaescu",
"Radu",
""
],
[
"Hill",
"Cameron",
""
],
[
"Rao",
"Satish",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.1595 | Aparna Das | Aparna Das, Claire Mathieu | A quasi-polynomial time approximation scheme for Euclidean capacitated
vehicle routing | null | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the capacitated vehicle routing problem, introduced by Dantzig and Ramser
in 1959, we are given the locations of n customers and a depot, along with a
vehicle of capacity k, and wish to find a minimum length collection of tours,
each starting from the depot and visiting at most k customers, whose union
covers all the customers. We give a quasi-polynomial time approximation scheme
for the setting where the customers and the depot are on the plane, and
distances are given by the Euclidean metric.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2008 23:58:17 GMT"
}
]
| 2008-12-10T00:00:00 | [
[
"Das",
"Aparna",
""
],
[
"Mathieu",
"Claire",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.1597 | Soheil Mohajer | Soheil Mohajer, Suhas N. Diggavi, Christina Fragouli, David N. C. Tse | Transmission Techniques for Relay-Interference Networks | 8 pages, 8 figures, presented at 46. Allerton Conf. On Comm.,
Control, and Computing 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study the relay-interference wireless network, in which
relay (helper) nodes are to facilitate competing information flows over a
wireless network. We examine this in the context of a deterministic wireless
interaction model, which eliminates the channel noise and focuses on the signal
interactions. Using this model, we show that almost all the known schemes such
as interference suppression, interference alignment and interference separation
are necessary for relay-interference networks. In addition, we discover a new
interference management technique, which we call interference neutralization,
which allows for over-the-air interference removal, without the transmitters
having complete access the interfering signals. We show that interference
separation, suppression, and neutralization arise in a fundamental manner,
since we show complete characterizations for special configurations of the
relay-interference network.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2008 00:20:30 GMT"
}
]
| 2008-12-10T00:00:00 | [
[
"Mohajer",
"Soheil",
""
],
[
"Diggavi",
"Suhas N.",
""
],
[
"Fragouli",
"Christina",
""
],
[
"Tse",
"David N. C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1599 | Jake Ellowitz | Jake Ellowitz | Multi-Agent Reinforcement Learning and Genetic Policy Sharing | 7 pages, 11 figures | null | null | null | cs.MA cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The effects of policy sharing between agents in a multi-agent dynamical
system has not been studied extensively. I simulate a system of agents
optimizing the same task using reinforcement learning, to study the effects of
different population densities and policy sharing. I demonstrate that sharing
policies decreases the time to reach asymptotic behavior, and results in
improved asymptotic behavior.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2008 16:13:33 GMT"
}
]
| 2008-12-10T00:00:00 | [
[
"Ellowitz",
"Jake",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.1601 | Shiva Kintali | Shiva Kintali | Scarf is Ppad-Complete | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scarf's lemma is one of the fundamental results in combinatorics, originally
introduced to study the core of an N-person game. Over the last four decades,
the usefulness of Scarf's lemma has been demonstrated in several important
combinatorial problems seeking "stable" solutions. However, the complexity of
the computational version of Scarf's lemma (SCARF) remained open. In this
paper, we prove that SCARF is complete for the complexity class PPAD. This
proves that SCARF is as hard as the computational versions of Brouwer's fixed
point theorem and Sperner's lemma. Hence, there is no polynomial-time algorithm
for SCARF unless PPAD \subseteq P. We also show that fractional stable paths
problem and finding strong fractional kernels in digraphs are PPAD-hard.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2008 01:07:25 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Dec 2008 00:22:16 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Feb 2009 12:43:25 GMT"
},
{
"version": "v4",
"created": "Sun, 3 May 2009 22:08:14 GMT"
}
]
| 2009-05-04T00:00:00 | [
[
"Kintali",
"Shiva",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0812.1628 | Masoud Farivar | Masoud Farivar, Behzad Mehrdad, Farid Ashtiani | Two Dimensional Connectivity for Vehicular Ad-Hoc Networks | 9 Pages, 10 figures,Submitted to INFOCOM 2009 | null | null | null | cs.NI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we focus on two-dimensional connectivity in sparse vehicular
ad hoc networks (VANETs). In this respect, we find thresholds for the arrival
rates of vehicles at entrances of a block of streets such that the connectivity
is guaranteed for any desired probability. To this end, we exploit a mobility
model recently proposed for sparse VANETs, based on BCMP open queuing networks
and solve the related traffic equations to find the traffic characteristics of
each street and use the results to compute the exact probability of
connectivity along these streets. Then, we use the results from percolation
theory and the proposed fast algorithms for evaluation of bond percolation
problem in a random graph corresponding to the block of the streets. We then
find sufficiently accurate two dimensional connectivity-related parameters,
such as the average number of intersections connected to each other and the
size of the largest set of inter-connected intersections. We have also proposed
lower bounds for the case of heterogeneous network with two transmission
ranges. In the last part of the paper, we apply our method to several numerical
examples and confirm our results by simulations.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2008 07:16:10 GMT"
}
]
| 2008-12-10T00:00:00 | [
[
"Farivar",
"Masoud",
""
],
[
"Mehrdad",
"Behzad",
""
],
[
"Ashtiani",
"Farid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.1629 | A. Caranti | A. Caranti, F. Dalla Volta, M. Sala | An application of the O'Nan-Scott theorem to the group generated by the
round functions of an AES-like cipher | 10 pages: several improvements in exposition and content, including
ruling out the symmetric group 9 pages; several changes in layout and
exposition | Design, Codes and Cryptography, 2009, vol. 52, p. 293-301 | null | null | math.GR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a previous paper, we had proved that the permutation group generated by
the round functions of an AES-like cipher is primitive. Here we apply the O'Nan
Scott classification of primitive groups to prove that this group is the
alternating group.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2008 15:36:14 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jan 2009 08:47:09 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Feb 2009 12:02:14 GMT"
},
{
"version": "v4",
"created": "Wed, 18 Mar 2009 12:24:48 GMT"
}
]
| 2016-04-01T00:00:00 | [
[
"Caranti",
"A.",
""
],
[
"Volta",
"F. Dalla",
""
],
[
"Sala",
"M.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1633 | Giovanni Bussi | Giovanni Bussi | A simple asynchronous replica-exchange implementation | Preprint of Proceeding for CSFI 2008 | G. Bussi, Nuovo Cimento Soc. Ital. Fis., C 32, 61 (2009) | 10.1393/ncc/i2009-10369-8 | null | physics.comp-ph cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss the possibility of implementing asynchronous replica-exchange (or
parallel tempering) molecular dynamics. In our scheme, the exchange attempts
are driven by asynchronous messages sent by one of the computing nodes, so that
different replicas are allowed to perform a different number of time-steps
between subsequent attempts. The implementation is simple and based on the
message-passing interface (MPI). We illustrate the advantages of our scheme
with respect to the standard synchronous algorithm and we benchmark it for a
model Lennard-Jones liquid on an IBM-LS21 blade center cluster.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2008 18:39:58 GMT"
}
]
| 2009-11-23T00:00:00 | [
[
"Bussi",
"Giovanni",
""
]
]
| [
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0812.1647 | Jean-Dominique Gascuel | David Vanderhaeghe (INRIA Rh\^one-Alpes / LJK Laboratoire Jean
Kuntzmann, LJK), Victor Ostromoukhov (DIRO) | Polyomino-Based Digital Halftoning | http://artis.imag.fr/Publications/2008/VO08/ | IADIS International Conference on Computer Graphics and
Visualization 2008 (2008) | null | null | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we present a new method for generating a threshold structure.
This kind of structure can be advantageously used in various halftoning
algorithms such as clustered-dot or dispersed-dot dithering, error diffusion
with threshold modulation, etc. The proposed method is based on rectifiable
polyominoes -- a non-periodic hierarchical structure, which tiles the Euclidean
plane with no gaps. Each polyomino contains a fixed number of discrete
threshold values. Thanks to its inherent non-periodic nature combined with
off-line optimization of threshold values, our polyomino-based threshold
structure shows blue-noise spectral properties. The halftone images produced
with this threshold structure have high visual quality. Although the proposed
method is general, and can be applied on any polyomino tiling, we consider one
particular case: tiling with G-hexominoes. We compare our polyomino-based
threshold structure with the best known state-of-the-art methods for generation
threshold matrices, and conclude considerable improvement achieved with our
method.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2008 10:12:36 GMT"
}
]
| 2008-12-10T00:00:00 | [
[
"Vanderhaeghe",
"David",
"",
"INRIA Rhône-Alpes / LJK Laboratoire Jean\n Kuntzmann, LJK"
],
[
"Ostromoukhov",
"Victor",
"",
"DIRO"
]
]
| [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
]
|
0812.1713 | Deniz Gunduz | Deniz Gunduz, D. Richard Brown III, H. Vincent Poor | Secret Communication with Feedback | Presented at the IEEE Int'l Symposium on Information Theory and its
Applications (ISITA), Auckland, New Zealand, December 2008 | null | 10.1109/ISITA.2008.4895417 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Secure communication with feedback is studied. An achievability scheme in
which the backward channel is used to generate a shared secret key is proposed.
The scenario of binary symmetric forward and backward channels is considered,
and a combination of the proposed scheme and Maurer's coding scheme is shown to
achieve improved secrecy rates. The scenario of a Gaussian channel with perfect
output feedback is also analyzed and the Schalkwijk-Kailath coding scheme is
shown to achieve the secrecy capacity for this channel.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2008 20:56:54 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Gunduz",
"Deniz",
""
],
[
"Brown",
"D. Richard",
"III"
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1729 | Filip Murlak | Filip Murlak | The Wadge Hierarchy of Deterministic Tree Languages | 44 pages, 8 figures; extended abstract presented at ICALP 2006,
Venice, Italy; full version appears in LMCS special issue | Logical Methods in Computer Science, Volume 4, Issue 4 (December
23, 2008) lmcs:994 | 10.2168/LMCS-4(4:15)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a complete description of the Wadge hierarchy for
deterministically recognisable sets of infinite trees. In particular we give an
elementary procedure to decide if one deterministic tree language is
continuously reducible to another. This extends Wagner's results on the
hierarchy of omega-regular languages of words to the case of trees.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2008 16:14:05 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Dec 2008 22:12:11 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Murlak",
"Filip",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0812.1778 | Mustafa Cenk Gursoy | Deli Qiao, Mustafa Cenk Gursoy, and Senem Velipasalar | The Impact of QoS Constraints on the Energy Efficiency of Fixed-Rate
Wireless Transmissions | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transmission over wireless fading channels under quality of service (QoS)
constraints is studied when only the receiver has channel side information.
Being unaware of the channel conditions, transmitter is assumed to send the
information at a fixed rate. Under these assumptions, a two-state (ON-OFF)
transmission model is adopted, where information is transmitted reliably at a
fixed rate in the ON state while no reliable transmission occurs in the OFF
state. QoS limitations are imposed as constraints on buffer violation
probabilities, and effective capacity formulation is used to identify the
maximum throughput that a wireless channel can sustain while satisfying
statistical QoS constraints. Energy efficiency is investigated by obtaining the
bit energy required at zero spectral efficiency and the wideband slope in both
wideband and low-power regimes assuming that the receiver has perfect channel
side information (CSI). In both wideband and low-power regimes, the increased
energy requirements due to the presence of QoS constraints are quantified.
Comparisons with variable-rate/fixed-power and variable-rate/variable-power
cases are given. Energy efficiency is further analyzed in the presence of
channel uncertainties. The optimal fraction of power allocated to training is
identified under QoS constraints. It is proven that the minimum bit energy in
the low-power regime is attained at a certain nonzero power level below which
bit energy increases without bound with vanishing power.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2008 19:30:52 GMT"
}
]
| 2008-12-10T00:00:00 | [
[
"Qiao",
"Deli",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
],
[
"Velipasalar",
"Senem",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1780 | Mustafa Cenk Gursoy | Mustafa Cenk Gursoy | On the Energy Efficiency of Orthogonal Signaling | appeared at ISIT 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, transmission over the additive white Gaussian noise (AWGN)
channel, and coherent and noncoherent fading channels using M-ary orthogonal
frequency-shift keying (FSK) or on-off frequency-shift keying (OOFSK) is
considered. The receiver is assumed to perform hard-decision detection. In this
setting, energy required to reliably send one bit of information is
investigated. It is shown that for fixed M and duty cycle, bit energy
requirements grow without bound as the signal-to-noise ratio (SNR) vanishes.
The minimum bit energy values are numerically obtained for different values of
M and the duty cycle. The impact of fading on the energy efficiency is
identified. Requirements to approach the minimum bit energy of -1.59 dB are
determined.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2008 19:41:39 GMT"
}
]
| 2008-12-10T00:00:00 | [
[
"Gursoy",
"Mustafa Cenk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1811 | Jean-Charles Delvenne | J.-C. Delvenne, S.N. Yaliraki, and M. Barahona | Stability of graph communities across time scales | submitted; updated bibliography from v3 | null | null | null | physics.soc-ph cs.IR physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The complexity of biological, social and engineering networks makes it
desirable to find natural partitions into communities that can act as
simplified descriptions and provide insight into the structure and function of
the overall system. Although community detection methods abound, there is a
lack of consensus on how to quantify and rank the quality of partitions. We
show here that the quality of a partition can be measured in terms of its
stability, defined in terms of the clustered autocovariance of a Markov process
taking place on the graph. Because the stability has an intrinsic dependence on
time scales of the graph, it allows us to compare and rank partitions at each
time and also to establish the time spans over which partitions are optimal.
Hence the Markov time acts effectively as an intrinsic resolution parameter
that establishes a hierarchy of increasingly coarser clusterings. Within our
framework we can then provide a unifying view of several standard partitioning
measures: modularity and normalized cut size can be interpreted as one-step
time measures, whereas Fiedler's spectral clustering emerges at long times. We
apply our method to characterize the relevance and persistence of partitions
over time for constructive and real networks, including hierarchical graphs and
social networks. We also obtain reduced descriptions for atomic level protein
structures over different time scales.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2008 22:32:02 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Dec 2008 17:42:06 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Dec 2008 15:49:36 GMT"
},
{
"version": "v4",
"created": "Wed, 11 Mar 2009 15:26:15 GMT"
}
]
| 2013-09-18T00:00:00 | [
[
"Delvenne",
"J. -C.",
""
],
[
"Yaliraki",
"S. N.",
""
],
[
"Barahona",
"M.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0812.1843 | N. Arvind Kumar | N. Arvind Kumar | Identification of parameters underlying emotions and a classification of
emotions | 6 pages | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The standard classification of emotions involves categorizing the expression
of emotions. In this paper, parameters underlying some emotions are identified
and a new classification based on these parameters is suggested.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2008 19:02:31 GMT"
}
]
| 2008-12-11T00:00:00 | [
[
"Kumar",
"N. Arvind",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.