id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0812.0038
Liang-Liang Xie
Liang-Liang Xie
Omnidirectional Relay in Wireless Networks
Revised
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For wireless networks with multiple sources, an omnidirectional relay scheme is developed, where each node can simultaneously relay different messages in different directions. This is accomplished by the decode-and-forward relay strategy, with each relay binning the multiple messages to be transmitted, in the same spirit of network coding. Specially for the all-source all-cast problem, where each node is an independent source to be transmitted to all the other nodes, this scheme completely eliminates interference in the whole network, and the signal transmitted by any node can be used by any other node. For networks with some kind of symmetry, assuming no beamforming is to be performed, this omnidirectional relay scheme is capable of achieving the maximum achievable rate.
[ { "version": "v1", "created": "Sat, 29 Nov 2008 01:04:30 GMT" }, { "version": "v2", "created": "Sun, 14 Nov 2010 21:53:09 GMT" } ]
2010-11-16T00:00:00
[ [ "Xie", "Liang-Liang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.0067
Bernard Mourrain
Bernard Mourrain (INRIA Sophia Antipolis), Philippe Tr\'ebuchet (LIP6)
Stable normal forms for polynomial system solving
null
Theoretical Computer Science 409, 2 (2008) 229-240
10.1016/j.tcs.2008.09.004
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes and analyzes a method for computing border bases of a zero-dimensional ideal $I$. The criterion used in the computation involves specific commutation polynomials and leads to an algorithm and an implementation extending the one provided in [MT'05]. This general border basis algorithm weakens the monomial ordering requirement for \grob bases computations. It is up to date the most general setting for representing quotient algebras, embedding into a single formalism Gr\"obner bases, Macaulay bases and new representation that do not fit into the previous categories. With this formalism we show how the syzygies of the border basis are generated by commutation relations. We also show that our construction of normal form is stable under small perturbations of the ideal, if the number of solutions remains constant. This new feature for a symbolic algorithm has a huge impact on the practical efficiency as it is illustrated by the experiments on classical benchmark polynomial systems, at the end of the paper.
[ { "version": "v1", "created": "Sat, 29 Nov 2008 11:26:50 GMT" } ]
2008-12-02T00:00:00
[ [ "Mourrain", "Bernard", "", "INRIA Sophia Antipolis" ], [ "Trébuchet", "Philippe", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0812.0070
L.T. Handoko
I. Firmansyah, Z. Akbar, B. Hermanto and L.T. Handoko
An Integrated Software-based Solution for Modular and Self-independent Networked Robot
9 pages, Proceeding of the 10th International Conference on Control, Automation, Robotics and Vision
null
10.1109/ICARCV.2008.4795695
FISIKALIPI-08078
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An integrated software-based solution for a modular and self-independent networked robot is introduced. The wirelessly operatable robot has been developed mainly for autonomous monitoring works with full control over web. The integrated software solution covers three components : a) the digital signal processing unit for data retrieval and monitoring system; b) the externally executable codes for control system; and c) the web programming for interfacing the end-users with the robot. It is argued that this integrated software-based approach is crucial to realize a flexible, modular and low development cost mobile monitoring apparatus.
[ { "version": "v1", "created": "Sat, 29 Nov 2008 12:52:54 GMT" } ]
2009-03-06T00:00:00
[ [ "Firmansyah", "I.", "" ], [ "Akbar", "Z.", "" ], [ "Hermanto", "B.", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0812.0088
Bernard Mourrain
Itnuit Janovitz-Freireich, Agnes Szanto, Bernard Mourrain (INRIA Sophia Antipolis), Lajos Ronyai
Moment matrices, trace matrices and the radical of ideals
null
nternational Conference on Symbolic and Algebraic Computation (2008) 125-132
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $f_1,...,f_s \in \mathbb{K}[x_1,...,x_m]$ be a system of polynomials generating a zero-dimensional ideal $\I$, where $\mathbb{K}$ is an arbitrary algebraically closed field. Assume that the factor algebra $\A=\mathbb{K}[x_1,...,x_m]/\I$ is Gorenstein and that we have a bound $\delta>0$ such that a basis for $\A$ can be computed from multiples of $f_1,...,f_s$ of degrees at most $\delta$. We propose a method using Sylvester or Macaulay type resultant matrices of $f_1,...,f_s$ and $J$, where $J$ is a polynomial of degree $\delta$ generalizing the Jacobian, to compute moment matrices, and in particular matrices of traces for $\A$. These matrices of traces in turn allow us to compute a system of multiplication matrices $\{M_{x_i}|i=1,...,m\}$ of the radical $\sqrt{\I}$, following the approach in the previous work by Janovitz-Freireich, R\'{o}nyai and Sz\'ant\'o. Additionally, we give bounds for $\delta$ for the case when $\I$ has finitely many projective roots in $\mathbb{P}^m_\CC$.
[ { "version": "v1", "created": "Sat, 29 Nov 2008 16:14:07 GMT" } ]
2009-01-23T00:00:00
[ [ "Janovitz-Freireich", "Itnuit", "", "INRIA\n Sophia Antipolis" ], [ "Szanto", "Agnes", "", "INRIA\n Sophia Antipolis" ], [ "Mourrain", "Bernard", "", "INRIA\n Sophia Antipolis" ], [ "Ronyai", "Lajos", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0812.0146
Vladimir Pestov
Vladimir Pestov
Lower Bounds on Performance of Metric Tree Indexing Schemes for Exact Similarity Search in High Dimensions
21 pages, revised submission to Algorithmica, an improved and extended journal version of the conference paper arXiv:0812.0146v3 [cs.DS], with lower bounds strengthened, and the proof of the main Theorem 4 simplified
Algorithmica 66 (2013), 310-328
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Within a mathematically rigorous model, we analyse the curse of dimensionality for deterministic exact similarity search in the context of popular indexing schemes: metric trees. The datasets $X$ are sampled randomly from a domain $\Omega$, equipped with a distance, $\rho$, and an underlying probability distribution, $\mu$. While performing an asymptotic analysis, we send the intrinsic dimension $d$ of $\Omega$ to infinity, and assume that the size of a dataset, $n$, grows superpolynomially yet subexponentially in $d$. Exact similarity search refers to finding the nearest neighbour in the dataset $X$ to a query point $\omega\in\Omega$, where the query points are subject to the same probability distribution $\mu$ as datapoints. Let $\mathscr F$ denote a class of all 1-Lipschitz functions on $\Omega$ that can be used as decision functions in constructing a hierarchical metric tree indexing scheme. Suppose the VC dimension of the class of all sets $\{\omega\colon f(\omega)\geq a\}$, $a\in\R$ is $o(n^{1/4}/\log^2n)$. (In view of a 1995 result of Goldberg and Jerrum, even a stronger complexity assumption $d^{O(1)}$ is reasonable.) We deduce the $\Omega(n^{1/4})$ lower bound on the expected average case performance of hierarchical metric-tree based indexing schemes for exact similarity search in $(\Omega,X)$. In paricular, this bound is superpolynomial in $d$.
[ { "version": "v1", "created": "Sun, 30 Nov 2008 15:17:22 GMT" }, { "version": "v2", "created": "Fri, 20 Aug 2010 03:42:50 GMT" }, { "version": "v3", "created": "Tue, 10 May 2011 16:17:39 GMT" }, { "version": "v4", "created": "Fri, 24 Feb 2012 18:38:50 GMT" } ]
2013-03-27T00:00:00
[ [ "Pestov", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.0192
Mohamed Hamdy Morsy Osman
Mohamed H. S. Morsy, Mohammad Y. S. Sowailem and Hossam M. H. Shalaby
A Simple Performance Analysis of a Core Node in an Optical Burst Switched Network
This paper has been withdrawn
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn
[ { "version": "v1", "created": "Mon, 1 Dec 2008 00:55:14 GMT" }, { "version": "v2", "created": "Sun, 6 Dec 2009 01:14:22 GMT" } ]
2009-12-07T00:00:00
[ [ "Morsy", "Mohamed H. S.", "" ], [ "Sowailem", "Mohammad Y. S.", "" ], [ "Shalaby", "Hossam M. H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0812.0193
Mohamed Hamdy Morsy Osman
Mohamed Y. S. Sowailem, Mohamed H. S. Morsy and Hossam M. H. Shalaby
Contention Resolution in Optical Burst Switched Networks using Spectral- Amplitude-Coding Optical Code Division Multiple Access
This paper has been withdrawn by the authors
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn by the authors.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 01:02:14 GMT" }, { "version": "v2", "created": "Sun, 6 Dec 2009 01:32:43 GMT" } ]
2009-12-07T00:00:00
[ [ "Sowailem", "Mohamed Y. S.", "" ], [ "Morsy", "Mohamed H. S.", "" ], [ "Shalaby", "Hossam M. H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.0197
Vin de Silva
Gunnar Carlsson, Vin de Silva
Zigzag Persistence
32 pages, 7 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new methodology for studying persistence of topological features across a family of spaces or point-cloud data sets, called zigzag persistence. Building on classical results about quiver representations, zigzag persistence generalises the highly successful theory of persistent homology and addresses several situations which are not covered by that theory. In this paper we develop theoretical and algorithmic foundations with a view towards applications in topological statistics.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 02:08:08 GMT" } ]
2008-12-02T00:00:00
[ [ "Carlsson", "Gunnar", "" ], [ "de Silva", "Vin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0812.0198
Andrea Montanari
Andrea Montanari and Amin Saberi
Convergence to Equilibrium in Local Interaction Games and Ising Models
17 pages, 2 eps figures
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coordination games describe social or economic interactions in which the adoption of a common strategy has a higher payoff. They are classically used to model the spread of conventions, behaviors, and technologies in societies. Here we consider a two-strategies coordination game played asynchronously between the nodes of a network. Agents behave according to a noisy best-response dynamics. It is known that noise removes the degeneracy among equilibria: In the long run, the ``risk-dominant'' behavior spreads throughout the network. Here we consider the problem of computing the typical time scale for the spread of this behavior. In particular, we study its dependence on the network structure and derive a dichotomy between highly-connected, non-local graphs that show slow convergence, and poorly connected, low dimensional graphs that show fast convergence.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 02:16:04 GMT" } ]
2008-12-02T00:00:00
[ [ "Montanari", "Andrea", "" ], [ "Saberi", "Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.0209
Qin Zhang
Ke Yi, Qin Zhang
Optimal Tracking of Distributed Heavy Hitters and Quantiles
10 pages, 1 figure
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the the problem of tracking heavy hitters and quantiles in the distributed streaming model. The heavy hitters and quantiles are two important statistics for characterizing a data distribution. Let $A$ be a multiset of elements, drawn from the universe $U=\{1,...,u\}$. For a given $0 \le \phi \le 1$, the $\phi$-heavy hitters are those elements of $A$ whose frequency in $A$ is at least $\phi |A|$; the $\phi$-quantile of $A$ is an element $x$ of $U$ such that at most $\phi|A|$ elements of $A$ are smaller than $A$ and at most $(1-\phi)|A|$ elements of $A$ are greater than $x$. Suppose the elements of $A$ are received at $k$ remote {\em sites} over time, and each of the sites has a two-way communication channel to a designated {\em coordinator}, whose goal is to track the set of $\phi$-heavy hitters and the $\phi$-quantile of $A$ approximately at all times with minimum communication. We give tracking algorithms with worst-case communication cost $O(k/\eps \cdot \log n)$ for both problems, where $n$ is the total number of items in $A$, and $\eps$ is the approximation error. This substantially improves upon the previous known algorithms. We also give matching lower bounds on the communication costs for both problems, showing that our algorithms are optimal. We also consider a more general version of the problem where we simultaneously track the $\phi$-quantiles for all $0 \le \phi \le 1$.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 03:51:12 GMT" } ]
2008-12-02T00:00:00
[ [ "Yi", "Ke", "" ], [ "Zhang", "Qin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.0262
Philipp Mayr
Philipp Mayr
An evaluation of Bradfordizing effects
8 pages, 9th COLLNET Meeting
null
null
null
cs.DL
http://creativecommons.org/licenses/by-nc-sa/3.0/
The purpose of this paper is to apply and evaluate the bibliometric method Bradfordizing for information retrieval (IR) experiments. Bradfordizing is used for generating core document sets for subject-specific questions and to reorder result sets from distributed searches. The method will be applied and tested in a controlled scenario of scientific literature databases from social and political sciences, economics, psychology and medical science (SOLIS, SoLit, USB Koeln Opac, CSA Sociological Abstracts, World Affairs Online, Psyndex and Medline) and 164 standardized topics. An evaluation of the method and its effects is carried out in two laboratory-based information retrieval experiments (CLEF and KoMoHe) using a controlled document corpus and human relevance assessments. The results show that Bradfordizing is a very robust method for re-ranking the main document types (journal articles and monographs) in today's digital libraries (DL). The IR tests show that relevance distributions after re-ranking improve at a significant level if articles in the core are compared with articles in the succeeding zones. The items in the core are significantly more often assessed as relevant, than items in zone 2 (z2) or zone 3 (z3). The improvements between the zones are statistically significant based on the Wilcoxon signed-rank test and the paired T-Test.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 10:44:25 GMT" } ]
2008-12-02T00:00:00
[ [ "Mayr", "Philipp", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0812.0283
Sven Kosub
Christopher M. Homan and Sven Kosub
Dichotomy Results for Fixed Point Counting in Boolean Dynamical Systems
16 pages, extended abstract presented at 10th Italian Conference on Theoretical Computer Science (ICTCS'2007)
null
null
revised version of TR No. TUM-I0706, Institut fuer Informatik, TU Muenchen
cs.CC cond-mat.dis-nn cs.DM nlin.AO nlin.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present dichotomy theorems regarding the computational complexity of counting fixed points in boolean (discrete) dynamical systems, i.e., finite discrete dynamical systems over the domain {0,1}. For a class F of boolean functions and a class G of graphs, an (F,G)-system is a boolean dynamical system with local transitions functions lying in F and graphs in G. We show that, if local transition functions are given by lookup tables, then the following complexity classification holds: Let F be a class of boolean functions closed under superposition and let G be a graph class closed under taking minors. If F contains all min-functions, all max-functions, or all self-dual and monotone functions, and G contains all planar graphs, then it is #P-complete to compute the number of fixed points in an (F,G)-system; otherwise it is computable in polynomial time. We also prove a dichotomy theorem for the case that local transition functions are given by formulas (over logical bases). This theorem has a significantly more complicated structure than the theorem for lookup tables. A corresponding theorem for boolean circuits coincides with the theorem for formulas.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 12:56:42 GMT" } ]
2008-12-02T00:00:00
[ [ "Homan", "Christopher M.", "" ], [ "Kosub", "Sven", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" } ]
0812.0319
Ersen Ekrem
Ersen Ekrem and Sennur Ulukus
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
Submitted to EURASIP Journal on Wireless Communications and Networking (Special Issue on Wireless Physical Layer Security)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the security of communication between a single transmitter and multiple receivers in a broadcast channel in the presence of an eavesdropper. We consider several special classes of channels. As the first model, we consider the degraded multi-receiver wiretap channel where the legitimate receivers exhibit a degradedness order while the eavesdropper is more noisy with respect to all legitimate receivers. We establish the secrecy capacity region of this channel model. Secondly, we consider the parallel multi-receiver wiretap channel with a less noisiness order in each sub-channel, where this order is not necessarily the same for all sub-channels. We establish the common message secrecy capacity and sum secrecy capacity of this channel. Thirdly, we study a special class of degraded parallel multi-receiver wiretap channels and provide a stronger result. In particular, we study the case with two sub-channels two users and one eavesdropper, where there is a degradedness order in each sub-channel such that in the first (resp. second) sub-channel the second (resp. first) receiver is degraded with respect to the first (resp. second) receiver, while the eavesdropper is degraded with respect to both legitimate receivers in both sub-channels. We determine the secrecy capacity region of this channel. Finally, we focus on a variant of this previous channel model where the transmitter can use only one of the sub-channels at any time. We characterize the secrecy capacity region of this channel as well.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 16:11:22 GMT" } ]
2008-12-02T00:00:00
[ [ "Ekrem", "Ersen", "" ], [ "Ulukus", "Sennur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.0320
Gwena\"el Joret
Gwena\"el Joret
Stackelberg Network Pricing is Hard to Approximate
null
Networks, vol. 57, no. 2, pp. 117--120, 2011
10.1002/net.20391
null
cs.DS cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the Stackelberg Network Pricing problem, one has to assign tariffs to a certain subset of the arcs of a given transportation network. The aim is to maximize the amount paid by the user of the network, knowing that the user will take a shortest st-path once the tariffs are fixed. Roch, Savard, and Marcotte (Networks, Vol. 46(1), 57-67, 2005) proved that this problem is NP-hard, and gave an O(log m)-approximation algorithm, where m denote the number of arcs to be priced. In this note, we show that the problem is also APX-hard.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 16:15:58 GMT" } ]
2011-03-07T00:00:00
[ [ "Joret", "Gwenaël", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.0329
Yonina C. Eldar
Yonina C. Eldar and Helmut Bolcskei
Block-Sparsity: Coherence and Efficient Recovery
Submitted to ICASSP 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider compressed sensing of block-sparse signals, i.e., sparse signals that have nonzero coefficients occuring in clusters. Based on an uncertainty relation for block-sparse signals, we define a block-coherence measure and we show that a block-version of the orthogonal matching pursuit algorithm recovers block k-sparse signals in no more than k steps if the block-coherence is sufficiently small. The same condition on block-sparsity is shown to guarantee successful recovery through a mixed l2/l1 optimization approach. The significance of the results lies in the fact that making explicit use of block-sparsity can yield better reconstruction properties than treating the signal as being sparse in the conventional sense thereby ignoring the additional structure in the problem.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 16:53:19 GMT" } ]
2008-12-02T00:00:00
[ [ "Eldar", "Yonina C.", "" ], [ "Bolcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.0340
Simon Morgan
Simon P. Morgan, Wotao Yin, Kevin R. Vixie
A Matlab Implementation of a Flat Norm Motivated Polygonal Edge Matching Method using a Decomposition of Boundary into Four 1-Dimensional Currents
Contains Matlab code and 4 figures
null
null
null
cs.CV cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe and provide code and examples for a polygonal edge matching method.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 18:59:52 GMT" }, { "version": "v2", "created": "Thu, 1 Oct 2009 18:44:03 GMT" } ]
2013-08-12T00:00:00
[ [ "Morgan", "Simon P.", "" ], [ "Yin", "Wotao", "" ], [ "Vixie", "Kevin R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0812.0372
Nikolay Gravin
Nikolay Gravin
Non-degenerate colorings in the Brook's Theorem
18 pages, 10 figures
Diskretnaya Matematika, 2009 N4 pp. 105-128
10.1515/DMA.2009.036
MR2641023
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $c\geq 2$ and $p\geq c$ be two integers. We will call a proper coloring of the graph $G$ a \textit{$(c,p)$-nondegenerate}, if for any vertex of $G$ with degree at least $p$ there are at least $c$ vertices of different colors adjacent to it. In our work we prove the following result, which generalizes Brook's Theorem. Let $D\geq 3$ and $G$ be a graph without cliques on $D+1$ vertices and the degree of any vertex in this graph is not greater than $D$. Then for every integer $c\geq 2$ there is a proper $(c,p)$-nondegenerate vertex $D$-coloring of $G$, where $p=(c^3+8c^2+19c+6)(c+1).$ During the primary proof, some interesting corollaries are derived.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 21:10:46 GMT" } ]
2012-06-20T00:00:00
[ [ "Gravin", "Nikolay", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.0382
Andrea Vattani
Andrea Vattani
k-means requires exponentially many iterations even in the plane
Submitted to SoCG 2009
null
null
null
cs.CG cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The k-means algorithm is a well-known method for partitioning n points that lie in the d-dimensional space into k clusters. Its main features are simplicity and speed in practice. Theoretically, however, the best known upper bound on its running time (i.e. O(n^{kd})) can be exponential in the number of points. Recently, Arthur and Vassilvitskii [3] showed a super-polynomial worst-case analysis, improving the best known lower bound from \Omega(n) to 2^{\Omega(\sqrt{n})} with a construction in d=\Omega(\sqrt{n}) dimensions. In [3] they also conjectured the existence of superpolynomial lower bounds for any d >= 2. Our contribution is twofold: we prove this conjecture and we improve the lower bound, by presenting a simple construction in the plane that leads to the exponential lower bound 2^{\Omega(n)}.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 22:55:39 GMT" } ]
2008-12-03T00:00:00
[ [ "Vattani", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.0387
Kevin Buchin
Kevin Buchin
Delaunay Triangulations in Linear Time? (Part I)
8 pages, no figures; added footnote about newer algorithm
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new and simple randomized algorithm for constructing the Delaunay triangulation using nearest neighbor graphs for point location. Under suitable assumptions, it runs in linear expected time for points in the plane with polynomially bounded spread, i.e., if the ratio between the largest and smallest pointwise distance is polynomially bounded. This also holds for point sets with bounded spread in higher dimensions as long as the expected complexity of the Delaunay triangulation of a sample of the points is linear in the sample size.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 23:09:13 GMT" }, { "version": "v2", "created": "Tue, 17 Feb 2009 08:58:17 GMT" }, { "version": "v3", "created": "Sun, 13 Dec 2009 21:54:48 GMT" } ]
2009-12-13T00:00:00
[ [ "Buchin", "Kevin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.0389
Stefanie Jegelka
Stefanie Jegelka, Suvrit Sra, Arindam Banerjee
Approximation Algorithms for Bregman Co-clustering and Tensor Clustering
18 pages; improved metric case
short version in ALT 2009
null
null
cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the past few years powerful generalizations to the Euclidean k-means problem have been made, such as Bregman clustering [7], co-clustering (i.e., simultaneous clustering of rows and columns of an input matrix) [9,18], and tensor clustering [8,34]. Like k-means, these more general problems also suffer from the NP-hardness of the associated optimization. Researchers have developed approximation algorithms of varying degrees of sophistication for k-means, k-medians, and more recently also for Bregman clustering [2]. However, there seem to be no approximation algorithms for Bregman co- and tensor clustering. In this paper we derive the first (to our knowledge) guaranteed methods for these increasingly important clustering settings. Going beyond Bregman divergences, we also prove an approximation factor for tensor clustering with arbitrary separable metrics. Through extensive experiments we evaluate the characteristics of our method, and show that it also has practical impact.
[ { "version": "v1", "created": "Mon, 1 Dec 2008 23:17:35 GMT" }, { "version": "v2", "created": "Tue, 10 Feb 2009 12:40:18 GMT" }, { "version": "v3", "created": "Fri, 15 May 2009 22:23:02 GMT" }, { "version": "v4", "created": "Mon, 9 Nov 2009 15:50:32 GMT" } ]
2009-11-09T00:00:00
[ [ "Jegelka", "Stefanie", "" ], [ "Sra", "Suvrit", "" ], [ "Banerjee", "Arindam", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.0438
Sabu Thampi m
Sabu M. Thampi
An Introduction to Knowledge Management
null
null
null
null
cs.DB cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Knowledge has been lately recognized as one of the most important assets of organizations. Managing knowledge has grown to be imperative for the success of a company. This paper presents an overview of Knowledge Management and various aspects of secure knowledge management. A case study of knowledge management activities at Tata Steel is also discussed
[ { "version": "v1", "created": "Tue, 2 Dec 2008 09:00:27 GMT" } ]
2008-12-03T00:00:00
[ [ "Thampi", "Sabu M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0812.0486
Peter Bro Miltersen
Vladimir Gurvich and Peter Bro Miltersen
On the computational complexity of solving stochastic mean-payoff games
s
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider some well-known families of two-player, zero-sum, perfect information games that can be viewed as special cases of Shapley's stochastic games. We show that the following tasks are polynomial time equivalent: - Solving simple stochastic games. - Solving stochastic mean-payoff games with rewards and probabilities given in unary. - Solving stochastic mean-payoff games with rewards and probabilities given in binary.
[ { "version": "v1", "created": "Tue, 2 Dec 2008 12:28:58 GMT" } ]
2008-12-03T00:00:00
[ [ "Gurvich", "Vladimir", "" ], [ "Miltersen", "Peter Bro", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.0492
Peter Bro Miltersen
Peter Bro Miltersen
Trembling hand perfection is NP-hard
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is NP-hard to decide if a given pure-strategy Nash equilibrium of a given three-player game in strategic form with integer payoffs is trembling hand perfect.
[ { "version": "v1", "created": "Tue, 2 Dec 2008 12:42:06 GMT" } ]
2008-12-03T00:00:00
[ [ "Miltersen", "Peter Bro", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.0515
Cuilian Li
Cuilian Li (1 and 2), Zhen Yang (1), Feng Tian (1) ((1) Nanjing University of Posts & Telecommunications, (2) Zhejiang Wanli University)
A Relaying Incentive Scheme in Multihop Cellular Networks Based on Coalitional Game with Externalities
21 pages,9 figures, 11 tables. Submitted to Wireless Personal Communications
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cooperative multihop communication can greatly increase network throughput, yet packet forwarding for other nodes involves opportunity and energy cost for relays. Thus one of the pre-requisite problems in the successful implementation of multihop transmission is how to foster cooperation among selfish nodes. Existing researches mainly adopt monetary stimulating. In this manuscript, we propose instead a simple and self-enforcing forwarding incentive scheme free of indirect monetary remunerating for asymmetric (uplink multihop, downlink single-hop) cellar network based on coalitional game theory, which comprises double compensation, namely, Inter- BEA, global stimulating policy allotting resources among relaying coalitions according to group size, and Intra-BEA, local compensating and allocating rule within coalitions. Firstly, given the global allotting policy, we introduce a fair allocation estimating approach which includes remunerating for relaying cost using Myerson value for partition function game, to enlighten the design of local allocating rules. Secondly, given the inter- and intra-BEA relay fostering approach, we check stability of coalition structures in terms of internal and external stability as well as inductive core. Theoretic analysis and numerical simulation show that our measure can provide communication opportunities for outer ring nodes and enlarge system coverage, while at the same time provide enough motivation with respect to resource allocation and energy saving for nodes in inner and middle ring to relay for own profits.
[ { "version": "v1", "created": "Tue, 2 Dec 2008 14:28:35 GMT" }, { "version": "v2", "created": "Wed, 3 Dec 2008 01:16:59 GMT" } ]
2008-12-03T00:00:00
[ [ "Li", "Cuilian", "", "1 and 2" ], [ "Yang", "Zhen", "" ], [ "Tian", "Feng", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.0564
James Cheney
James Cheney, Umut Acar, Amal Ahmed
Provenance Traces
Technical report
null
null
null
cs.PL cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Provenance is information about the origin, derivation, ownership, or history of an object. It has recently been studied extensively in scientific databases and other settings due to its importance in helping scientists judge data validity, quality and integrity. However, most models of provenance have been stated as ad hoc definitions motivated by informal concepts such as "comes from", "influences", "produces", or "depends on". These models lack clear formalizations describing in what sense the definitions capture these intuitive concepts. This makes it difficult to compare approaches, evaluate their effectiveness, or argue about their validity. We introduce provenance traces, a general form of provenance for the nested relational calculus (NRC), a core database query language. Provenance traces can be thought of as concrete data structures representing the operational semantics derivation of a computation; they are related to the traces that have been used in self-adjusting computation, but differ in important respects. We define a tracing operational semantics for NRC queries that produces both an ordinary result and a trace of the execution. We show that three pre-existing forms of provenance for the NRC can be extracted from provenance traces. Moreover, traces satisfy two semantic guarantees: consistency, meaning that the traces describe what actually happened during execution, and fidelity, meaning that the traces "explain" how the expression would behave if the input were changed. These guarantees are much stronger than those contemplated for previous approaches to provenance; thus, provenance traces provide a general semantic foundation for comparing and unifying models of provenance in databases.
[ { "version": "v1", "created": "Tue, 2 Dec 2008 18:17:23 GMT" } ]
2008-12-03T00:00:00
[ [ "Cheney", "James", "" ], [ "Acar", "Umut", "" ], [ "Ahmed", "Amal", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0812.0581
Arnaud Legout
Stevens Le Blond (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Arnaud Legout (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Walid Dabbous (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes)
Pushing BitTorrent Locality to the Limit
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, it dramatically increases the traffic on inter-ISP links. To solve this issue, the idea to keep a fraction of the P2P traffic local to each ISP was introduced a few years ago. Since then, P2P solutions exploiting locality have been introduced. However, several fundamental issues on locality still need to be explored. In particular, how far can we push locality, and what is, at the scale of the Internet, the reduction of traffic that can be achieved with locality? In this paper, we perform extensive experiments on a controlled environment with up to 10 000 BitTorrent clients to evaluate the impact of high locality on inter-ISP links traffic and peers download completion time. We introduce two simple mechanisms that make high locality possible in challenging scenarios and we show that we save up to several orders of magnitude inter-ISP traffic compared to traditional locality without adversely impacting peers download completion time. In addition, we crawled 214 443 torrents representing 6 113 224 unique peers spread among 9 605 ASes. We show that whereas the torrents we crawled generated 11.6 petabytes of inter-ISP traffic, our locality policy implemented for all torrents would have reduced the global inter-ISP traffic by 40%.
[ { "version": "v1", "created": "Tue, 2 Dec 2008 20:07:47 GMT" }, { "version": "v2", "created": "Tue, 12 May 2009 15:06:58 GMT" } ]
2009-05-12T00:00:00
[ [ "Blond", "Stevens Le", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ], [ "Legout", "Arnaud", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ], [ "Dabbous", "Walid", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.0598
Laura Poplawski
Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram and Shang-Hua Teng
Preference Games and Personalized Equilibria, with Applications to Fractional BGP
25 pages, 3 figures, v2: minor editorial changes
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the complexity of computing equilibria in two classes of network games based on flows - fractional BGP (Border Gateway Protocol) games and fractional BBC (Bounded Budget Connection) games. BGP is the glue that holds the Internet together and hence its stability, i.e. the equilibria of fractional BGP games (Haxell, Wilfong), is a matter of practical importance. BBC games (Laoutaris et al) follow in the tradition of the large body of work on network formation games and capture a variety of applications ranging from social networks and overlay networks to peer-to-peer networks. The central result of this paper is that there are no fully polynomial-time approximation schemes (unless PPAD is in FP) for computing equilibria in both fractional BGP games and fractional BBC games. We obtain this result by proving the hardness for a new and surprisingly simple game, the fractional preference game, which is reducible to both fractional BGP and BBC games. We define a new flow-based notion of equilibrium for matrix games -- personalized equilibria -- generalizing both fractional BBC and fractional BGP games. We prove not just the existence, but the existence of rational personalized equilibria for all matrix games, which implies the existence of rational equilibria for fractional BGP and BBC games. In particular, this provides an alternative proof and strengthening of the main result in [Haxell, Wilfong]. For k-player matrix games, where k = 2, we provide a combinatorial characterization leading to a polynomial-time algorithm for computing all personalized equilibria. For k >= 5, we prove that personalized equilibria are PPAD-hard to approximate in fully polynomial time. We believe that the concept of personalized equilibria has potential for real-world significance.
[ { "version": "v1", "created": "Tue, 2 Dec 2008 21:12:03 GMT" }, { "version": "v2", "created": "Fri, 5 Dec 2008 16:35:26 GMT" } ]
2008-12-05T00:00:00
[ [ "Poplawski", "Laura J.", "" ], [ "Rajaraman", "Rajmohan", "" ], [ "Sundaram", "Ravi", "" ], [ "Teng", "Shang-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.0601
Shaowei Lin
Shaowei Lin, Bernd Sturmfels
Polynomial relations among principal minors of a 4x4-matrix
16 pages, v2: Remark 14
null
null
null
math.AG cs.SC math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The image of the principal minor map for n x n-matrices is shown to be closed. In the 19th century, Nansen and Muir studied the implicitization problem of finding all relations among principal minors when n=4. We complete their partial results by constructing explicit polynomials of degree 12 that scheme-theoretically define this affine variety and also its projective closure in $\PP^{15}$. The latter is the main component in the singular locus of the 2 x 2 x 2 x 2-hyperdeterminant.
[ { "version": "v1", "created": "Tue, 2 Dec 2008 21:34:51 GMT" }, { "version": "v2", "created": "Thu, 18 Dec 2008 17:12:26 GMT" }, { "version": "v3", "created": "Mon, 22 Jun 2009 20:31:19 GMT" } ]
2009-06-22T00:00:00
[ [ "Lin", "Shaowei", "" ], [ "Sturmfels", "Bernd", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
0812.0607
Kevin Wortman
Matthew Dickerson, David Eppstein, and Kevin A. Wortman
Dilation, smoothed distance, and minimization diagrams of convex functions
10 pages, 6 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study Voronoi diagrams for distance functions that add together two convex functions, each taking as its argument the difference between Cartesian coordinates of two planar points. When the functions do not grow too quickly, then the Voronoi diagram has linear complexity and can be constructed in near-linear randomized expected time. Additionally, the level sets of the distances from the sites form a family of pseudocircles in the plane, all cells in the Voronoi diagram are connected, and the set of bisectors separating any one cell in the diagram from each of the others forms an arrangement of pseudolines in the plane. We apply these results to the smoothed distance or biotope transform metric, a geometric analogue of the Jaccard distance whose Voronoi diagrams can be used to determine the dilation of a star network with a given hub. For sufficiently closely spaced points in the plane, the Voronoi diagram of smoothed distance has linear complexity and can be computed efficiently. We also experiment with a variant of Lloyd's algorithm, adapted to smoothed distance, to find uniformly spaced point samples with exponentially decreasing density around a given point.
[ { "version": "v1", "created": "Tue, 2 Dec 2008 22:09:31 GMT" }, { "version": "v2", "created": "Thu, 13 May 2010 05:30:09 GMT" } ]
2010-05-14T00:00:00
[ [ "Dickerson", "Matthew", "" ], [ "Eppstein", "David", "" ], [ "Wortman", "Kevin A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0812.0617
Nan Liu
Nan Liu, Ivana Maric, Andrea Goldsmith and Shlomo Shamai (Shitz)
The Capacity Region of the Cognitive Z-interference Channel with One Noiseless Component
The conference version has been submitted to ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the discrete memoryless Z-interference channel (ZIC) where the transmitter of the pair that suffers from interference is cognitive. We first provide upper and lower bounds on the capacity of this channel. We then show that, when the channel of the transmitter-receiver pair that does not face interference is noiseless, the two bounds coincide and therefore yield the capacity region. The obtained results imply that, unlike in the Gaussian cognitive ZIC, in the considered channel superposition encoding at the non-cognitive transmitter as well as Gel'fand-Pinsker encoding at the cognitive transmitter are needed in order to minimize the impact of interference. As a byproduct of the obtained capacity region, we obtain the capacity result for a generalized Gel'fand-Pinsker problem.
[ { "version": "v1", "created": "Tue, 2 Dec 2008 23:18:26 GMT" } ]
2008-12-04T00:00:00
[ [ "Liu", "Nan", "", "Shitz" ], [ "Maric", "Ivana", "", "Shitz" ], [ "Goldsmith", "Andrea", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.0621
Jubin Jose
Jubin Jose, Alexei Ashikhmin, Phil Whiting, Sriram Vishwanath
Channel Estimation and Linear Precoding in Multiuser Multiple-Antenna TDD Systems
null
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 5, JUNE 2011
10.1109/TVT.2011.2146797
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional approaches in the analysis of downlink systems decouple the precoding and the channel estimation problems. However, in cellular systems with mobile users, these two problems are in fact tightly coupled. In this paper, this coupling is explicitly studied by accounting for channel training overhead and estimation error while determining the overall system throughput. The paper studies the problem of utilizing imperfect channel estimates for efficient linear precoding and user selection. It presents precoding methods that take into account the degree of channel estimation error. Information-theoretic lower and upper bounds are derived to evaluate the performance of these precoding methods. In typical scenarios, these bounds are close.
[ { "version": "v1", "created": "Wed, 3 Dec 2008 00:16:19 GMT" }, { "version": "v2", "created": "Mon, 10 May 2010 19:50:57 GMT" }, { "version": "v3", "created": "Mon, 27 Jun 2011 22:25:26 GMT" } ]
2016-11-18T00:00:00
[ [ "Jose", "Jubin", "" ], [ "Ashikhmin", "Alexei", "" ], [ "Whiting", "Phil", "" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.0629
Cuilian Li
Cuilian Li (1 and 2), Zhen Yang (1), Jun Li (2), Feng Tian (1) ((1) Nanjing University of Posts & Telecommunications, (2) Zhejiang Wanli University)
Dynamic spectrum sharing game by lease
15 pages, 4 figures, 1 table. Revision
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose and analyze a dynamic implementation of the property-rights model of cognitive radio. A primary link has the possibility to lease the owned spectrum to a MAC network of secondary nodes, in exchange for cooperation in the form of distributed space-time coding (DSTC). The cooperation and competition between the primary and secondary network are cast in the framework of sequential game. On one hand, the primary link attempts to maximize its quality of service in terms of signal-to-interference-plus-noise ratio (SINR); on the other hand, nodes in the secondary network compete for transmission within the leased time-slot following a power control mechanism. We consider both a baseline model with complete information and a more practical version with incomplete information, using the backward induction approach for the former and providing approximate algorithm for the latter. Analysis and numerical results show that our models and algorithms provide a promising framework for fair and effective spectrum sharing, both between primary and secondary networks and among secondary nodes.
[ { "version": "v1", "created": "Wed, 3 Dec 2008 01:12:23 GMT" }, { "version": "v2", "created": "Fri, 19 Jun 2009 01:05:25 GMT" } ]
2009-06-19T00:00:00
[ [ "Li", "Cuilian", "", "1 and 2" ], [ "Yang", "Zhen", "" ], [ "Li", "Jun", "" ], [ "Tian", "Feng", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.0635
Cuilian Li
Cuilian Li (1 and 2), Zhen Yang (1) ((1) Nanjing University of Posts & Telecommunications, (2) Zhejiang Wanli University)
Analysis of Group Multiuser Detection Based on Coalitional Game
4 pages, 5 figures. Accepted by ICWMMN2008
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The issue of group-blind multiuser detection in MAC channel among wireless nodes in the environment of multiple networks coexisting and sharing spectrum is addressed under the Framework of coalitional game. We investigate the performance and stability of multiple access channel (MAC) with linear decorrelating multiuser detection under varying SNR, channel gains and coalitional structures, in which both single BS and multiple BSs cases were considered. The main results and conclusion are as follows: (1) the grand coalition is payoff maximizing under loose SNR; (2) it is in conformity with group and coalitional rationality forming coalition among nodes that have comparative channel gains.
[ { "version": "v1", "created": "Wed, 3 Dec 2008 02:16:45 GMT" } ]
2008-12-04T00:00:00
[ [ "Li", "Cuilian", "", "1 and 2" ], [ "Yang", "Zhen", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.0659
Chitta Baral
Chitta Baral, Michael Gelfond and Nelson Rushton
Probabilistic reasoning with answer sets
77 pages. To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper develops a declarative language, P-log, that combines logical and probabilistic arguments in its reasoning. Answer Set Prolog is used as the logical foundation, while causal Bayes nets serve as a probabilistic foundation. We give several non-trivial examples and illustrate the use of P-log for knowledge representation and updating of knowledge. We argue that our approach to updates is more appealing than existing approaches. We give sufficiency conditions for the coherency of P-log programs and show that Bayes nets can be easily mapped to coherent P-log programs.
[ { "version": "v1", "created": "Wed, 3 Dec 2008 06:36:16 GMT" } ]
2008-12-04T00:00:00
[ [ "Baral", "Chitta", "" ], [ "Gelfond", "Michael", "" ], [ "Rushton", "Nelson", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0812.0686
Juan Tapiador
Juan M. E. Tapiador, Almudena Alcaide, Julio C. Hernandez-Castro, Arturo Ribagorda
Cryptanalysis of the RSA-CEGD protocol
8 pages, 1 figure
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, Nenadi\'c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encrypted signatures (VRES) to guarantee properties such as strong fairness and non-repudiation, among others. In this paper, we demonstrate how this protocol cannot achieve fairness by presenting a severe attack and also pointing out some other weaknesses.
[ { "version": "v1", "created": "Wed, 3 Dec 2008 10:42:48 GMT" } ]
2008-12-04T00:00:00
[ [ "Tapiador", "Juan M. E.", "" ], [ "Alcaide", "Almudena", "" ], [ "Hernandez-Castro", "Julio C.", "" ], [ "Ribagorda", "Arturo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0812.0698
Andrea Baldassarri
Ciro Cattuto, Andrea Baldassarri, Vito D.P. Servedio, and Vittorio Loreto
Emergent Community Structure in Social Tagging Systems
14 pages, 8 figures
Advances in Complex Systems 11, 597 (2008)
null
null
cs.IR cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A distributed classification paradigm known as collaborative tagging has been widely adopted in new Web applications designed to manage and share online resources. Users of these applications organize resources (Web pages, digital photographs, academic papers) by associating with them freely chosen text labels, or tags. Here we leverage the social aspects of collaborative tagging and introduce a notion of resource distance based on the collective tagging activity of users. We collect data from a popular system and perform experiments showing that our definition of distance can be used to build a weighted network of resources with a detectable community structure. We show that this community structure clearly exposes the semantic relations among resources. The communities of resources that we observe are a genuinely emergent feature, resulting from the uncoordinated activity of a large number of users, and their detection paves the way for mapping emergent semantics in social tagging systems.
[ { "version": "v1", "created": "Wed, 3 Dec 2008 11:40:46 GMT" } ]
2008-12-04T00:00:00
[ [ "Cattuto", "Ciro", "" ], [ "Baldassarri", "Andrea", "" ], [ "Servedio", "Vito D. P.", "" ], [ "Loreto", "Vittorio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0812.0706
Soubhik Chakraborty
Soubhik Chakraborty, Rayalla Ranganayakulu, Shivee Chauhan, Sandeep Singh Solanki and Kartik Mahto
Which notes are Vadi-Samvadi in Raga Rageshree?
20 pages;04 figures
null
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notes which play the most important and second most important roles in expressing a raga are called Vadi and Samvadi swars respectively in (North) Indian Classical music. Like Bageshree, Bhairavi, Shankara, Hamir and Kalingra, Rageshree is another controversial raga so far as the choice of Vadi-Samvadi selection is concerned where there are two different opinions. In the present work, a two minute vocal recording of raga Rageshree is subjected to a careful statistical analysis. Our analysis is broken into three phases: first half, middle half and last half. Under a multinomial model set up holding appreciably in the first two phases, only one opinion is found acceptable. In the last phase the distribution seems to be quasi multinomial, characterized by an unstable nature of relative occurrence of pitch of all the notes and although the note whose relative occurrence of pitch suddenly shoots is the Vadi swar selected from our analysis of the first two phases, we take it as an outlier demanding a separate treatment like any other in statistics. Selection of Vadi-Samvadi notes in a quasi-multinomial set up is still an open research problem. An interesting musical cocktail is proposed, however, embedding several ideas like melodic property of notes, note combinations and pitch movements between notes, using some weighted combination of psychological and statistical stability of notes along with watching carefully the sudden shoot of one or more notes whenever there is enough evidence that multinomial model has broken down.
[ { "version": "v1", "created": "Wed, 3 Dec 2008 12:47:08 GMT" } ]
2008-12-04T00:00:00
[ [ "Chakraborty", "Soubhik", "" ], [ "Ranganayakulu", "Rayalla", "" ], [ "Chauhan", "Shivee", "" ], [ "Solanki", "Sandeep Singh", "" ], [ "Mahto", "Kartik", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
0812.0736
Alain Bui
Alain Bui, Olivier Flauzac, Cyril Rabat
Fully distributed and fault tolerant task management based on diffusions
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The task management is a critical component for the computational grids. The aim is to assign tasks on nodes according to a global scheduling policy and a view of local resources of nodes. A peer-to-peer approach for the task management involves a better scalability for the grid and a higher fault tolerance. But some mechanisms have to be proposed to avoid the computation of replicated tasks that can reduce the efficiency and increase the load of nodes. In the same way, these mechanisms have to limit the number of exchanged messages to avoid the overload of the network. In a previous paper, we have proposed two methods for the task management called active and passive. These methods are based on a random walk: they are fully distributed and fault tolerant. Each node owns a local tasks states set updated thanks to a random walk and each node is in charge of the local assignment. Here, we propose three methods to improve the efficiency of the active method. These new methods are based on a circulating word. The nodes local tasks states sets are updated thanks to periodical diffusions along trees built from the circulating word. Particularly, we show that these methods increase the efficiency of the active method: they produce less replicated tasks. These three methods are also fully distributed and fault tolerant. On the other way, the circulating word can be exploited for other applications like the resources management or the nodes synchronization.
[ { "version": "v1", "created": "Wed, 3 Dec 2008 14:58:19 GMT" } ]
2008-12-04T00:00:00
[ [ "Bui", "Alain", "" ], [ "Flauzac", "Olivier", "" ], [ "Rabat", "Cyril", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0812.0743
Qiang Li
Qiang Li, Yan He, Jing-ping Jiang
A Novel Clustering Algorithm Based on Quantum Games
19 pages, 5 figures, 5 tables
2009 J. Phys. A: Math. Theor. 42 445303
10.1088/1751-8113/42/44/445303
null
cs.LG cs.AI cs.CV cs.GT cs.MA cs.NE quant-ph
http://creativecommons.org/licenses/by-nc-sa/3.0/
Enormous successes have been made by quantum algorithms during the last decade. In this paper, we combine the quantum game with the problem of data clustering, and then develop a quantum-game-based clustering algorithm, in which data points in a dataset are considered as players who can make decisions and implement quantum strategies in quantum games. After each round of a quantum game, each player's expected payoff is calculated. Later, he uses a link-removing-and-rewiring (LRR) function to change his neighbors and adjust the strength of links connecting to them in order to maximize his payoff. Further, algorithms are discussed and analyzed in two cases of strategies, two payoff matrixes and two LRR functions. Consequently, the simulation results have demonstrated that data points in datasets are clustered reasonably and efficiently, and the clustering algorithms have fast rates of convergence. Moreover, the comparison with other algorithms also provides an indication of the effectiveness of the proposed approach.
[ { "version": "v1", "created": "Wed, 3 Dec 2008 15:46:03 GMT" }, { "version": "v2", "created": "Sat, 10 Oct 2009 09:10:36 GMT" } ]
2015-05-13T00:00:00
[ [ "Li", "Qiang", "" ], [ "He", "Yan", "" ], [ "Jiang", "Jing-ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0812.0754
Jinshan Zhang
Jinshan Zhang
Strong Spatial Mixing and Approximating Partition Functions of Two-State Spin Systems without Hard Constrains
9 pages
null
null
null
cs.DM cs.GR
http://creativecommons.org/licenses/by/3.0/
We prove Gibbs distribution of two-state spin systems(also known as binary Markov random fields) without hard constrains on a tree exhibits strong spatial mixing(also known as strong correlation decay), under the assumption that, for arbitrary `external field', the absolute value of `inverse temperature' is small, or the `external field' is uniformly large or small. The first condition on `inverse temperature' is tight if the distribution is restricted to ferromagnetic or antiferromagnetic Ising models. Thanks to Weitz's self-avoiding tree, we extends the result for sparse on average graphs, which generalizes part of the recent work of Mossel and Sly\cite{MS08}, who proved the strong spatial mixing property for ferromagnetic Ising model. Our proof yields a different approach, carefully exploiting the monotonicity of local recursion. To our best knowledge, the second condition of `external field' for strong spatial mixing in this paper is first considered and stated in term of `maximum average degree' and `interaction energy'. As an application, we present an FPTAS for partition functions of two-state spin models without hard constrains under the above assumptions in a general family of graphs including interesting bounded degree graphs.
[ { "version": "v1", "created": "Wed, 3 Dec 2008 16:56:53 GMT" }, { "version": "v2", "created": "Thu, 5 Mar 2009 03:16:17 GMT" } ]
2009-03-05T00:00:00
[ [ "Zhang", "Jinshan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0812.0759
Gaurav Bhatnagar Mr.
R. Balasubramanian, Gaurav Bhatnagar
A new Contrast Based Image Fusion using Wavelet Packets
5 Pages, 10 Figures, 1 Table
Proc. of IEEE Conference on Applications of Intelligent Systems (AIS 2008), March 13-15, 2008, Sonepat, India, pp. 141-145. (ISBN:978-81-906531-0-7)
null
null
cs.IT cs.MM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image Fusion, a technique which combines complimentary information from different images of the same scene so that the fused image is more suitable for segmentation, feature extraction, object recognition and Human Visual System. In this paper, a simple yet efficient algorithm is presented based on contrast using wavelet packet decomposition. First, all the source images are decomposed into low and high frequency sub-bands and then fusion of high frequency sub-bands is done by the means of Directive Contrast. Now, inverse wavelet packet transform is performed to reconstruct the fused image. The performance of the algorithm is carried out by the comparison made between proposed and existing algorithm.
[ { "version": "v1", "created": "Wed, 3 Dec 2008 17:29:19 GMT" } ]
2008-12-04T00:00:00
[ [ "Balasubramanian", "R.", "" ], [ "Bhatnagar", "Gaurav", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.0790
Tran Cao Son
Enrico Pontelli, Tran Cao Son, and Omar Elkhatib
Justifications for Logic Programs under Answer Set Semantics
59 pages, 7 figures
null
null
null
cs.AI cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper introduces the notion of off-line justification for Answer Set Programming (ASP). Justifications provide a graph-based explanation of the truth value of an atom w.r.t. a given answer set. The paper extends also this notion to provide justification of atoms during the computation of an answer set (on-line justification), and presents an integration of on-line justifications within the computation model of Smodels. Off-line and on-line justifications provide useful tools to enhance understanding of ASP, and they offer a basic data structure to support methodologies and tools for debugging answer set programs. A preliminary implementation has been developed in ASP-PROLOG. (To appear in Theory and Practice of Logic Programming (TPLP))
[ { "version": "v1", "created": "Wed, 3 Dec 2008 20:10:00 GMT" } ]
2008-12-04T00:00:00
[ [ "Pontelli", "Enrico", "" ], [ "Son", "Tran Cao", "" ], [ "Elkhatib", "Omar", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0812.0852
Daowen Qiu
Daowen Qiu, Sheng Yu
Hierarchy and equivalence of multi-letter quantum finite automata
22 pages, 8 figures. The is a further revised version, and it has been accepted for publication in Theoretical Computer Science
Theoretical Computer Science, 410 (30-32) (2009) 3006-3017.
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-letter {\it quantum finite automata} (QFAs) were a new one-way QFA model proposed recently by Belovs, Rosmanis, and Smotrovs (LNCS, Vol. 4588, Springer, Berlin, 2007, pp. 60-71), and they showed that multi-letter QFAs can accept with no error some regular languages ($(a+b)^{*}b$) that are unacceptable by the one-way QFAs. In this paper, we continue to study multi-letter QFAs. We mainly focus on two issues: (1) we show that $(k+1)$-letter QFAs are computationally more powerful than $k$-letter QFAs, that is, $(k+1)$-letter QFAs can accept some regular languages that are unacceptable by any $k$-letter QFA. A comparison with the one-way QFAs is made by some examples; (2) we prove that a $k_{1}$-letter QFA ${\cal A}_1$ and another $k_{2}$-letter QFA ${\cal A}_2$ are equivalent if and only if they are $(n_{1}+n_{2})^{4}+k-1$-equivalent, and the time complexity of determining the equivalence of two multi-letter QFAs using this method is $O(n^{12}+k^{2}n^{4}+kn^{8})$, where $n_{1}$ and $n_{2}$ are the numbers of states of ${\cal A}_{1}$ and ${\cal A}_{2}$, respectively, and $k=\max(k_{1},k_{2})$. Some other issues are addressed for further consideration.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 03:10:29 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2008 04:04:11 GMT" }, { "version": "v3", "created": "Tue, 10 Mar 2009 19:55:01 GMT" } ]
2010-03-10T00:00:00
[ [ "Qiu", "Daowen", "" ], [ "Yu", "Sheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0812.0872
Louis Theran
Louis Theran
Rigid Components of Random Graphs
null
null
null
null
math.CO cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The planar rigidity problem asks, given a set of m pairwise distances among a set P of n unknown points, whether it is possible to reconstruct P, up to a finite set of possibilities (modulo rigid motions of the plane). The celebrated Maxwell-Laman Theorem from Rigidity Theory says that, generically, the rigidity problem has a combinatorial answer: the underlying combinatorial structure must contain a spanning minimally-rigid graph (Laman graph). In the case where the system is not rigid, its inclusion-wise maximal rigid substructures (rigid components) are also combinatorially characterized via the Maxwell-Laman theorem, and may be found efficiently. Physicists have used planar combinatorial rigidity has been used to study the phase transition between liquid and solid in network glasses. The approach has been to generate a graph via a stochastic process and then experimentally analyze its rigidity properties. Of particular interest is the size of the largest rigid components. In this paper, we study the emergence of rigid components in an Erdos-Renyi random graph G(n,p), using the parameterization p=c/n for a fixed constant c>0. Our first result is that for all c>0, almost surely all rigid components have size 2, 3 or Omega(n). We also show that for c>4, almost surely the largest rigid components have size at least n/10. While the G(n,p) model is simpler than those appearing in the physics literature, these results are the first of this type where the distribution is over all graphs on n vertices and the expected number of edges is O(n).
[ { "version": "v1", "created": "Thu, 4 Dec 2008 07:23:25 GMT" } ]
2008-12-05T00:00:00
[ [ "Theran", "Louis", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0812.0874
Florent Autrusseau
Guihuan Feng (IRCCyN), Christian Viard-Gaudin (IRCCyN)
Stroke Fragmentation based on Geometry Features and HMM
null
null
null
null
cs.HC cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stroke fragmentation is one of the key steps in pen-based interaction. In this letter, we present a unified HMM-based stroke fragmentation technique that can do segment point location and primitive type determination simultaneously. The geometry features included are used to evaluate local features, and the HMM model is utilized to measure the global drawing context. Experiments prove that the model can efficiently represent smooth curves as well as strokes made up of arbitrary lines and circular arcs.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 07:35:48 GMT" } ]
2008-12-05T00:00:00
[ [ "Feng", "Guihuan", "", "IRCCyN" ], [ "Viard-Gaudin", "Christian", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0812.0882
Philippe Thomas
Philippe Thomas (CRAN), Andr\'e Thomas (CRAN)
Elagage d'un perceptron multicouches : utilisation de l'analyse de la variance de la sensibilit\'e des param\`etres
6 pages
Conf\'erence Internationale Francophone d'Automatique CIFA'08, Bucarest : Roumanie (2008)
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The stucture determination of a neural network for the modelisation of a system remain the core of the problem. Within this framework, we propose a pruning algorithm of the network based on the use of the analysis of the sensitivity of the variance of all the parameters of the network. This algorithm will be tested on two examples of simulation and its performances will be compared with three other algorithms of pruning of the literature
[ { "version": "v1", "created": "Thu, 4 Dec 2008 09:12:14 GMT" } ]
2008-12-05T00:00:00
[ [ "Thomas", "Philippe", "", "CRAN" ], [ "Thomas", "André", "", "CRAN" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0812.0885
Marko Horvat
Marko Horvat
Elementary epistemological features of machine intelligence
The paper needs to be redesigned
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Theoretical analysis of machine intelligence (MI) is useful for defining a common platform in both theoretical and applied artificial intelligence (AI). The goal of this paper is to set canonical definitions that can assist pragmatic research in both strong and weak AI. Described epistemological features of machine intelligence include relationship between intelligent behavior, intelligent and unintelligent machine characteristics, observable and unobservable entities and classification of intelligence. The paper also establishes algebraic definitions of efficiency and accuracy of MI tests as their quality measure. The last part of the paper addresses the learning process with respect to the traditional epistemology and the epistemology of MI described here. The proposed views on MI positively correlate to the Hegelian monistic epistemology and contribute towards amalgamating idealistic deliberations with the AI theory, particularly in a local frame of reference.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 09:25:37 GMT" }, { "version": "v2", "created": "Sat, 1 Dec 2012 23:10:50 GMT" }, { "version": "v3", "created": "Sat, 9 Feb 2013 11:27:50 GMT" }, { "version": "v4", "created": "Fri, 30 Jun 2017 14:10:03 GMT" } ]
2017-07-03T00:00:00
[ [ "Horvat", "Marko", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.0893
Darren Strash
David Eppstein, Michael T. Goodrich and Darren Strash
Linear-Time Algorithms for Geometric Graphs with Sublinearly Many Edge Crossings
Expanded version of a paper appearing at the 20th ACM-SIAM Symposium on Discrete Algorithms (SODA09)
SIAM J. Computing 39(8): 3814-3829, 2010
10.1137/090759112
null
cs.CG cs.DM cs.DS cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide linear-time algorithms for geometric graphs with sublinearly many crossings. That is, we provide algorithms running in O(n) time on connected geometric graphs having n vertices and k crossings, where k is smaller than n by an iterated logarithmic factor. Specific problems we study include Voronoi diagrams and single-source shortest paths. Our algorithms all run in linear time in the standard comparison-based computational model; hence, we make no assumptions about the distribution or bit complexities of edge weights, nor do we utilize unusual bit-level operations on memory words. Instead, our algorithms are based on a planarization method that "zeroes in" on edge crossings, together with methods for extending planar separator decompositions to geometric graphs with sublinearly many crossings. Incidentally, our planarization algorithm also solves an open computational geometry problem of Chazelle for triangulating a self-intersecting polygonal chain having n segments and k crossings in linear time, for the case when k is sublinear in n by an iterated logarithmic factor.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 10:29:00 GMT" }, { "version": "v2", "created": "Thu, 14 May 2009 02:07:34 GMT" } ]
2010-12-16T00:00:00
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Strash", "Darren", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0812.0904
Jun Kyoung Lee
Jun Kyoung Lee, Janghoon Yang, Dong Ku Kim
An Approximation of the Outage Probability for Multi-hop AF Fixed Gain Relay
3 pages, 3 figures, Submitted to IEEE Communication Letters
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this letter, we present a closed-form approximation of the outage probability for the multi-hop amplify-and-forward (AF) relaying systems with fixed gain in Rayleigh fading channel. The approximation is derived from the outage event for each hop. The simulation results show the tightness of the proposed approximation in low and high signal-to-noise ratio (SNR) region.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 11:45:48 GMT" } ]
2008-12-05T00:00:00
[ [ "Lee", "Jun Kyoung", "" ], [ "Yang", "Janghoon", "" ], [ "Kim", "Dong Ku", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0812.0933
Adam Kalai
Adam Tauman Kalai and Shang-Hua Teng
Decision trees are PAC-learnable from most product distributions: a smoothed analysis
null
null
null
null
cs.LG cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of PAC-learning decision trees, i.e., learning a decision tree over the n-dimensional hypercube from independent random labeled examples. Despite significant effort, no polynomial-time algorithm is known for learning polynomial-sized decision trees (even trees of any super-constant size), even when examples are assumed to be drawn from the uniform distribution on {0,1}^n. We give an algorithm that learns arbitrary polynomial-sized decision trees for {\em most product distributions}. In particular, consider a random product distribution where the bias of each bit is chosen independently and uniformly from, say, [.49,.51]. Then with high probability over the parameters of the product distribution and the random examples drawn from it, the algorithm will learn any tree. More generally, in the spirit of smoothed analysis, we consider an arbitrary product distribution whose parameters are specified only up to a [-c,c] accuracy (perturbation), for an arbitrarily small positive constant c.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 13:34:26 GMT" } ]
2008-12-05T00:00:00
[ [ "Kalai", "Adam Tauman", "" ], [ "Teng", "Shang-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0812.0956
Florian Hartig
Florian Hartig, Martin Horn, Martin Drechsler
EcoTRADE - a multi player network game of a tradable permit market for biodiversity credits
3 pages, 1 figure
Environmental Modelling & Software, 2010, 25, 1479-1480
10.1016/j.envsoft.2009.01.003
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
EcoTRADE is a multi player network game of a virtual biodiversity credit market. Each player controls the land use of a certain amount of parcels on a virtual landscape. The biodiversity credits of a particular parcel depend on neighboring parcels, which may be owned by other players. The game can be used to study the strategies of players in experiments or classroom games and also as a communication tool for stakeholders participating in credit markets that include spatially interdependent credits.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 15:43:16 GMT" }, { "version": "v2", "created": "Fri, 3 Sep 2010 16:53:24 GMT" } ]
2010-09-06T00:00:00
[ [ "Hartig", "Florian", "" ], [ "Horn", "Martin", "" ], [ "Drechsler", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.0972
Salah A. Aly
Salah A. Aly, Ahmed E. Kamal
Network Protection Codes: Providing Self-healing in Autonomic Networks Using Network Coding
12 pages, 2 figures, and 3 tables
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Agile recovery from link failures in autonomic communication networks is essential to increase robustness, accessibility, and reliability of data transmission. However, this must be done with the least amount of protection resources, while using simple management plane functionality. Recently, network coding has been proposed as a solution to provide agile and cost efficient network self-healing against link failures, in a manner that does not require data rerouting, packet retransmission, or failure localization, hence leading to simple control and management planes. To achieve this, separate paths have to be provisioned to carry encoded packets, hence requiring either the addition of extra links, or reserving some of the resources for this purpose. In this paper we introduce autonomic self-healing strategies for autonomic networks in order to protect against link failures. The strategies are based on network coding and reduced capacity, which is a technique that we call network protection codes (NPC). In these strategies, an autonomic network is able to provide self-healing from various network failures affecting network operation. The techniques improve service and enhance reliability of autonomic communication. Network protection codes are extended to provide self-healing from multiple link failures in autonomic networks. We provide implementation aspects of the proposed strategies. We present bounds and network protection code constructions. Finally, we study the construction of such codes over the binary field. The paper also develops an Integer Linear Program formulation to evaluate the cost of provisioning connections using the proposed strategies.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 20:59:28 GMT" }, { "version": "v2", "created": "Tue, 16 Dec 2008 05:13:13 GMT" } ]
2008-12-16T00:00:00
[ [ "Aly", "Salah A.", "" ], [ "Kamal", "Ahmed E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1012
Kamesh Munagala
Sudipto Guha and Kamesh Munagala
Adaptive Uncertainty Resolution in Bayesian Combinatorial Optimization Problems
Journal version of the paper "Model-driven Optimization using Adaptive Probes" that appeared in the ACM-SIAM Symposium on Discrete Algorithms (SODA), 2007
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In several applications such as databases, planning, and sensor networks, parameters such as selectivity, load, or sensed values are known only with some associated uncertainty. The performance of such a system (as captured by some objective function over the parameters) is significantly improved if some of these parameters can be probed or observed. In a resource constrained situation, deciding which parameters to observe in order to optimize system performance itself becomes an interesting and important optimization problem. This general problem is the focus of this paper. One of the most important considerations in this framework is whether adaptivity is required for the observations. Adaptive observations introduce blocking or sequential operations in the system whereas non-adaptive observations can be performed in parallel. One of the important questions in this regard is to characterize the benefit of adaptivity for probes and observation. We present general techniques for designing constant factor approximations to the optimal observation schemes for several widely used scheduling and metric objective functions. We show a unifying technique that relates this optimization problem to the outlier version of the corresponding deterministic optimization. By making this connection, our technique shows constant factor upper bounds for the benefit of adaptivity of the observation schemes. We show that while probing yields significant improvement in the objective function, being adaptive about the probing is not beneficial beyond constant factors.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 19:48:16 GMT" }, { "version": "v2", "created": "Mon, 14 Sep 2009 14:17:22 GMT" }, { "version": "v3", "created": "Thu, 28 Jan 2010 15:08:30 GMT" } ]
2010-01-28T00:00:00
[ [ "Guha", "Sudipto", "" ], [ "Munagala", "Kamesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.1014
Alaa Abi Haidar
Alaa Abi-Haidar and Luis M. Rocha
Adaptive Spam Detection Inspired by a Cross-Regulation Model of Immune Dynamics: A Study of Concept Drift
null
Artificial Immune Systems: 7th International Conference, (ICARIS 2008). Bentley, Peter; Lee, Doheon; Jung, Sungwon (Eds.) Lecture Notes in Computer Science. Springer-Verlag, 5132: 36-47
10.1007/978-3-540-85072-4_4
null
cs.AI cs.IR nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a novel solution to spam detection inspired by a model of the adaptive immune system known as the crossregulation model. We report on the testing of a preliminary algorithm on six e-mail corpora. We also compare our results statically and dynamically with those obtained by the Naive Bayes classifier and another binary classification method we developed previously for biomedical text-mining applications. We show that the cross-regulation model is competitive against those and thus promising as a bio-inspired algorithm for spam detection in particular, and binary classification in general.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 20:40:32 GMT" } ]
2008-12-05T00:00:00
[ [ "Abi-Haidar", "Alaa", "" ], [ "Rocha", "Luis M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0812.1029
Alaa Abi Haidar
Alaa Abi-Haidar, Jasleen Kaur, Ana G. Maguitman, Predrag Radivojac, Andreas Retchsteiner, Karin Verspoor, Zhiping Wang, Luis M. Rocha
Uncovering protein interaction in abstracts and text using a novel linear model and word proximity networks
null
Genome Biology 2008, 9(Suppl 2):S11
10.1186/gb-2008-9-s2-s11
null
cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We participated in three of the protein-protein interaction subtasks of the Second BioCreative Challenge: classification of abstracts relevant for protein-protein interaction (IAS), discovery of protein pairs (IPS) and text passages characterizing protein interaction (ISS) in full text documents. We approached the abstract classification task with a novel, lightweight linear model inspired by spam-detection techniques, as well as an uncertainty-based integration scheme. We also used a Support Vector Machine and the Singular Value Decomposition on the same features for comparison purposes. Our approach to the full text subtasks (protein pair and passage identification) includes a feature expansion method based on word-proximity networks. Our approach to the abstract classification task (IAS) was among the top submissions for this task in terms of the measures of performance used in the challenge evaluation (accuracy, F-score and AUC). We also report on a web-tool we produced using our approach: the Protein Interaction Abstract Relevance Evaluator (PIARE). Our approach to the full text tasks resulted in one of the highest recall rates as well as mean reciprocal rank of correct passages. Our approach to abstract classification shows that a simple linear model, using relatively few features, is capable of generalizing and uncovering the conceptual nature of protein-protein interaction from the bibliome. Since the novel approach is based on a very lightweight linear model, it can be easily ported and applied to similar problems. In full text problems, the expansion of word features with word-proximity networks is shown to be useful, though the need for some improvements is discussed.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 21:37:35 GMT" } ]
2008-12-08T00:00:00
[ [ "Abi-Haidar", "Alaa", "" ], [ "Kaur", "Jasleen", "" ], [ "Maguitman", "Ana G.", "" ], [ "Radivojac", "Predrag", "" ], [ "Retchsteiner", "Andreas", "" ], [ "Verspoor", "Karin", "" ], [ "Wang", "Zhiping", "" ], [ "Rocha", "Luis M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.1045
Bernardo Huberman
Bernardo A. Huberman, Daniel M. Romero, and Fang Wu
Social networks that matter: Twitter under the microscope
null
null
null
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scholars, advertisers and political activists see massive online social networks as a representation of social interactions that can be used to study the propagation of ideas, social bond dynamics and viral marketing, among others. But the linked structures of social networks do not reveal actual interactions among people. Scarcity of attention and the daily rythms of life and work makes people default to interacting with those few that matter and that reciprocate their attention. A study of social interactions within Twitter reveals that the driver of usage is a sparse and hidden network of connections underlying the declared set of friends and followers.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 22:52:20 GMT" } ]
2008-12-09T00:00:00
[ [ "Huberman", "Bernardo A.", "" ], [ "Romero", "Daniel M.", "" ], [ "Wu", "Fang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0812.1061
Daowen Qiu
Daowen Qiu, Xiangfu Zou, Lvzhou Li, Paulo Mateus
Decidability of the Equivalence of Multi-Letter Quantum Finite Automata
18 pages; this is a further revised version
null
null
null
cs.FL cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-letter {\it quantum finite automata} (QFAs) were a quantum variant of classical {\it one-way multi-head finite automata} (J. Hromkovi\v{c}, Acta Informatica 19 (1983) 377-384), and it has been shown that this new one-way QFAs (multi-letter QFAs) can accept with no error some regular languages $(a+b)^{*}b$ that are unacceptable by the previous one-way QFAs. In this paper, we study the decidability of the equivalence of multi-letter QFAs, and the main technical contributions are as follows: (1) We show that any two automata, a $k_{1}$-letter QFA ${\cal A}_1$ and a $k_{2}$-letter QFA ${\cal A}_2$, over the same input alphabet $\Sigma$ are equivalent if and only if they are $(n^2m^{k-1}-m^{k-1}+k)$-equivalent, where $m=|\Sigma|$ is the cardinality of $\Sigma$, $k=\max(k_{1},k_{2})$, and $n=n_{1}+n_{2}$, with $n_{1}$ and $n_{2}$ being the numbers of states of ${\cal A}_{1}$ and ${\cal A}_{2}$, respectively. When $k=1$, we obtain the decidability of equivalence of measure-once QFAs in the literature. It is worth mentioning that our technical method is essentially different from that for the decidability of the case of single input alphabet (i.e., $m=1$). (2) However, if we determine the equivalence of multi-letter QFAs by checking all strings of length not more than $ n^2m^{k-1}-m^{k-1}+k$, then the worst time complexity is exponential, i.e., $O(n^6m^{n^2m^{k-1}-m^{k-1}+2k-1})$. Therefore, we design a polynomial-time $O(m^{2k-1}n^{8}+km^kn^{6})$ algorithm for determining the equivalence of any two multi-letter QFAs. Here, the time complexity is concerning the number of states in the multi-letter QFAs, and $k$ is thought of as a constant.
[ { "version": "v1", "created": "Fri, 5 Dec 2008 00:53:20 GMT" }, { "version": "v2", "created": "Wed, 14 Jan 2009 03:06:42 GMT" }, { "version": "v3", "created": "Tue, 10 Mar 2009 19:47:59 GMT" }, { "version": "v4", "created": "Wed, 23 Dec 2009 13:42:54 GMT" }, { "version": "v5", "created": "Tue, 19 Oct 2010 02:21:30 GMT" }, { "version": "v6", "created": "Sun, 24 Oct 2010 10:05:51 GMT" } ]
2010-11-01T00:00:00
[ [ "Qiu", "Daowen", "" ], [ "Zou", "Xiangfu", "" ], [ "Li", "Lvzhou", "" ], [ "Mateus", "Paulo", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0812.1091
Rajiv Soundararajan Mr.
Rajiv Soundararajan and Sriram Vishwanath
Communicating the Difference of Correlated Gaussian Sources Over a MAC
8 pages, 2 figures, submitted to DCC 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the problem of transmitting the difference of two jointly Gaussian sources over a two-user additive Gaussian noise multiple access channel (MAC). The goal is to recover this difference within an average mean squared error distortion criterion. Each transmitter has access to only one of the two Gaussian sources and is limited by an average power constraint. In this work, a lattice coding scheme that achieves a distortion within a constant of a distortion lower bound is presented if the signal to noise ratio (SNR) is greater than a threshold. Further, uncoded transmission is shown to be worse in performance to lattice coding methods. An alternative lattice coding scheme is presented that can potentially improve on the performance of uncoded transmission.
[ { "version": "v1", "created": "Fri, 5 Dec 2008 08:34:12 GMT" } ]
2008-12-08T00:00:00
[ [ "Soundararajan", "Rajiv", "" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1093
Stephane Devismes
Ajoy K. Datta (UNLV), St\'ephane Devismes (VERIMAG - IMAG), Florian Horn (LIAFA), Lawrence L. Larmore (UNLV)
Self-stabilizing K-out-of-L exclusion on tree network
15 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the problem of K-out-of-L exclusion, a generalization of the mutual exclusion problem, in which there are $\ell$ units of a shared resource, and any process can request up to $\mathtt k$ units ($1\leq\mathtt k\leq\ell$). We propose the first deterministic self-stabilizing distributed K-out-of-L exclusion protocol in message-passing systems for asynchronous oriented tree networks which assumes bounded local memory for each process.
[ { "version": "v1", "created": "Fri, 5 Dec 2008 08:47:25 GMT" }, { "version": "v2", "created": "Sun, 7 Dec 2008 20:19:29 GMT" }, { "version": "v3", "created": "Fri, 19 Dec 2008 07:49:35 GMT" }, { "version": "v4", "created": "Fri, 13 Feb 2009 12:37:39 GMT" } ]
2009-09-29T00:00:00
[ [ "Datta", "Ajoy K.", "", "UNLV" ], [ "Devismes", "Stéphane", "", "VERIMAG - IMAG" ], [ "Horn", "Florian", "", "LIAFA" ], [ "Larmore", "Lawrence L.", "", "UNLV" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.1094
Philippe Thomas
Philippe Thomas (CRAN), Andr\'e Thomas (CRAN)
S\'election de la structure d'un perceptron multicouches pour la r\'eduction dun mod\`ele de simulation d'une scierie
7 pages
Conf\'erence Internationale Francophone d'Automatique CIFA'08, Bucarest : Roumanie (2008)
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simulation is often used to evaluate the relevance of a Directing Program of Production (PDP) or to evaluate its impact on detailed sc\'enarii of scheduling. Within this framework, we propose to reduce the complexity of a model of simulation by exploiting a multilayer perceptron. A main phase of the modeling of one system using a multilayer perceptron remains the determination of the structure of the network. We propose to compare and use various pruning algorithms in order to determine the optimal structure of the network used to reduce the complexity of the model of simulation of our case of application: a sawmill.
[ { "version": "v1", "created": "Fri, 5 Dec 2008 08:49:53 GMT" } ]
2008-12-08T00:00:00
[ [ "Thomas", "Philippe", "", "CRAN" ], [ "Thomas", "André", "", "CRAN" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0812.1119
Jinshan Zhang
Jinshan Zhang
An analysis of a random algorithm for estimating all the matchings
10 pages
null
null
null
cs.GR cs.AI
http://creativecommons.org/licenses/by/3.0/
Counting the number of all the matchings on a bipartite graph has been transformed into calculating the permanent of a matrix obtained from the extended bipartite graph by Yan Huo, and Rasmussen presents a simple approach (RM) to approximate the permanent, which just yields a critical ratio O($n\omega(n)$) for almost all the 0-1 matrices, provided it's a simple promising practical way to compute this #P-complete problem. In this paper, the performance of this method will be shown when it's applied to compute all the matchings based on that transformation. The critical ratio will be proved to be very large with a certain probability, owning an increasing factor larger than any polynomial of $n$ even in the sense for almost all the 0-1 matrices. Hence, RM fails to work well when counting all the matchings via computing the permanent of the matrix. In other words, we must carefully utilize the known methods of estimating the permanent to count all the matchings through that transformation.
[ { "version": "v1", "created": "Fri, 5 Dec 2008 12:16:53 GMT" } ]
2008-12-08T00:00:00
[ [ "Zhang", "Jinshan", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.1123
Jinshan Zhang
Jinshan Zhang
Improved Approximation for the Number of Hamiltonian Cycles in Dense Digraphs
20 pages
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an improved algorithm for counting the number of Hamiltonian cycles in a directed graph. The basic idea of the method is sequential acceptance/rejection, which is successfully used in approximating the number of perfect matchings in dense bipartite graphs. As a consequence, a new bound on the number of Hamiltonian cycles in a directed graph is proved, by using the ratio of the number of 1-factors. Based on this bound, we prove that our algorithm runs in expected time of $O(n^{8.5})$ for dense problems. This improves the Markov chain method, the most powerful existing method, a factor of at least $n^{4.5}(\log n)^{4}$ in running time. This class of dense problems is shown to be nontrivial in counting, in the sense that it is $#$P-Complete.
[ { "version": "v1", "created": "Fri, 5 Dec 2008 12:28:57 GMT" }, { "version": "v2", "created": "Sun, 7 Dec 2008 17:15:05 GMT" }, { "version": "v3", "created": "Mon, 12 Jan 2009 13:05:39 GMT" }, { "version": "v4", "created": "Sat, 21 Nov 2009 08:13:36 GMT" } ]
2009-11-23T00:00:00
[ [ "Zhang", "Jinshan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.1126
Dimitris Kalles
Dimitris Kalles, Alexis Kaporis
Emerge-Sort: Converging to Ordered Sequences by Simple Local Operators
Contains 16 pages, 17 figures, 1 table. Text updated as of March 10, 2009. Submitted to a journal
null
null
null
cs.AI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we examine sorting on the assumption that we do not know in advance which way to sort a sequence of numbers and we set at work simple local comparison and swap operators whose repeating application ends up in sorted sequences. These are the basic elements of Emerge-Sort, our approach to self-organizing sorting, which we then validate experimentally across a range of samples. Observing an O(n2) run-time behaviour, we note that the n/logn delay coefficient that differentiates Emerge-Sort from the classical comparison based algorithms is an instantiation of the price of anarchy we pay for not imposing a sorting order and for letting that order emerge through the local interactions.
[ { "version": "v1", "created": "Fri, 5 Dec 2008 12:57:00 GMT" }, { "version": "v2", "created": "Tue, 10 Mar 2009 22:42:43 GMT" } ]
2009-03-11T00:00:00
[ [ "Kalles", "Dimitris", "" ], [ "Kaporis", "Alexis", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.1155
Shan Mei
Shan Mei, P.M.A Sloot, Rick Quax, Yifan Zhu, Weiping Wang
Complex Agent Networks explaining the HIV epidemic among homosexual men in Amsterdam
21 pages, 4 figures, Mathematics and Computers in Simulation, added references
null
null
null
cs.MA q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simulating the evolution of the Human Immunodeficiency Virus (HIV) epidemic requires a detailed description of the population network, especially for small populations in which individuals can be represented in detail and accuracy. In this paper, we introduce the concept of a Complex Agent Network(CAN) to model the HIV epidemics by combining agent-based modelling and complex networks, in which agents represent individuals that have sexual interactions. The applicability of CANs is demonstrated by constructing and executing a detailed HIV epidemic model for men who have sex with men (MSM) in Amsterdam, including a distinction between steady and casual relationships. We focus on MSM contacts because they play an important role in HIV epidemics and have been tracked in Amsterdam for a long time. Our experiments show good correspondence between the historical data of the Amsterdam cohort and the simulation results.
[ { "version": "v1", "created": "Fri, 5 Dec 2008 15:18:38 GMT" }, { "version": "v2", "created": "Mon, 16 Feb 2009 13:02:54 GMT" } ]
2009-02-16T00:00:00
[ [ "Mei", "Shan", "" ], [ "Sloot", "P. M. A", "" ], [ "Quax", "Rick", "" ], [ "Zhu", "Yifan", "" ], [ "Wang", "Weiping", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" } ]
0812.1194
Gabriel Istrate
Gabriel Istrate, Madhav V. Marathe and S. S. Ravi
Adversarial Scheduling in Evolutionary Game Dynamics
null
null
null
null
cs.DM cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a system in which players at nodes of an underlying graph G repeatedly play Prisoner's Dilemma against their neighbors. The players adapt their strategies based on the past behavior of their opponents by applying the so-called win-stay lose-shift strategy. This dynamics has been studied in (Kittock 94), (Dyer et al. 2002), (Mossel and Roch, 2006). With random scheduling, starting from any initial configuration with high probability the system reaches the unique fixed point in which all players cooperate. This paper investigates the validity of this result under various classes of adversarial schedulers. Our results can be sumarized as follows: 1. An adversarial scheduler that can select both participants to the game can preclude the system from reaching the unique fixed point on most graph topologies. 2. A nonadaptive scheduler that is only allowed to choose one of the participants is no more powerful than a random scheduler. With this restriction even an adaptive scheduler is not significantly more powerful than the random scheduler, provided it is "reasonably fair". The results exemplify the adversarial scheduling approach we propose as a foundational basis for the generative approach to social science (Epstein 2007).
[ { "version": "v1", "created": "Fri, 5 Dec 2008 18:50:20 GMT" } ]
2008-12-08T00:00:00
[ [ "Istrate", "Gabriel", "" ], [ "Marathe", "Madhav V.", "" ], [ "Ravi", "S. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.1200
Saugata Basu
Saugata Basu and Thierry Zell
Polynomial hierarchy, Betti numbers and a real analogue of Toda's theorem
Final version to appear in Found. Comput. Math
Found. Comput. Math, 10:429-454, 2010
null
null
cs.CC math.AT math.CO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Toda proved in 1989 that the (discrete) polynomial time hierarchy, $\mathbf{PH}$, is contained in the class $\mathbf{P}^{#\mathbf{P}}$, namely the class of languages that can be decided by a Turing machine in polynomial time given access to an oracle with the power to compute a function in the counting complexity class $#\mathbf{P}$. This result which illustrates the power of counting is considered to be a seminal result in computational complexity theory. An analogous result in the complexity theory over the reals (in the sense of Blum-Shub-Smale real machines) has been missing so far. In this paper we formulate and prove a real analogue of Toda's theorem. Unlike Toda's proof in the discrete case, which relied on sophisticated combinatorial arguments, our proof is topological in nature. As a consequence of our techniques we are also able to relate the computational hardness of two extremely well-studied problems in algorithmic semi-algebraic geometry -- namely the problem of deciding sentences in the first order theory of the reals with a constant number of quantifier alternations, and that of computing Betti numbers of semi-algebraic sets. We obtain a polynomial time reduction of the compact version of the first problem to the second. This latter result might be of independent interest to researchers in algorithmic semi-algebraic geometry.
[ { "version": "v1", "created": "Fri, 5 Dec 2008 19:09:27 GMT" }, { "version": "v2", "created": "Wed, 1 Apr 2009 18:23:05 GMT" }, { "version": "v3", "created": "Sat, 9 Jan 2010 20:45:52 GMT" } ]
2011-02-02T00:00:00
[ [ "Basu", "Saugata", "" ], [ "Zell", "Thierry", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.AT", "description": "Homotopy theory, homological algebra, algebraic treatments of manifolds", "span": "(Algebraic Topology)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0812.1203
Jamshid Abouei
Jamshid Abouei, Hossein Bagheri, and Amir K. Khandani
An Efficient Adaptive Distributed Space-Time Coding Scheme for Cooperative Relaying
submitted to IEEE Transactions on Wireless Communications (24 pages)
IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 4957-4962, Oct. 2009
10.1109/TWC.2009.081615
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A non-regenerative dual-hop wireless system based on a distributed space-time coding strategy is considered. It is assumed that each relay retransmits an appropriately scaled space-time coded version of its received signal. The main goal of this paper is to investigate a power allocation strategy in relay stations, which is based on minimizing the outage probability. In the high signal-to-noise ratio regime for the relay-destination link, it is shown that a threshold-based power allocation scheme (i.e., the relay remains silent if its channel gain with the source is less than a prespecified threshold) is optimum. Monte-Carlo simulations show that the derived on-off power allocation scheme performs close to optimum for finite signal-to-noise ratio values. Numerical results demonstrate a dramatic improvement in system performance as compared to the case that the relay stations forward their received signals with full power. In addition, a hybrid amplify-and-forward/detect-and-forward scheme is proposed for the case that the quality of the source-relay link is good. Finally, the robustness of the proposed scheme in the presence of channel estimation errors is numerically evaluated.
[ { "version": "v1", "created": "Fri, 5 Dec 2008 19:34:03 GMT" }, { "version": "v2", "created": "Mon, 8 Dec 2008 02:02:57 GMT" } ]
2016-11-18T00:00:00
[ [ "Abouei", "Jamshid", "" ], [ "Bagheri", "Hossein", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1218
Amos David
Amos David (LORIA)
The Impact of New Technologies in Public Financial Management and Performance: Agenda for Public Financial Management Reformance in the Context of Global Best Practices
null
6th Nigeria Development Forum Retreat (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information and Communication Technologies (ICT) has practically penetrated into all spheres of life. Therefore a closer look at the impact of ICT in public financial management and performance is highly justified. Public finance is defined as a field of economics concerned with paying for collective or governmental activities, and with the administration and design of those activities. Activities will be viewed as services or more precisely as public services. We believe that there is need to consider performance from the perspective of effective performance and the perceived performance. In fact the real or effective performance might not correspond to the perceived performance. A service can be considered from the perspective of the decision-maker, who in our case could be a government or a collectivity. ICT can be employed in the three phases that concern the decision-maker: design, implementation and evaluation. The beneficiaries of a service can employ ICT in any of the three phases - awareness, exploitation and assessment - for guarantying a high level of efficiency. Each phase in the environment of a service will be presented as well as illustrations of how ICT can be employed in order to improve the end-result of each one of them. We believe that a high efficiency of each phase will produce a high global efficiency. It should be noted however that the effectiveness of any system is highly dependent on the human engagement in the system. Therefore, the impact of ICT in public financial management will be felt only if the decision-makers and the end-users of the services engage themselves in the success of the system. Instead of giving a catalog of services, the focus has been on the model (or methodology) to adopt in designing services for which ICT could enhance the implementation.
[ { "version": "v1", "created": "Fri, 5 Dec 2008 20:49:47 GMT" } ]
2008-12-08T00:00:00
[ [ "David", "Amos", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0812.1244
Fangwen Fu
Fangwen Fu, Mihaela van der Schaar
Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications
30 pages, 10 figures
null
null
null
cs.MM cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a general cross-layer optimization framework in which we explicitly consider both the heterogeneous and dynamically changing characteristics of delay-sensitive applications and the underlying time-varying network conditions. We consider both the independently decodable data units (DUs, e.g. packets) and the interdependent DUs whose dependencies are captured by a directed acyclic graph (DAG). We first formulate the cross-layer design as a non-linear constrained optimization problem by assuming complete knowledge of the application characteristics and the underlying network conditions. The constrained cross-layer optimization is decomposed into several cross-layer optimization subproblems for each DU and two master problems. The proposed decomposition method determines the necessary message exchanges between layers for achieving the optimal cross-layer solution. However, the attributes (e.g. distortion impact, delay deadline etc) of future DUs as well as the network conditions are often unknown in the considered real-time applications. The impact of current cross-layer actions on the future DUs can be characterized by a state-value function in the Markov decision process (MDP) framework. Based on the dynamic programming solution to the MDP, we develop a low-complexity cross-layer optimization algorithm using online learning for each DU transmission. This online algorithm can be implemented in real-time in order to cope with unknown source characteristics, network dynamics and resource constraints. Our numerical results demonstrate the efficiency of the proposed online algorithm.
[ { "version": "v1", "created": "Fri, 5 Dec 2008 23:14:41 GMT" } ]
2008-12-09T00:00:00
[ [ "Fu", "Fangwen", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.1291
Anthony Widjaja To
Anthony Widjaja To
Unary finite automata vs. arithmetic progressions
Journal paper submitted
null
null
null
cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We point out a subtle error in the proof of Chrobak's theorem that every unary NFA can be represented as a union of arithmetic progressions that is at most quadratically large. We propose a correction for this and show how Martinez's polynomial time algorithm, which realizes Chrobak's theorem, can be made correct accordingly. We also show that Martinez's algorithm cannot be improved to have logarithmic space, unless L = NL.
[ { "version": "v1", "created": "Sat, 6 Dec 2008 14:18:05 GMT" } ]
2008-12-09T00:00:00
[ [ "To", "Anthony Widjaja", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0812.1321
Aleksandrs Slivkins
Matthew Andrews and Aleksandrs Slivkins
Oscillations with TCP-like Flow Control in Networks of Queues
Preliminary version has appeared in IEEE INFOCOM 2006. The current version is dated November 2005, with a minor revision in December 2008
null
null
null
cs.NI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a set of flows passing through a set of servers. The injection rate into each flow is governed by a flow control that increases the injection rate when all the servers on the flow's path are empty and decreases the injection rate when some server is congested. We show that if each server's congestion is governed by the arriving traffic at the server then the system can *oscillate*. This is in contrast to previous work on flow control where congestion was modeled as a function of the flow injection rates and the system was shown to converge to a steady state that maximizes an overall network utility.
[ { "version": "v1", "created": "Sat, 6 Dec 2008 23:57:44 GMT" } ]
2008-12-09T00:00:00
[ [ "Andrews", "Matthew", "" ], [ "Slivkins", "Aleksandrs", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.1340
Baris Baykant Alagoz
B. Baykant Alagoz
Obtaining Depth Maps From Color Images By Region Based Stereo Matching Algorithms
New figures were added
OncuBilim Algorithm And Systems Labs. Vol.08, Art.No:04,(2008)
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the paper, region based stereo matching algorithms are developed for extraction depth information from two color stereo image pair. A filter eliminating unreliable disparity estimation was used for increasing reliability of the disparity map. Obtained results by algorithms were represented and compared.
[ { "version": "v1", "created": "Sun, 7 Dec 2008 11:42:41 GMT" }, { "version": "v2", "created": "Tue, 3 Feb 2009 16:31:46 GMT" } ]
2009-02-03T00:00:00
[ [ "Alagoz", "B. Baykant", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0812.1357
Qiang Li
Qiang Li, Yan He, Jing-ping Jiang
A Novel Clustering Algorithm Based on Quantum Random Walk
14 pages, 6 figures, 3 tables
null
null
null
cs.LG
http://creativecommons.org/licenses/by-nc-sa/3.0/
The enormous successes have been made by quantum algorithms during the last decade. In this paper, we combine the quantum random walk (QRW) with the problem of data clustering, and develop two clustering algorithms based on the one dimensional QRW. Then, the probability distributions on the positions induced by QRW in these algorithms are investigated, which also indicates the possibility of obtaining better results. Consequently, the experimental results have demonstrated that data points in datasets are clustered reasonably and efficiently, and the clustering algorithms are of fast rates of convergence. Moreover, the comparison with other algorithms also provides an indication of the effectiveness of the proposed approach.
[ { "version": "v1", "created": "Sun, 7 Dec 2008 15:22:27 GMT" } ]
2008-12-09T00:00:00
[ [ "Li", "Qiang", "" ], [ "He", "Yan", "" ], [ "Jiang", "Jing-ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.1364
Johann Makowsky
Benny Godlin, Emilia Katz, Johann A. Makowsky
Graph Polynomials: From Recursive Definitions To Subset Expansion Formulas
25 pages, 2 figures
Journal of Logic and Computation, Volume 22(2), (2012) Pages 237-265
null
null
cs.LO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many graph polynomials, such as the Tutte polynomial, the interlace polynomial and the matching polynomial, have both a recursive definition and a defining subset expansion formula. In this paper we present a general, logic-based framework which gives a precise meaning to recursive definitions of graph polynomials. We then prove that in this framework every recursive definition of a graph polynomial can be converted into a subset expansion formula.
[ { "version": "v1", "created": "Sun, 7 Dec 2008 16:50:53 GMT" } ]
2013-09-10T00:00:00
[ [ "Godlin", "Benny", "" ], [ "Katz", "Emilia", "" ], [ "Makowsky", "Johann A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.1379
Leonid Barenboim
Leonid Barenboim and Michael Elkin
Distributed (Delta + 1)-coloring in linear (in Delta) time
12 pages, 2 figures. Contents added: pages 11-12
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The distributed (Delta + 1)-coloring problem is one of most fundamental and well-studied problems of Distributed Algorithms. Starting with the work of Cole and Vishkin in 86, there was a long line of gradually improving algorithms published. The current state-of-the-art running time is O(Delta log Delta + log^* n), due to Kuhn and Wattenhofer, PODC'06. Linial (FOCS'87) has proved a lower bound of 1/2 \log^* n for the problem, and Szegedy and Vishwanathan (STOC'93) provided a heuristic argument that shows that algorithms from a wide family of locally iterative algorithms are unlikely to achieve running time smaller than \Theta(Delta log Delta). We present a deterministic (Delta + 1)-coloring distributed algorithm with running time O(Delta) + 1/2 log^* n. We also present a tradeoff between the running time and the number of colors, and devise an O(Delta * t)-coloring algorithm with running time O(Delta / t + \log^* n), for any parameter t, 1 < t < Delta^{1-epsilon}, for an arbitrarily small constant epsilon, 0 < epsilon < 1. On the way to this result we study a generalization of the notion of graph coloring, which is called defective coloring. In an m-defective p-coloring the vertices are colored with p colors so that each vertex has up to m neighbors with the same color. We show that an m-defective p-coloring with reasonably small m and p can be computed very efficiently. We also develop a technique to employ multiple defect colorings of various subgraphs of the original graph G for computing a (Delta+1)-coloring of G. We believe that these techniques are of independent interest.
[ { "version": "v1", "created": "Sun, 7 Dec 2008 20:44:28 GMT" }, { "version": "v2", "created": "Fri, 26 Dec 2008 10:45:09 GMT" } ]
2008-12-26T00:00:00
[ [ "Barenboim", "Leonid", "" ], [ "Elkin", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.1385
Javaid Aslam
Javaid Aslam
An Extension of the Permutation Group Enumeration Technique (Collapse of the Polynomial Hierarchy: $\mathbf{NP = P}$)
Revisions: Some re-organization-- created a new Section 5 and minor revisions
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The distinguishing result of this paper is a $\mathbf{P}$-time enumerable partition of all the potential perfect matchings in a bipartite graph. This partition is a set of equivalence classes induced by the missing edges in the potential perfect matchings. We capture the behavior of these missing edges in a polynomially bounded representation of the exponentially many perfect matchings by a graph theoretic structure, called MinSet Sequence, where MinSet is a P-time enumerable structure derived from a graph theoretic counterpart of a generating set of the symmetric group. This leads to a polynomially bounded generating set of all the classes, enabling the enumeration of perfect matchings in polynomial time. The sequential time complexity of this $\mathbf{\#P}$-complete problem is shown to be $O(n^{45}\log n)$. And thus we prove a result even more surprising than $\mathbf{NP = P}$, that is, $\mathbf{\#P}=\mathbf{FP}$, where $\mathbf{FP}$ is the class of functions, $f: \{0, 1\}^* \rightarrow \mathbb{N} $, computable in polynomial time on a deterministic model of computation.
[ { "version": "v1", "created": "Sun, 7 Dec 2008 19:47:28 GMT" }, { "version": "v10", "created": "Mon, 30 Mar 2009 19:41:25 GMT" }, { "version": "v11", "created": "Tue, 7 Apr 2009 18:35:11 GMT" }, { "version": "v12", "created": "Mon, 19 Jan 2015 20:21:59 GMT" }, { "version": "v13", "created": "Thu, 22 Jan 2015 20:45:26 GMT" }, { "version": "v14", "created": "Thu, 5 Feb 2015 20:56:47 GMT" }, { "version": "v15", "created": "Sun, 22 Feb 2015 20:36:42 GMT" }, { "version": "v16", "created": "Wed, 15 Jul 2015 18:44:43 GMT" }, { "version": "v17", "created": "Thu, 30 Jul 2015 19:48:56 GMT" }, { "version": "v18", "created": "Thu, 8 Oct 2015 19:04:26 GMT" }, { "version": "v19", "created": "Mon, 12 Oct 2015 19:57:44 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2008 19:30:19 GMT" }, { "version": "v20", "created": "Thu, 15 Oct 2015 19:48:04 GMT" }, { "version": "v21", "created": "Sun, 18 Oct 2015 19:20:04 GMT" }, { "version": "v22", "created": "Sat, 2 Jan 2016 01:31:54 GMT" }, { "version": "v23", "created": "Thu, 3 Mar 2016 20:53:32 GMT" }, { "version": "v24", "created": "Sat, 26 Aug 2017 06:08:03 GMT" }, { "version": "v25", "created": "Sun, 17 Sep 2017 22:52:14 GMT" }, { "version": "v26", "created": "Mon, 30 Oct 2017 08:01:46 GMT" }, { "version": "v3", "created": "Thu, 25 Dec 2008 20:43:33 GMT" }, { "version": "v4", "created": "Mon, 12 Jan 2009 17:03:53 GMT" }, { "version": "v5", "created": "Tue, 20 Jan 2009 21:05:32 GMT" }, { "version": "v6", "created": "Mon, 26 Jan 2009 20:56:54 GMT" }, { "version": "v7", "created": "Wed, 28 Jan 2009 20:50:44 GMT" }, { "version": "v8", "created": "Fri, 6 Feb 2009 20:43:25 GMT" }, { "version": "v9", "created": "Mon, 9 Mar 2009 18:58:19 GMT" } ]
2017-10-31T00:00:00
[ [ "Aslam", "Javaid", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.1390
Frederic Chazal
Fr\'ed\'eric Chazal (INRIA Sophia Antipolis, INRIA Sophia Antipolis / INRIA Futurs), David Cohen-Steiner (INRIA Sophia Antipolis, INRIA Sophia Antipolis / INRIA Futurs), Andr\'e Lieutier (LJK), Boris Thibert (LJK, LMC - IMAG)
Stability of Curvature Measures
null
null
null
RR-6756
cs.CG math.DG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of curvature estimation from sampled compact sets. The main contribution is a stability result: we show that the gaussian, mean or anisotropic curvature measures of the offset of a compact set K with positive $\mu$-reach can be estimated by the same curvature measures of the offset of a compact set K' close to K in the Hausdorff sense. We show how these curvature measures can be computed for finite unions of balls. The curvature measures of the offset of a compact set with positive $\mu$-reach can thus be approximated by the curvature measures of the offset of a point-cloud sample. These results can also be interpreted as a framework for an effective and robust notion of curvature.
[ { "version": "v1", "created": "Sun, 7 Dec 2008 19:58:52 GMT" } ]
2008-12-09T00:00:00
[ [ "Chazal", "Frédéric", "", "INRIA Sophia Antipolis, INRIA Sophia Antipolis /\n INRIA Futurs" ], [ "Cohen-Steiner", "David", "", "INRIA Sophia Antipolis, INRIA Sophia\n Antipolis / INRIA Futurs" ], [ "Lieutier", "André", "", "LJK" ], [ "Thibert", "Boris", "", "LJK, LMC -\n IMAG" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.DG", "description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis", "span": "(Differential Geometry)" } ]
0812.1394
Sahbi Sidhom
Sahbi Sidhom (LORIA, Sii)
Conceptual approach through an annotation process for the representation and the information contents enhancement in economic intelligence (EI)
null
Journal of Global Management Research (2008) 15 pages
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the era of the information society, the impact of the information systems on the economy of material and immaterial is certainly perceptible. With regards to the information resources of an organization, the annotation involved to enrich informational content, to track the intellectual activities on a document and to set the added value on information for the benefit of solving a decision-making problem in the context of economic intelligence. Our contribution is distinguished by the representation of an annotation process and its inherent concepts to lead the decisionmaker to an anticipated decision: the provision of relevant and annotated information. Such information in the system is made easy by taking into account the diversity of resources and those that are well annotated so formally and informally by the EI actors. A capital research framework consist of integrating in the decision-making process the annotator activity, the software agent (or the reasoning mechanisms) and the information resources enhancement.
[ { "version": "v1", "created": "Sun, 7 Dec 2008 20:07:37 GMT" } ]
2008-12-10T00:00:00
[ [ "Sidhom", "Sahbi", "", "LORIA, Sii" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0812.1405
Stefan Geirhofer
Stefan Geirhofer, Lang Tong, and Brian M. Sadler
Cognitive Coexistence between Infrastructure and Ad-hoc Systems
Submitted to IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rapid proliferation of wireless systems makes interference management more and more important. This paper presents a novel cognitive coexistence framework, which enables an infrastructure system to reduce interference to ad-hoc or peer-to-peer communication links in close proximity. Motivated by the superior resources of the infrastructure system, we study how its centralized resource allocation can accommodate the ad-hoc links based on sensing and predicting their interference patterns. Based on an ON/OFF continuous-time Markov chain model, the optimal allocation of power and transmission time is formulated as a convex optimization problem and closed-form solutions are derived. The optimal scheduling is extended to the case where the infrastructure channel is random and rate constraints need only be met in the long-term average. Finally, the multi-terminal case is addressed and the problem of optimal sub-channel allocation discussed. Numerical performance analysis illustrates that utilizing the superior flexibility of the infrastructure links can effectively mitigate interference.
[ { "version": "v1", "created": "Sun, 7 Dec 2008 22:49:12 GMT" } ]
2008-12-09T00:00:00
[ [ "Geirhofer", "Stefan", "" ], [ "Tong", "Lang", "" ], [ "Sadler", "Brian M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1462
Paolo Ferraris
Paolo Ferraris
Logic programs with propositional connectives and aggregates
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Answer set programming (ASP) is a logic programming paradigm that can be used to solve complex combinatorial search problems. Aggregates are an ASP construct that plays an important role in many applications. Defining a satisfactory semantics of aggregates turned out to be a difficult problem, and in this paper we propose a new approach, based on an analogy between aggregates and propositional connectives. First, we extend the definition of an answer set/stable model to cover arbitrary propositional theories; then we define aggregates on top of them both as primitive constructs and as abbreviations for formulas. Our definition of an aggregate combines expressiveness and simplicity, and it inherits many theorems about programs with nested expressions, such as theorems about strong equivalence and splitting.
[ { "version": "v1", "created": "Mon, 8 Dec 2008 11:09:14 GMT" } ]
2008-12-09T00:00:00
[ [ "Ferraris", "Paolo", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.1553
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy, Deli Qiao, and Senem Velipasalar
Analysis of Energy Efficiency in Fading Channels under QoS Constraints
conference version appeared at Globecom 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy efficiency in fading channels in the presence of Quality of Service (QoS) constraints is studied. Effective capacity, which provides the maximum arrival rate that a wireless channel can sustain while satisfying statistical QoS constraints, is considered. Spectral efficiency--bit energy tradeoff is analyzed in the low-power and wideband regimes by employing the effective capacity formulation, rather than the Shannon capacity. Through this analysis, energy requirements under QoS constraints are identified. The analysis is conducted under two assumptions: perfect channel side information (CSI) available only at the receiver and perfect CSI available at both the receiver and transmitter. In particular, it is shown in the low-power regime that the minimum bit energy required under QoS constraints is the same as that attained when there are no such limitations. However, this performance is achieved as the transmitted power vanishes. Through the wideband slope analysis, the increased energy requirements at low but nonzero power levels in the presence of QoS constraints are determined. A similar analysis is also conducted in the wideband regime, and minimum bit energy and wideband slope expressions are obtained. In this regime, the required bit energy levels are found to be strictly greater than those achieved when Shannon capacity is considered. Overall, a characterization of the energy-bandwidth-delay tradeoff is provided.
[ { "version": "v1", "created": "Mon, 8 Dec 2008 20:34:54 GMT" } ]
2008-12-09T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ], [ "Qiao", "Deli", "" ], [ "Velipasalar", "Senem", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1554
Andrew Eckford
Andrew W. Eckford
Molecular communication: Physically realistic models and achievable information rates
Submitted to IEEE Transactions on Information Theory. 28 pages, 8 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Molecular communication is a biologically-inspired method of communication with attractive properties for microscale and nanoscale devices. In molecular communication, messages are transmitted by releasing a pattern of molecules at a transmitter, which propagate through a fluid medium towards a receiver. In this paper, molecular communication is formulated as a mathematical communication problem in an information-theoretic context. Physically realistic models are obtained, with sufficient abstraction to allow manipulation by communication and information theorists. Although mutual information in these channels is intractable, we give sequences of upper and lower bounds on the mutual information which trade off complexity and performance, and present results to illustrate the feasibility of these bounds in estimating the true mutual information.
[ { "version": "v1", "created": "Mon, 8 Dec 2008 20:41:02 GMT" } ]
2008-12-09T00:00:00
[ [ "Eckford", "Andrew W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1557
Mustafa Cenk Gursoy
Junwei Zhang and Mustafa Cenk Gursoy
To Cooperate, or Not to Cooperate in Imperfectly-Known Fading Channels
appeared at IEEE SPAWC 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, communication over imperfectly-known fading channels with different degrees of cooperation is studied. The three-node relay channel is considered. It is assumed that communication starts with the network training phase in which the receivers estimate the fading coefficients of their respective channels. In the data transmission phase, amplify-and-forward and decode-and-forward relaying schemes are employed. For different cooperation protocols, achievable rate expressions are obtained. These achievable rate expressions are then used to find the optimal resource allocation strategies. In particular, the fraction of total time or bandwidth that needs to be allocated to the relay for best performance is identified. Under a total power constraint, optimal allocation of power between the source and relay is investigated. Finally, bit energy requirements in the low-power regime are studied.
[ { "version": "v1", "created": "Mon, 8 Dec 2008 20:49:30 GMT" } ]
2008-12-09T00:00:00
[ [ "Zhang", "Junwei", "" ], [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1558
Mustafa Cenk Gursoy
Sami Akin and Mustafa Cenk Gursoy
Pilot-Symbol-Assisted Communications with Noncausal and Causal Wiener Filters
appeared at IEEE SPAWC 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, pilot-assisted transmission over time-selective flat fading channels is studied. It is assumed that noncausal and causal Wiener filters are employed at the receiver to perform channel estimation with the aid of training symbols sent periodically by the transmitter. For both filters, the variances of estimate errors are obtained from the Doppler power spectrum of the channel. Subsequently, achievable rate expressions are provided. The training period, and data and training power allocations are jointly optimized by maximizing the achievable rate expressions. Numerical results are obtained by modeling the fading as a Gauss-Markov process. The achievable rates of causal and noncausal filtering approaches are compared. For the particular ranges of parameters considered in the paper, the performance loss incurred by using a causal filter as opposed to a noncausal filter is shown to be small. The impact of aliasing that occurs in the undersampled version of the channel Doppler spectrum due to fast fading is analyzed. Finally, energy-per-bit requirements are investigated in the presence of noncausal and causal Wiener filters.
[ { "version": "v1", "created": "Mon, 8 Dec 2008 20:54:32 GMT" } ]
2008-12-09T00:00:00
[ [ "Akin", "Sami", "" ], [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1560
Mustafa Cenk Gursoy
Sami Akin and Mustafa Cenk Gursoy
Achievable Rates and Training Optimization for Fading Relay Channels with Memory
appeared at CISS 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, transmission over time-selective, flat fading relay channels is studied. It is assumed that channel fading coefficients are not known a priori. Transmission takes place in two phases: network training phase and data transmission phase. In the training phase, pilot symbols are sent and the receivers employ single-pilot MMSE estimation or noncausal Wiener filter to learn the channel. Amplify-and-Forward (AF) and Decode-and-Forward (DF) techniques are considered in the data transmission phase and achievable rate expressions are obtained. The training period, and data and training power allocations are jointly optimized by using the achievable rate expressions. Numerical results are obtained considering Gauss-Markov and lowpass fading models. Achievable rates are computed and energy-per-bit requirements are investigated. The optimal power distributions among pilot and data symbols are provided.
[ { "version": "v1", "created": "Mon, 8 Dec 2008 20:59:12 GMT" } ]
2008-12-09T00:00:00
[ [ "Akin", "Sami", "" ], [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1587
Radu Mihaescu
Radu Mihaescu, Cameron Hill, Satish Rao
Fast phylogeny reconstruction through learning of ancestral sequences
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given natural limitations on the length DNA sequences, designing phylogenetic reconstruction methods which are reliable under limited information is a crucial endeavor. There have been two approaches to this problem: reconstructing partial but reliable information about the tree (\cite{Mo07, DMR08,DHJ06,GMS08}), and reaching "deeper" in the tree through reconstruction of ancestral sequences. In the latter category, \cite{DMR06} settled an important conjecture of M.Steel, showing that, under the CFN model of evolution, all trees on $n$ leaves with edge lengths bounded by the Ising model phase transition can be recovered with high probability from genomes of length $O(\log n)$ with a polynomial time algorithm. Their methods had a running time of $O(n^{10})$. Here we enhance our methods from \cite{DHJ06} with the learning of ancestral sequences and provide an algorithm for reconstructing a sub-forest of the tree which is reliable given available data, without requiring a-priori known bounds on the edge lengths of the tree. Our methods are based on an intuitive minimum spanning tree approach and run in $O(n^3)$ time. For the case of full reconstruction of trees with edges under the phase transition, we maintain the same sequence length requirements as \cite{DMR06}, despite the considerably faster running time.
[ { "version": "v1", "created": "Mon, 8 Dec 2008 22:51:02 GMT" } ]
2008-12-10T00:00:00
[ [ "Mihaescu", "Radu", "" ], [ "Hill", "Cameron", "" ], [ "Rao", "Satish", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.1595
Aparna Das
Aparna Das, Claire Mathieu
A quasi-polynomial time approximation scheme for Euclidean capacitated vehicle routing
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the capacitated vehicle routing problem, introduced by Dantzig and Ramser in 1959, we are given the locations of n customers and a depot, along with a vehicle of capacity k, and wish to find a minimum length collection of tours, each starting from the depot and visiting at most k customers, whose union covers all the customers. We give a quasi-polynomial time approximation scheme for the setting where the customers and the depot are on the plane, and distances are given by the Euclidean metric.
[ { "version": "v1", "created": "Mon, 8 Dec 2008 23:58:17 GMT" } ]
2008-12-10T00:00:00
[ [ "Das", "Aparna", "" ], [ "Mathieu", "Claire", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.1597
Soheil Mohajer
Soheil Mohajer, Suhas N. Diggavi, Christina Fragouli, David N. C. Tse
Transmission Techniques for Relay-Interference Networks
8 pages, 8 figures, presented at 46. Allerton Conf. On Comm., Control, and Computing 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the relay-interference wireless network, in which relay (helper) nodes are to facilitate competing information flows over a wireless network. We examine this in the context of a deterministic wireless interaction model, which eliminates the channel noise and focuses on the signal interactions. Using this model, we show that almost all the known schemes such as interference suppression, interference alignment and interference separation are necessary for relay-interference networks. In addition, we discover a new interference management technique, which we call interference neutralization, which allows for over-the-air interference removal, without the transmitters having complete access the interfering signals. We show that interference separation, suppression, and neutralization arise in a fundamental manner, since we show complete characterizations for special configurations of the relay-interference network.
[ { "version": "v1", "created": "Tue, 9 Dec 2008 00:20:30 GMT" } ]
2008-12-10T00:00:00
[ [ "Mohajer", "Soheil", "" ], [ "Diggavi", "Suhas N.", "" ], [ "Fragouli", "Christina", "" ], [ "Tse", "David N. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1599
Jake Ellowitz
Jake Ellowitz
Multi-Agent Reinforcement Learning and Genetic Policy Sharing
7 pages, 11 figures
null
null
null
cs.MA cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The effects of policy sharing between agents in a multi-agent dynamical system has not been studied extensively. I simulate a system of agents optimizing the same task using reinforcement learning, to study the effects of different population densities and policy sharing. I demonstrate that sharing policies decreases the time to reach asymptotic behavior, and results in improved asymptotic behavior.
[ { "version": "v1", "created": "Tue, 9 Dec 2008 16:13:33 GMT" } ]
2008-12-10T00:00:00
[ [ "Ellowitz", "Jake", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.1601
Shiva Kintali
Shiva Kintali
Scarf is Ppad-Complete
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scarf's lemma is one of the fundamental results in combinatorics, originally introduced to study the core of an N-person game. Over the last four decades, the usefulness of Scarf's lemma has been demonstrated in several important combinatorial problems seeking "stable" solutions. However, the complexity of the computational version of Scarf's lemma (SCARF) remained open. In this paper, we prove that SCARF is complete for the complexity class PPAD. This proves that SCARF is as hard as the computational versions of Brouwer's fixed point theorem and Sperner's lemma. Hence, there is no polynomial-time algorithm for SCARF unless PPAD \subseteq P. We also show that fractional stable paths problem and finding strong fractional kernels in digraphs are PPAD-hard.
[ { "version": "v1", "created": "Tue, 9 Dec 2008 01:07:25 GMT" }, { "version": "v2", "created": "Fri, 12 Dec 2008 00:22:16 GMT" }, { "version": "v3", "created": "Mon, 9 Feb 2009 12:43:25 GMT" }, { "version": "v4", "created": "Sun, 3 May 2009 22:08:14 GMT" } ]
2009-05-04T00:00:00
[ [ "Kintali", "Shiva", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0812.1628
Masoud Farivar
Masoud Farivar, Behzad Mehrdad, Farid Ashtiani
Two Dimensional Connectivity for Vehicular Ad-Hoc Networks
9 Pages, 10 figures,Submitted to INFOCOM 2009
null
null
null
cs.NI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we focus on two-dimensional connectivity in sparse vehicular ad hoc networks (VANETs). In this respect, we find thresholds for the arrival rates of vehicles at entrances of a block of streets such that the connectivity is guaranteed for any desired probability. To this end, we exploit a mobility model recently proposed for sparse VANETs, based on BCMP open queuing networks and solve the related traffic equations to find the traffic characteristics of each street and use the results to compute the exact probability of connectivity along these streets. Then, we use the results from percolation theory and the proposed fast algorithms for evaluation of bond percolation problem in a random graph corresponding to the block of the streets. We then find sufficiently accurate two dimensional connectivity-related parameters, such as the average number of intersections connected to each other and the size of the largest set of inter-connected intersections. We have also proposed lower bounds for the case of heterogeneous network with two transmission ranges. In the last part of the paper, we apply our method to several numerical examples and confirm our results by simulations.
[ { "version": "v1", "created": "Tue, 9 Dec 2008 07:16:10 GMT" } ]
2008-12-10T00:00:00
[ [ "Farivar", "Masoud", "" ], [ "Mehrdad", "Behzad", "" ], [ "Ashtiani", "Farid", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.1629
A. Caranti
A. Caranti, F. Dalla Volta, M. Sala
An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher
10 pages: several improvements in exposition and content, including ruling out the symmetric group 9 pages; several changes in layout and exposition
Design, Codes and Cryptography, 2009, vol. 52, p. 293-301
null
null
math.GR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a previous paper, we had proved that the permutation group generated by the round functions of an AES-like cipher is primitive. Here we apply the O'Nan Scott classification of primitive groups to prove that this group is the alternating group.
[ { "version": "v1", "created": "Tue, 9 Dec 2008 15:36:14 GMT" }, { "version": "v2", "created": "Thu, 29 Jan 2009 08:47:09 GMT" }, { "version": "v3", "created": "Tue, 17 Feb 2009 12:02:14 GMT" }, { "version": "v4", "created": "Wed, 18 Mar 2009 12:24:48 GMT" } ]
2016-04-01T00:00:00
[ [ "Caranti", "A.", "" ], [ "Volta", "F. Dalla", "" ], [ "Sala", "M.", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1633
Giovanni Bussi
Giovanni Bussi
A simple asynchronous replica-exchange implementation
Preprint of Proceeding for CSFI 2008
G. Bussi, Nuovo Cimento Soc. Ital. Fis., C 32, 61 (2009)
10.1393/ncc/i2009-10369-8
null
physics.comp-ph cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss the possibility of implementing asynchronous replica-exchange (or parallel tempering) molecular dynamics. In our scheme, the exchange attempts are driven by asynchronous messages sent by one of the computing nodes, so that different replicas are allowed to perform a different number of time-steps between subsequent attempts. The implementation is simple and based on the message-passing interface (MPI). We illustrate the advantages of our scheme with respect to the standard synchronous algorithm and we benchmark it for a model Lennard-Jones liquid on an IBM-LS21 blade center cluster.
[ { "version": "v1", "created": "Tue, 9 Dec 2008 18:39:58 GMT" } ]
2009-11-23T00:00:00
[ [ "Bussi", "Giovanni", "" ] ]
[ { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0812.1647
Jean-Dominique Gascuel
David Vanderhaeghe (INRIA Rh\^one-Alpes / LJK Laboratoire Jean Kuntzmann, LJK), Victor Ostromoukhov (DIRO)
Polyomino-Based Digital Halftoning
http://artis.imag.fr/Publications/2008/VO08/
IADIS International Conference on Computer Graphics and Visualization 2008 (2008)
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we present a new method for generating a threshold structure. This kind of structure can be advantageously used in various halftoning algorithms such as clustered-dot or dispersed-dot dithering, error diffusion with threshold modulation, etc. The proposed method is based on rectifiable polyominoes -- a non-periodic hierarchical structure, which tiles the Euclidean plane with no gaps. Each polyomino contains a fixed number of discrete threshold values. Thanks to its inherent non-periodic nature combined with off-line optimization of threshold values, our polyomino-based threshold structure shows blue-noise spectral properties. The halftone images produced with this threshold structure have high visual quality. Although the proposed method is general, and can be applied on any polyomino tiling, we consider one particular case: tiling with G-hexominoes. We compare our polyomino-based threshold structure with the best known state-of-the-art methods for generation threshold matrices, and conclude considerable improvement achieved with our method.
[ { "version": "v1", "created": "Tue, 9 Dec 2008 10:12:36 GMT" } ]
2008-12-10T00:00:00
[ [ "Vanderhaeghe", "David", "", "INRIA Rhône-Alpes / LJK Laboratoire Jean\n Kuntzmann, LJK" ], [ "Ostromoukhov", "Victor", "", "DIRO" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0812.1713
Deniz Gunduz
Deniz Gunduz, D. Richard Brown III, H. Vincent Poor
Secret Communication with Feedback
Presented at the IEEE Int'l Symposium on Information Theory and its Applications (ISITA), Auckland, New Zealand, December 2008
null
10.1109/ISITA.2008.4895417
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Secure communication with feedback is studied. An achievability scheme in which the backward channel is used to generate a shared secret key is proposed. The scenario of binary symmetric forward and backward channels is considered, and a combination of the proposed scheme and Maurer's coding scheme is shown to achieve improved secrecy rates. The scenario of a Gaussian channel with perfect output feedback is also analyzed and the Schalkwijk-Kailath coding scheme is shown to achieve the secrecy capacity for this channel.
[ { "version": "v1", "created": "Tue, 9 Dec 2008 20:56:54 GMT" } ]
2016-11-17T00:00:00
[ [ "Gunduz", "Deniz", "" ], [ "Brown", "D. Richard", "III" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1729
Filip Murlak
Filip Murlak
The Wadge Hierarchy of Deterministic Tree Languages
44 pages, 8 figures; extended abstract presented at ICALP 2006, Venice, Italy; full version appears in LMCS special issue
Logical Methods in Computer Science, Volume 4, Issue 4 (December 23, 2008) lmcs:994
10.2168/LMCS-4(4:15)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a complete description of the Wadge hierarchy for deterministically recognisable sets of infinite trees. In particular we give an elementary procedure to decide if one deterministic tree language is continuously reducible to another. This extends Wagner's results on the hierarchy of omega-regular languages of words to the case of trees.
[ { "version": "v1", "created": "Tue, 9 Dec 2008 16:14:05 GMT" }, { "version": "v2", "created": "Tue, 23 Dec 2008 22:12:11 GMT" } ]
2015-07-01T00:00:00
[ [ "Murlak", "Filip", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0812.1778
Mustafa Cenk Gursoy
Deli Qiao, Mustafa Cenk Gursoy, and Senem Velipasalar
The Impact of QoS Constraints on the Energy Efficiency of Fixed-Rate Wireless Transmissions
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transmission over wireless fading channels under quality of service (QoS) constraints is studied when only the receiver has channel side information. Being unaware of the channel conditions, transmitter is assumed to send the information at a fixed rate. Under these assumptions, a two-state (ON-OFF) transmission model is adopted, where information is transmitted reliably at a fixed rate in the ON state while no reliable transmission occurs in the OFF state. QoS limitations are imposed as constraints on buffer violation probabilities, and effective capacity formulation is used to identify the maximum throughput that a wireless channel can sustain while satisfying statistical QoS constraints. Energy efficiency is investigated by obtaining the bit energy required at zero spectral efficiency and the wideband slope in both wideband and low-power regimes assuming that the receiver has perfect channel side information (CSI). In both wideband and low-power regimes, the increased energy requirements due to the presence of QoS constraints are quantified. Comparisons with variable-rate/fixed-power and variable-rate/variable-power cases are given. Energy efficiency is further analyzed in the presence of channel uncertainties. The optimal fraction of power allocated to training is identified under QoS constraints. It is proven that the minimum bit energy in the low-power regime is attained at a certain nonzero power level below which bit energy increases without bound with vanishing power.
[ { "version": "v1", "created": "Tue, 9 Dec 2008 19:30:52 GMT" } ]
2008-12-10T00:00:00
[ [ "Qiao", "Deli", "" ], [ "Gursoy", "Mustafa Cenk", "" ], [ "Velipasalar", "Senem", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1780
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy
On the Energy Efficiency of Orthogonal Signaling
appeared at ISIT 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, transmission over the additive white Gaussian noise (AWGN) channel, and coherent and noncoherent fading channels using M-ary orthogonal frequency-shift keying (FSK) or on-off frequency-shift keying (OOFSK) is considered. The receiver is assumed to perform hard-decision detection. In this setting, energy required to reliably send one bit of information is investigated. It is shown that for fixed M and duty cycle, bit energy requirements grow without bound as the signal-to-noise ratio (SNR) vanishes. The minimum bit energy values are numerically obtained for different values of M and the duty cycle. The impact of fading on the energy efficiency is identified. Requirements to approach the minimum bit energy of -1.59 dB are determined.
[ { "version": "v1", "created": "Tue, 9 Dec 2008 19:41:39 GMT" } ]
2008-12-10T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1811
Jean-Charles Delvenne
J.-C. Delvenne, S.N. Yaliraki, and M. Barahona
Stability of graph communities across time scales
submitted; updated bibliography from v3
null
null
null
physics.soc-ph cs.IR physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The complexity of biological, social and engineering networks makes it desirable to find natural partitions into communities that can act as simplified descriptions and provide insight into the structure and function of the overall system. Although community detection methods abound, there is a lack of consensus on how to quantify and rank the quality of partitions. We show here that the quality of a partition can be measured in terms of its stability, defined in terms of the clustered autocovariance of a Markov process taking place on the graph. Because the stability has an intrinsic dependence on time scales of the graph, it allows us to compare and rank partitions at each time and also to establish the time spans over which partitions are optimal. Hence the Markov time acts effectively as an intrinsic resolution parameter that establishes a hierarchy of increasingly coarser clusterings. Within our framework we can then provide a unifying view of several standard partitioning measures: modularity and normalized cut size can be interpreted as one-step time measures, whereas Fiedler's spectral clustering emerges at long times. We apply our method to characterize the relevance and persistence of partitions over time for constructive and real networks, including hierarchical graphs and social networks. We also obtain reduced descriptions for atomic level protein structures over different time scales.
[ { "version": "v1", "created": "Tue, 9 Dec 2008 22:32:02 GMT" }, { "version": "v2", "created": "Thu, 11 Dec 2008 17:42:06 GMT" }, { "version": "v3", "created": "Mon, 22 Dec 2008 15:49:36 GMT" }, { "version": "v4", "created": "Wed, 11 Mar 2009 15:26:15 GMT" } ]
2013-09-18T00:00:00
[ [ "Delvenne", "J. -C.", "" ], [ "Yaliraki", "S. N.", "" ], [ "Barahona", "M.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0812.1843
N. Arvind Kumar
N. Arvind Kumar
Identification of parameters underlying emotions and a classification of emotions
6 pages
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The standard classification of emotions involves categorizing the expression of emotions. In this paper, parameters underlying some emotions are identified and a new classification based on these parameters is suggested.
[ { "version": "v1", "created": "Wed, 10 Dec 2008 19:02:31 GMT" } ]
2008-12-11T00:00:00
[ [ "Kumar", "N. Arvind", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]