id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0812.1857 | Ravi Tandon | Ravi Tandon, Sennur Ulukus | Dependence Balance Based Outer Bounds for Gaussian Networks with
Cooperation and Feedback | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2011.2145150 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We obtain new outer bounds on the capacity regions of the two-user multiple
access channel with generalized feedback (MAC-GF) and the two-user interference
channel with generalized feedback (IC-GF). These outer bounds are based on the
idea of dependence balance which was proposed by Hekstra and Willems [1]. To
illustrate the usefulness of our outer bounds, we investigate three different
channel models. We first consider a Gaussian MAC with noisy feedback (MAC-NF),
where transmitter $k$, $k=1,2$, receives a feedback $Y_{F_{k}}$, which is the
channel output $Y$ corrupted with additive white Gaussian noise $Z_{k}$. As the
feedback noise variances become large, one would expect the feedback to become
useless, which is not reflected by the cut-set bound. We demonstrate that our
outer bound improves upon the cut-set bound for all non-zero values of the
feedback noise variances. Moreover, in the limit as $\sigma_{Z_{k}}^{2}\to
\infty$, $k=1,2$, our outer bound collapses to the capacity region of the
Gaussian MAC without feedback. Secondly, we investigate a Gaussian MAC with
user-cooperation (MAC-UC), where each transmitter receives an additive white
Gaussian noise corrupted version of the channel input of the other transmitter
[2]. For this channel model, the cut-set bound is sensitive to the cooperation
noises, but not sensitive enough. For all non-zero values of cooperation noise
variances, our outer bound strictly improves upon the cut-set outer bound.
Thirdly, we investigate a Gaussian IC with user-cooperation (IC-UC). For this
channel model, the cut-set bound is again sensitive to cooperation noise
variances but not sensitive enough. We demonstrate that our outer bound
strictly improves upon the cut-set bound for all non-zero values of cooperation
noise variances.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2008 07:56:36 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2008 03:06:58 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Tandon",
"Ravi",
""
],
[
"Ulukus",
"Sennur",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.1869 | Francis Bach | Francis Bach (INRIA Rocquencourt), Julien Mairal (INRIA Rocquencourt),
Jean Ponce (INRIA Rocquencourt) | Convex Sparse Matrix Factorizations | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a convex formulation of dictionary learning for sparse signal
decomposition. Convexity is obtained by replacing the usual explicit upper
bound on the dictionary size by a convex rank-reducing term similar to the
trace norm. In particular, our formulation introduces an explicit trade-off
between size and sparsity of the decomposition of rectangular matrices. Using a
large set of synthetic examples, we compare the estimation abilities of the
convex and non-convex approaches, showing that while the convex formulation has
a single local minimum, this may lead in some cases to performance which is
inferior to the local minima of the non-convex formulation.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2008 09:00:40 GMT"
}
]
| 2008-12-11T00:00:00 | [
[
"Bach",
"Francis",
"",
"INRIA Rocquencourt"
],
[
"Mairal",
"Julien",
"",
"INRIA Rocquencourt"
],
[
"Ponce",
"Jean",
"",
"INRIA Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.1908 | Robert Kooij | Robert Kooij, Phillip Schumm, Caterina Scoglio | A new metric for robustness with respect to virus spread | 12 pages, 4 figures | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The robustness of a network is depending on the type of attack we are
considering. In this paper we focus on the spread of viruses on networks. It is
common practice to use the epidemic threshold as a measure for robustness.
Because the epidemic threshold is inversely proportional to the largest
eigenvalue of the adjacency matrix, it seems easy to compare the robustness of
two networks. We will show in this paper that the comparison of the robustness
with respect to virus spread for two networks actually depends on the value of
the effective spreading rate tau. For this reason we propose a new metric, the
viral conductance, which takes into account the complete range of values tau
can obtain. In this paper we determine the viral conductance of regular graphs,
complete bi-partite graphs and a number of realistic networks.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2008 13:19:48 GMT"
}
]
| 2008-12-11T00:00:00 | [
[
"Kooij",
"Robert",
""
],
[
"Schumm",
"Phillip",
""
],
[
"Scoglio",
"Caterina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.1915 | Marcel Marquardt | Wouter Gelade, Marcel Marquardt, Thomas Schwentick | Dynamic Complexity of Formal Languages | Contains the material presenten at STACS 2009, extendes with proofs
and examples which were omitted due lack of space | null | null | null | cs.CC cs.DS cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper investigates the power of the dynamic complexity classes DynFO,
DynQF and DynPROP over string languages. The latter two classes contain
problems that can be maintained using quantifier-free first-order updates, with
and without auxiliary functions, respectively. It is shown that the languages
maintainable in DynPROP exactly are the regular languages, even when allowing
arbitrary precomputation. This enables lower bounds for DynPROP and separates
DynPROP from DynQF and DynFO. Further, it is shown that any context-free
language can be maintained in DynFO and a number of specific context-free
languages, for example all Dyck-languages, are maintainable in DynQF.
Furthermore, the dynamic complexity of regular tree languages is investigated
and some results concerning arbitrary structures are obtained: there exist
first-order definable properties which are not maintainable in DynPROP. On the
other hand any existential first-order property can be maintained in DynQF when
allowing precomputation.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2008 14:13:57 GMT"
}
]
| 2008-12-11T00:00:00 | [
[
"Gelade",
"Wouter",
""
],
[
"Marquardt",
"Marcel",
""
],
[
"Schwentick",
"Thomas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0812.1951 | Jerome Leroux | Alain Finkel (LSV), J\'er\^ome Leroux (LaBRI) | The convex hull of a regular set of integer vectors is polyhedral and
effectively computable | null | Information Processing Letters 96, 1 (2005) 30 - 35 | 10.1016/j.ipl.2005.04.004 | null | cs.CG cs.DS cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Number Decision Diagrams (NDD) provide a natural finite symbolic
representation for regular set of integer vectors encoded as strings of digit
vectors (least or most significant digit first). The convex hull of the set of
vectors represented by a NDD is proved to be an effectively computable convex
polyhedron.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2008 16:26:36 GMT"
}
]
| 2008-12-13T00:00:00 | [
[
"Finkel",
"Alain",
"",
"LSV"
],
[
"Leroux",
"Jérôme",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0812.1967 | Jerome Leroux | Florent Bouchy (LSV), Alain Finkel (LSV), J\'er\^ome Leroux (LaBRI) | Decomposition of Decidable First-Order Logics over Integers and Reals | null | Temporal Representation and Reasoning, 2008. TIME '08. 15th
International Symposium on, Montreal, QC : Canada (2008) | 10.1109/TIME.2008.22 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We tackle the issue of representing infinite sets of real- valued vectors.
This paper introduces an operator for combining integer and real sets. Using
this operator, we decompose three well-known logics extending Presburger with
reals. Our decomposition splits a logic into two parts : one integer, and one
decimal (i.e. on the interval [0,1]). We also give a basis for an
implementation of our representation.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2008 17:08:45 GMT"
}
]
| 2008-12-11T00:00:00 | [
[
"Bouchy",
"Florent",
"",
"LSV"
],
[
"Finkel",
"Alain",
"",
"LSV"
],
[
"Leroux",
"Jérôme",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0812.1986 | Eric Feron | Eric Feron and Fernando Alegre | Control software analysis, part II: Closed-loop analysis | 16 pages, 2 figures | null | null | null | cs.SE cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The analysis and proper documentation of the properties of closed-loop
control software presents many distinct aspects from the analysis of the same
software running open-loop. Issues of physical system representations arise,
and it is desired that such representations remain independent from the
representations of the control program. For that purpose, a concurrent program
representation of the plant and the control processes is proposed, although the
closed-loop system is sufficiently serialized to enable a sequential analysis.
While dealing with closed-loop system properties, it is also shown by means of
examples how special treatment of nonlinearities extends from the analysis of
control specifications to code analysis.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2008 17:57:14 GMT"
}
]
| 2008-12-11T00:00:00 | [
[
"Feron",
"Eric",
""
],
[
"Alegre",
"Fernando",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0812.2011 | Jerome Leroux | J\'er\^ome Leroux (LaBRI), Gregoire Sutre (LaBRI) | Accelerated Data-Flow Analysis | null | Static Analysis, Kongens Lyngby : Danemark (2007) | 10.1007/978-3-540-74061-2_12 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Acceleration in symbolic verification consists in computing the exact effect
of some control-flow loops in order to speed up the iterative fix-point
computation of reachable states. Even if no termination guarantee is provided
in theory, successful results were obtained in practice by different tools
implementing this framework. In this paper, the acceleration framework is
extended to data-flow analysis. Compared to a classical
widening/narrowing-based abstract interpretation, the loss of precision is
controlled here by the choice of the abstract domain and does not depend on the
way the abstract value is computed. Our approach is geared towards precision,
but we don't loose efficiency on the way. Indeed, we provide a cubic-time
acceleration-based algorithm for solving interval constraints with full
multiplication.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2008 20:08:08 GMT"
}
]
| 2008-12-11T00:00:00 | [
[
"Leroux",
"Jérôme",
"",
"LaBRI"
],
[
"Sutre",
"Gregoire",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.2014 | Jerome Leroux | J\'er\^ome Leroux (LaBRI) | Convex Hull of Arithmetic Automata | null | Static Analysis, Valencia : Espagne (2008) | 10.1007/978-3-540-69166-2_4 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Arithmetic automata recognize infinite words of digits denoting
decompositions of real and integer vectors. These automata are known expressive
and efficient enough to represent the whole set of solutions of complex linear
constraints combining both integral and real variables. In this paper, the
closed convex hull of arithmetic automata is proved rational polyhedral.
Moreover an algorithm computing the linear constraints defining these convex
set is provided. Such an algorithm is useful for effectively extracting
geometrical properties of the whole set of solutions of complex constraints
symbolically represented by arithmetic automata.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2008 20:33:27 GMT"
}
]
| 2008-12-11T00:00:00 | [
[
"Leroux",
"Jérôme",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.2049 | Jian Li | Jian Li, Amol Deshpande | Consensus Answers for Queries over Probabilistic Databases | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of finding a "best" deterministic query answer to a
query over a probabilistic database. For this purpose, we propose the notion of
a consensus world (or a consensus answer) which is a deterministic world
(answer) that minimizes the expected distance to the possible worlds (answers).
This problem can be seen as a generalization of the well-studied inconsistent
information aggregation problems (e.g. rank aggregation) to probabilistic
databases. We consider this problem for various types of queries including SPJ
queries, \Topk queries, group-by aggregate queries, and clustering. For
different distance metrics, we obtain polynomial time optimal or approximation
algorithms for computing the consensus answers (or prove NP-hardness). Most of
our results are for a general probabilistic database model, called {\em and/xor
tree model}, which significantly generalizes previous probabilistic database
models like x-tuples and block-independent disjoint models, and is of
independent interest.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2008 23:20:17 GMT"
}
]
| 2008-12-12T00:00:00 | [
[
"Li",
"Jian",
""
],
[
"Deshpande",
"Amol",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0812.2094 | Mikael Ates | Mika\"el Ates (DIOM), Christophe Gravier (DIOM), J\'er\'emy Lardon
(DIOM), Jacques Fayolle (DIOM), B. Sauviac (DIOM) | Interoperability between Heterogeneous Federation Architectures:
Illustration with SAML and WS-Federation | null | Third International IEEE Conference on Signal-Image Technologies
and Internet-Based System (SITIS 07), Shangai : Chine (2007) | 10.1109/SITIS.2007.148 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Digital identity management intra and inter information systems, and, service
oriented architectures, are the roots of identity federation. This kind of
security architectures aims at enabling information system interoperability.
Existing architectures, however, do not consider interoperability of
heterogeneous federation architectures, which rely on different federation
protocols.In this paper, we try to initiate an in-depth reflection on this
issue, through the comparison of two main federation architecture
specifications: SAML and WS-Federation. We firstly propose an overall outline
of identity federation. We furthermore address the issue of interoperability
for federation architectures using a different federation protocol. Afterwards,
we compare SAML and WS-Federation. Eventually, we define the ways of
convergence, and therefore, of interoperability.
| [
{
"version": "v1",
"created": "Thu, 11 Dec 2008 08:04:52 GMT"
}
]
| 2008-12-12T00:00:00 | [
[
"Ates",
"Mikaël",
"",
"DIOM"
],
[
"Gravier",
"Christophe",
"",
"DIOM"
],
[
"Lardon",
"Jérémy",
"",
"DIOM"
],
[
"Fayolle",
"Jacques",
"",
"DIOM"
],
[
"Sauviac",
"B.",
"",
"DIOM"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0812.2115 | Gabrio Curzio Caimi | Gabrio Caimi, Holger Flier, Martin Fuchsberger, Marc Nunkesser | Performance of a greedy algorithm for edge covering by cliques in
interval graphs | 8 pages, 3 pictures, technical report | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper a greedy algorithm to detect conflict cliques in interval
graphs and circular-arc graphs is analyzed. In a graph, a stable set requires
that at most one vertex is chosen for each edge. It is equivalent to requiring
that at most one vertex for each maximal clique is chosen. We show that this
algorithm finds all maximal cliques for interval graphs, i.e. it can compute
the convex hull of the stable set polytope. In case of circular-arc graphs, the
algorithm is not able to detect all maximal cliques, yet remaining correct.
This problem occurs in the context of railway scheduling. A train requests the
allocation of a railway infrastructure resource for a specific time interval.
As one is looking for conflict-free train schedules, the used resource
allocation intervals in a schedule must not overlap. The conflict-free choices
of used intervals for each resource correspond to stable sets in the interval
graph associated to the allocation time intervals.
| [
{
"version": "v1",
"created": "Thu, 11 Dec 2008 15:35:45 GMT"
}
]
| 2008-12-12T00:00:00 | [
[
"Caimi",
"Gabrio",
""
],
[
"Flier",
"Holger",
""
],
[
"Fuchsberger",
"Martin",
""
],
[
"Nunkesser",
"Marc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.2137 | Marek Karpinski | Piotr Berman, Marek Karpinski, Alex Zelikovsky | A Factor 3/2 Approximation for Generalized Steiner Tree Problem with
Distances One and Two | null | null | null | null | cs.CC cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We design a 3/2 approximation algorithm for the Generalized Steiner Tree
problem (GST) in metrics with distances 1 and 2. This is the first polynomial
time approximation algorithm for a wide class of non-geometric metric GST
instances with approximation factor below 2.
| [
{
"version": "v1",
"created": "Thu, 11 Dec 2008 12:50:54 GMT"
}
]
| 2008-12-12T00:00:00 | [
[
"Berman",
"Piotr",
""
],
[
"Karpinski",
"Marek",
""
],
[
"Zelikovsky",
"Alex",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.2164 | Florin Pop Mr. | Florin Pop | Optimization of Decentralized Scheduling for Physic Applications in Grid
Environments | null | D. Iordache, P. Sterian (eds.), Proceedings of the 4th edition of
the Colloquium Mathematics in Engineering and Numerical Physics, pp. 150-153,
October 6-8, Ed. Printech, 2007, ISBN: 978-973-718-761-1 | null | null | cs.DC physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a scheduling framework that is configured for, and used
in physic systems. Our work addresses the problem of scheduling various
computationally intensive and data intensive applications that are required for
extracting information from satellite images. The proposed solution allows
mapping of image processing applications onto available resources. The
scheduling is done at the level of groups of concurrent applications. It
demonstrates a very good behavior for scheduling and executing groups of
applications, while also achieving a near-optimal utilization of the resources.
| [
{
"version": "v1",
"created": "Thu, 11 Dec 2008 14:52:35 GMT"
}
]
| 2008-12-12T00:00:00 | [
[
"Pop",
"Florin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
]
|
0812.2195 | Rada Chirkova | Rada Chirkova, Michael Genesereth | Equivalence of SQL Queries in Presence of Embedded Dependencies | Correction of the previous version as described in the last sentence
of the Abstract | null | null | NCSU CSC TR-2008-27 | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of finding equivalent minimal-size reformulations of
SQL queries in presence of embedded dependencies [1]. Our focus is on
select-project-join (SPJ) queries with equality comparisons, also known as safe
conjunctive (CQ) queries, possibly with grouping and aggregation. For SPJ
queries, the semantics of the SQL standard treat query answers as multisets
(a.k.a. bags), whereas the stored relations may be treated either as sets,
which is called bag-set semantics for query evaluation, or as bags, which is
called bag semantics. (Under set semantics, both query answers and stored
relations are treated as sets.)
In the context of the above Query-Reformulation Problem, we develop a
comprehensive framework for equivalence of CQ queries under bag and bag-set
semantics in presence of embedded dependencies, and make a number of conceptual
and technical contributions. Specifically, we develop equivalence tests for CQ
queries in presence of arbitrary sets of embedded dependencies under bag and
bag-set semantics, under the condition that chase [9] under set semantics
(set-chase) on the inputs terminates. We also present equivalence tests for
aggregate CQ queries in presence of embedded dependencies. We use our
equivalence tests to develop sound and complete (whenever set-chase on the
inputs terminates) algorithms for solving instances of the Query-Reformulation
Problem with CQ queries under each of bag and bag-set semantics, as well as for
instances of the problem with aggregate queries.
| [
{
"version": "v1",
"created": "Thu, 11 Dec 2008 17:25:55 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jun 2009 19:22:10 GMT"
},
{
"version": "v3",
"created": "Fri, 26 Jun 2009 22:28:22 GMT"
}
]
| 2009-06-27T00:00:00 | [
[
"Chirkova",
"Rada",
""
],
[
"Genesereth",
"Michael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0812.2202 | Deanna Needell | D. Needell, J. A. Tropp and R. Vershynin | Greedy Signal Recovery Review | null | Proc. Asilomar Conference on Signals, Systems, and Computers,
Pacific Grove, CA Oct. 2008 | null | null | math.NA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The two major approaches to sparse recovery are L1-minimization and greedy
methods. Recently, Needell and Vershynin developed Regularized Orthogonal
Matching Pursuit (ROMP) that has bridged the gap between these two approaches.
ROMP is the first stable greedy algorithm providing uniform guarantees.
Even more recently, Needell and Tropp developed the stable greedy algorithm
Compressive Sampling Matching Pursuit (CoSaMP). CoSaMP provides uniform
guarantees and improves upon the stability bounds and RIC requirements of ROMP.
CoSaMP offers rigorous bounds on computational cost and storage. In many cases,
the running time is just O(NlogN), where N is the ambient dimension of the
signal. This review summarizes these major advances.
| [
{
"version": "v1",
"created": "Thu, 11 Dec 2008 17:48:11 GMT"
}
]
| 2008-12-12T00:00:00 | [
[
"Needell",
"D.",
""
],
[
"Tropp",
"J. A.",
""
],
[
"Vershynin",
"R.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2257 | Joseph O'Rourke | Jin-ichi Itoh, Joseph O'Rourke, Costin V\^ilcu | Unfolding Convex Polyhedra via Quasigeodesic Star Unfoldings | 18 pages, 10 figures | null | null | Smith 091 | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We extend the notion of a star unfolding to be based on a simple
quasigeodesic loop Q rather than on a point. This gives a new general method to
unfold the surface of any convex polyhedron P to a simple, planar polygon:
shortest paths from all vertices of P to Q are cut, and all but one segment of
Q is cut.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 15:05:25 GMT"
}
]
| 2008-12-15T00:00:00 | [
[
"Itoh",
"Jin-ichi",
""
],
[
"O'Rourke",
"Joseph",
""
],
[
"Vîlcu",
"Costin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0812.2275 | Vaneet Aggarwal | Vaneet Aggarwal and Lalitha Sankar and A. Robert Calderbank and H.
Vincent Poor | Secrecy capacity of a class of orthogonal relay eavesdropper channels | Submitted to Eurasip Journal on Wireless Communications and
Networking special issue on Wireless physical layer security, Dec. 2008,
Revised Jun. 2009 | Eurasip Journal on Wireless Communications and Networking, Special
Issue on Wireless Physical Layer Security, vol. 2009, Jun. 2009. | 10.1155/2009/494696 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The secrecy capacity of relay channels with orthogonal components is studied
in the presence of an additional passive eavesdropper node. The relay and
destination receive signals from the source on two orthogonal channels such
that the destination also receives transmissions from the relay on its channel.
The eavesdropper can overhear either one or both of the orthogonal channels.
Inner and outer bounds on the secrecy capacity are developed for both the
discrete memoryless and the Gaussian channel models. For the discrete
memoryless case, the secrecy capacity is shown to be achieved by a partial
decode-and-forward (PDF) scheme when the eavesdropper can overhear only one of
the two orthogonal channels. Two new outer bounds are presented for the
Gaussian model using recent capacity results for a Gaussian multi-antenna
point-to-point channel with a multi-antenna eavesdropper. The outer bounds are
shown to be tight for two sub-classes of channels. The first sub-class is one
in which the source and relay are clustered and the and the eavesdropper
receives signals only on the channel from the source and the relay to the
destination, for which the PDF strategy is optimal. The second is a sub-class
in which the source does not transmit to the relay, for which a
noise-forwarding strategy is optimal.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 00:27:52 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Jun 2009 14:36:03 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Aggarwal",
"Vaneet",
""
],
[
"Sankar",
"Lalitha",
""
],
[
"Calderbank",
"A. Robert",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2277 | Constantinos Daskalakis | Constantinos Daskalakis | An Efficient PTAS for Two-Strategy Anonymous Games | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel polynomial time approximation scheme for two-strategy
anonymous games, in which the players' utility functions, although potentially
different, do not differentiate among the identities of the other players. Our
algorithm computes an $eps$-approximate Nash equilibrium of an $n$-player
2-strategy anonymous game in time $poly(n) (1/eps)^{O(1/eps^2)}$, which
significantly improves upon the running time $n^{O(1/eps^2)}$ required by the
algorithm of Daskalakis & Papadimitriou, 2007. The improved running time is
based on a new structural understanding of approximate Nash equilibria: We show
that, for any $eps$, there exists an $eps$-approximate Nash equilibrium in
which either only $O(1/eps^3)$ players randomize, or all players who randomize
use the same mixed strategy. To show this result we employ tools from the
literature on Stein's Method.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 00:43:07 GMT"
}
]
| 2008-12-15T00:00:00 | [
[
"Daskalakis",
"Constantinos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.2288 | Muhammad Mostafa Monowar | Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan,
and Choong Seon Hong | Congestion Control Protocol for Wireless Sensor Networks Handling
Prioritized Heterogeneous Traffic | 8 Pages | Proceedings of SMPE'08 in conjunction with MobiQuitous 2008 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Heterogeneous applications could be assimilated within the same wireless
sensor network with the aid of modern motes that have multiple sensor boards on
a single radio board. Different types of data generated from such types of
motes might have different transmission characteristics in terms of priority,
transmission rate, required bandwidth, tolerable packet loss, delay demands
etc. Considering a sensor network consisting of such multi-purpose nodes, in
this paper we propose Prioritized Heterogeneous Traffic-oriented Congestion
Control Protocol (PHTCCP) which ensures efficient rate control for prioritized
heterogeneous traffic. Our protocol uses intra-queue and inter-queue priorities
for ensuring feasible transmission rates of heterogeneous data. It also
guarantees efficient link utilization by using dynamic transmission rate
adjustment. Detailed analysis and simulation results are presented along with
the description of our protocol to demonstrate its effectiveness in handling
prioritized heterogeneous traffic in wireless sensor networks.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 03:11:36 GMT"
}
]
| 2008-12-15T00:00:00 | [
[
"Monowar",
"Muhammad Mostafa",
""
],
[
"Rahman",
"Md. Obaidur",
""
],
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Hong",
"Choong Seon",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.2291 | Aleksandrs Slivkins | Moshe Babaioff, Yogeshwer Sharma, Aleksandrs Slivkins | Characterizing Truthful Multi-Armed Bandit Mechanisms | This is the full version of a conference paper published in ACM EC
2009. This revision is re-focused to emphasize the results that do not rely
on the "IIA assumption" (see the paper for the definition) | null | null | null | cs.DS cs.GT cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a multi-round auction setting motivated by pay-per-click auctions
for Internet advertising. In each round the auctioneer selects an advertiser
and shows her ad, which is then either clicked or not. An advertiser derives
value from clicks; the value of a click is her private information. Initially,
neither the auctioneer nor the advertisers have any information about the
likelihood of clicks on the advertisements. The auctioneer's goal is to design
a (dominant strategies) truthful mechanism that (approximately) maximizes the
social welfare.
If the advertisers bid their true private values, our problem is equivalent
to the "multi-armed bandit problem", and thus can be viewed as a strategic
version of the latter. In particular, for both problems the quality of an
algorithm can be characterized by "regret", the difference in social welfare
between the algorithm and the benchmark which always selects the same "best"
advertisement. We investigate how the design of multi-armed bandit algorithms
is affected by the restriction that the resulting mechanism must be truthful.
We find that truthful mechanisms have certain strong structural properties --
essentially, they must separate exploration from exploitation -- and they incur
much higher regret than the optimal multi-armed bandit algorithms. Moreover, we
provide a truthful mechanism which (essentially) matches our lower bound on
regret.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 04:13:01 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Jan 2009 01:56:08 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Feb 2009 18:10:47 GMT"
},
{
"version": "v4",
"created": "Tue, 23 Jun 2009 02:21:56 GMT"
},
{
"version": "v5",
"created": "Fri, 18 Sep 2009 00:17:44 GMT"
},
{
"version": "v6",
"created": "Tue, 15 May 2012 22:57:53 GMT"
},
{
"version": "v7",
"created": "Mon, 3 Jun 2013 21:03:36 GMT"
}
]
| 2013-06-05T00:00:00 | [
[
"Babaioff",
"Moshe",
""
],
[
"Sharma",
"Yogeshwer",
""
],
[
"Slivkins",
"Aleksandrs",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.2298 | Francois Le Gall | Francois Le Gall | Efficient Isomorphism Testing for a Class of Group Extensions | 17 pages, accepted to the STACS 2009 conference | Proceedings of the 26th International Symposium on Theoretical
Aspects of Computer Science (STACS 2009), pp. 625-636, 2009 | 10.4230/LIPIcs.STACS.2009.1830 | null | cs.DS cs.CC math.GR quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The group isomorphism problem asks whether two given groups are isomorphic or
not. Whereas the case where both groups are abelian is well understood and can
be solved efficiently, very little is known about the complexity of isomorphism
testing for nonabelian groups. In this paper we study this problem for a class
of groups corresponding to one of the simplest ways of constructing nonabelian
groups from abelian groups: the groups that are extensions of an abelian group
A by a cyclic group of order m. We present an efficient algorithm solving the
group isomorphism problem for all the groups of this class such that the order
of A is coprime with m. More precisely, our algorithm runs in time almost
linear in the orders of the input groups and works in the general setting where
the groups are given as black-boxes.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 09:39:02 GMT"
}
]
| 2021-10-05T00:00:00 | [
[
"Gall",
"Francois Le",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0812.2301 | Ilmu Byun | Ilmu Byun, and Kwang Soon Kim | Cooperative Hybrid ARQ Protocols: Unified Frameworks for Protocol
Analysis | This paper has been withdrawn by the author for submission to another
journal | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cooperative hybrid-ARQ (HARQ) protocols, which can exploit the spatial and
temporal diversities, have been widely studied. The efficiency of cooperative
HARQ protocols is higher than that of cooperative protocols, because
retransmissions are only performed when necessary. We classify cooperative HARQ
protocols as three decode-and-forward based HARQ (DF-HARQ) protocols and two
amplified-and-forward based (AF-HARQ) protocols. To compare these protocols and
obtain the optimum parameters, two unified frameworks are developed for
protocol analysis. Using the frameworks, we can evaluate and compare the
maximum throughput and outage probabilities according to the SNR, the relay
location, and the delay constraint for the protocols.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 07:17:37 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Dec 2008 11:36:22 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Oct 2010 17:41:23 GMT"
}
]
| 2010-10-19T00:00:00 | [
[
"Byun",
"Ilmu",
""
],
[
"Kim",
"Kwang Soon",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2309 | Tobias Abenius | Tobias Abenius | Classification of Cell Images Using MPEG-7-influenced Descriptors and
Support Vector Machines in Cell Morphology | For associated files and erratum, see
http://Tobbe.nu/pub/2008/cell.morph.mpeg7.svm/ | null | null | ISSN 1651-6389 | stat.AP cs.CV stat.ML | http://creativecommons.org/licenses/by/3.0/ | Counting and classifying blood cells is an important diagnostic tool in
medicine. Support Vector Machines are increasingly popular and efficient and
could replace artificial neural network systems. Here a method to classify
blood cells is proposed using SVM. A set of statistics on images are
implemented in C++. The MPEG-7 descriptors Scalable Color Descriptor, Color
Structure Descriptor, Color Layout Descriptor and Homogeneous Texture
Descriptor are extended in size and combined with textural features
corresponding to textural properties perceived visually by humans. From a set
of images of human blood cells these statistics are collected. A SVM is
implemented and trained to classify the cell images. The cell images come from
a CellaVision DM-96 machine which classify cells from images from microscopy.
The output images and classification of the CellaVision machine is taken as
ground truth, a truth that is 90-95% correct. The problem is divided in two --
the primary and the simplified. The primary problem is to classify the same
classes as the CellaVision machine. The simplified problem is to differ between
the five most common types of white blood cells. An encouraging result is
achieved in both cases -- error rates of 10.8% and 3.1% -- considering that the
SVM is misled by the errors in ground truth. Conclusion is that further
investigation of performance is worthwhile.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 08:27:02 GMT"
}
]
| 2008-12-15T00:00:00 | [
[
"Abenius",
"Tobias",
""
]
]
| [
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
]
|
0812.2313 | Jocelyne Troccaz | Pierre Mozer (TIMC, URObotics), Jocelyne Troccaz (TIMC), Dan
Stoianovici (URObotics) | Urologic robots and future directions | null | Current Opinion in Urology 19, 1 (2009) 114-9 | 10.1097/MOU.0b013e32831cc1ba | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | PURPOSE OF REVIEW: Robot-assisted laparoscopic surgery in urology has gained
immense popularity with the daVinci system, but a lot of research teams are
working on new robots. The purpose of this study is to review current urologic
robots and present future development directions. RECENT FINDINGS: Future
systems are expected to advance in two directions: improvements of remote
manipulation robots and developments of image-guided robots. SUMMARY: The final
goal of robots is to allow safer and more homogeneous outcomes with less
variability of surgeon performance, as well as new tools to perform tasks on
the basis of medical transcutaneous imaging, in a less invasive way, at lower
costs. It is expected that improvements for a remote system could be augmented
in reality, with haptic feedback, size reduction, and development of new tools
for natural orifice translumenal endoscopic surgery. The paradigm of
image-guided robots is close to clinical availability and the most advanced
robots are presented with end-user technical assessments. It is also notable
that the potential of robots lies much further ahead than the accomplishments
of the daVinci system. The integration of imaging with robotics holds a
substantial promise, because this can accomplish tasks otherwise impossible.
Image-guided robots have the potential to offer a paradigm shift.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 08:38:23 GMT"
}
]
| 2008-12-15T00:00:00 | [
[
"Mozer",
"Pierre",
"",
"TIMC, URObotics"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
],
[
"Stoianovici",
"Dan",
"",
"URObotics"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0812.2324 | Gesualdo Scutari | Gesualdo Scutari, Daniel P. Palomar, and Sergio Barbarossa | The MIMO Iterative Waterfilling Algorithm | IEEE Transactions on Signal Processing (accepted) | null | 10.1109/TSP.2009.2013894 | null | cs.IT cs.GT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the non-cooperative maximization of mutual information
in the vector Gaussian interference channel in a fully distributed fashion via
game theory. This problem has been widely studied in a number of works during
the past decade for frequency-selective channels, and recently for the more
general MIMO case, for which the state-of-the art results are valid only for
nonsingular square channel matrices. Surprisingly, these results do not hold
true when the channel matrices are rectangular and/or rank deficient matrices.
The goal of this paper is to provide a complete characterization of the MIMO
game for arbitrary channel matrices, in terms of conditions guaranteeing both
the uniqueness of the Nash equilibrium and the convergence of asynchronous
distributed iterative waterfilling algorithms. Our analysis hinges on new
technical intermediate results, such as a new expression for the MIMO
waterfilling projection valid (also) for singular matrices, a mean-value
theorem for complex matrix-valued functions, and a general contraction theorem
for the multiuser MIMO watefilling mapping valid for arbitrary channel
matrices. The quite surprising result is that uniqueness/convergence conditions
in the case of tall (possibly singular) channel matrices are more restrictive
than those required in the case of (full rank) fat channel matrices. We also
propose a modified game and algorithm with milder conditions for the uniqueness
of the equilibrium and convergence, and virtually the same performance (in
terms of Nash equilibria) of the original game.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 09:13:57 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Scutari",
"Gesualdo",
""
],
[
"Palomar",
"Daniel P.",
""
],
[
"Barbarossa",
"Sergio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2379 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | On the Decoder Error Probability of Rank Metric Codes and
Constant-Dimension Codes | 19 pages, 2 figures, submitted to IEEE Transactions on Information
Theory. Revised in May 2010. | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Rank metric codes and constant-dimension codes (CDCs) have been considered
for error control in random network coding. Since decoder errors are more
detrimental to system performance than decoder failures, in this paper we
investigate the decoder error probability (DEP) of bounded distance decoders
(BDDs) for rank metric codes and CDCs. For rank metric codes, we consider a
channel motivated by network coding, where errors with the same row space are
equiprobable. Over such channels, we establish upper bounds on the DEPs of
BDDs, determine the exact DEP of BDDs for maximum rank distance (MRD) codes,
and show that MRD codes have the greatest DEPs up to a scalar. To evaluate the
DEPs of BDDs for CDCs, we first establish some fundamental geometric properties
of the projective space. Using these geometric properties, we then consider
BDDs in both subspace and injection metrics and derive analytical expressions
of their DEPs for CDCs, over a symmetric operator channel, as functions of
their distance distributions. Finally, we focus on CDCs obtained by lifting
rank metric codes and establish two important results: First, we derive
asymptotically tight upper bounds on the DEPs of BDDs in both metrics; Second,
we show that the DEPs for KK codes are the greatest up to a scalar among all
CDCs obtained by lifting rank metric codes.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 14:15:47 GMT"
},
{
"version": "v2",
"created": "Thu, 21 May 2009 19:02:11 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Jun 2009 14:24:18 GMT"
},
{
"version": "v4",
"created": "Wed, 31 Mar 2010 08:03:44 GMT"
}
]
| 2010-04-01T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2386 | Sonny Ben-Shimon | Noga Alon, Sonny Ben-Shimon, Michael Krivelevich | A note on regular Ramsey graphs | 5 pages | Journal of Graph Theory, 64 (3):244--249, 2010 | 10.1002/jgt.20453 | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that there is an absolute constant $C>0$ so that for every natural
$n$ there exists a triangle-free \emph{regular} graph with no independent set
of size at least $C\sqrt{n\log n}$.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 14:40:47 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Jul 2009 22:00:55 GMT"
}
]
| 2010-08-12T00:00:00 | [
[
"Alon",
"Noga",
""
],
[
"Ben-Shimon",
"Sonny",
""
],
[
"Krivelevich",
"Michael",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.2388 | Vyacheslav Yukalov | V.I. Yukalov and D. Sornette | Physics of risk and uncertainty in quantum decision making | Latex file, 30 pages. Published variant | Eur. Phys. J. B 71 (2009) 533-548 | 10.1140/epjb/e2009-00245-9 | null | physics.soc-ph cs.AI quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Quantum Decision Theory, developed recently by the authors, is applied to
clarify the role of risk and uncertainty in decision making and in particular
in relation to the phenomenon of dynamic inconsistency. By formulating this
notion in precise mathematical terms, we distinguish three types of
inconsistency: time inconsistency, planning paradox, and inconsistency
occurring in some discounting effects. While time inconsistency is well
accounted for in classical decision theory, the planning paradox is in
contradiction with classical utility theory. It finds a natural explanation in
the frame of the Quantum Decision Theory. Different types of discounting
effects are analyzed and shown to enjoy a straightforward explanation within
the suggested theory. We also introduce a general methodology based on
self-similar approximation theory for deriving the evolution equations for the
probabilities of future prospects. This provides a novel classification of
possible discount factors, which include the previously known cases
(exponential or hyperbolic discounting), but also predicts a novel class of
discount factors that decay to a strictly positive constant for very large
future time horizons. This class may be useful to deal with very long-term
discounting situations associated with intergenerational public policy choices,
encompassing issues such as global warming and nuclear waste disposal.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 14:46:41 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Oct 2009 09:50:11 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Yukalov",
"V. I.",
""
],
[
"Sornette",
"D.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0812.2390 | Luigi Santocanale | Luigi Santocanale (LIF), Yde Venema (ILLC) | Completeness for Flat Modal Fixpoint Logics | null | null | null | null | cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper exhibits a general and uniform method to prove completeness for
certain modal fixpoint logics. Given a set \Gamma of modal formulas of the form
\gamma(x, p1, . . ., pn), where x occurs only positively in \gamma, the
language L\sharp (\Gamma) is obtained by adding to the language of polymodal
logic a connective \sharp\_\gamma for each \gamma \epsilon. The term
\sharp\_\gamma (\varphi1, . . ., \varphin) is meant to be interpreted as the
least fixed point of the functional interpretation of the term \gamma(x,
\varphi 1, . . ., \varphi n). We consider the following problem: given \Gamma,
construct an axiom system which is sound and complete with respect to the
concrete interpretation of the language L\sharp (\Gamma) on Kripke frames. We
prove two results that solve this problem. First, let K\sharp (\Gamma) be the
logic obtained from the basic polymodal K by adding a Kozen-Park style fixpoint
axiom and a least fixpoint rule, for each fixpoint connective \sharp\_\gamma.
Provided that each indexing formula \gamma satisfies the syntactic criterion of
being untied in x, we prove this axiom system to be complete. Second,
addressing the general case, we prove the soundness and completeness of an
extension K+ (\Gamma) of K\_\sharp (\Gamma). This extension is obtained via an
effective procedure that, given an indexing formula \gamma as input, returns a
finite set of axioms and derivation rules for \sharp\_\gamma, of size bounded
by the length of \gamma. Thus the axiom system K+ (\Gamma) is finite whenever
\Gamma is finite.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 15:04:57 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Santocanale",
"Luigi",
"",
"LIF"
],
[
"Venema",
"Yde",
"",
"ILLC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0812.2405 | SeyyedMajid Valiollahzadeh | SeyyedMajid Valiollahzadeh, Mohammad Nazari, Massoud Babaie-Zadeh,
Christian Jutten | A New Trend in Optimization on Multi Overcomplete Dictionary toward
Inpainting | 4 pages | null | null | ICASSP 2009 | cs.MM cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, great attention was intended toward overcomplete dictionaries and
the sparse representations they can provide. In a wide variety of signal
processing problems, sparsity serves a crucial property leading to high
performance. Inpainting, the process of reconstructing lost or deteriorated
parts of images or videos, is an interesting application which can be handled
by suitably decomposition of an image through combination of overcomplete
dictionaries. This paper addresses a novel technique of such a decomposition
and investigate that through inpainting of images. Simulations are presented to
demonstrate the validation of our approach.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 15:56:42 GMT"
}
]
| 2008-12-15T00:00:00 | [
[
"Valiollahzadeh",
"SeyyedMajid",
""
],
[
"Nazari",
"Mohammad",
""
],
[
"Babaie-Zadeh",
"Massoud",
""
],
[
"Jutten",
"Christian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.2409 | Ashraf Hossain Mr. | Ashraf Hossain, S. Chakrabarti and P. K. Biswas | Sensing Models and Its Impact on Network Coverage in Wireless Sensor
Network | 5 pages, 5 figures, IEEE Region 10 Colloquium and the Third ICIIS,
Kharagpur, INDIA December 8-10, 2008 | null | 10.1109/ICIINFS.2008.4798455 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network coverage of wireless sensor network (WSN) means how well an area of
interest is being monitored by the deployed network. It depends mainly on
sensing model of nodes. In this paper, we present three types of sensing models
viz. Boolean sensing model, shadow-fading sensing model and Elfes sensing
model. We investigate the impact of sensing models on network coverage. We also
investigate network coverage based on Poisson node distribution. A comparative
study between regular and random node placement has also been presented in this
paper. This study will be useful for coverage analysis of WSN.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 16:04:19 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Hossain",
"Ashraf",
""
],
[
"Chakrabarti",
"S.",
""
],
[
"Biswas",
"P. K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2411 | SeyyedMajid Valiollahzadeh | Mohammad Nazari, Abolghasem Sayadiyan, SeyedMajid Valiollahzadeh | Probabilistic SVM/GMM Classifier for Speaker-Independent Vowel
Recognition in Continues Speech | 4 pages | null | null | ICASSP 2009 | cs.MM cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we discuss the issues in automatic recognition of vowels in
Persian language. The present work focuses on new statistical method of
recognition of vowels as a basic unit of syllables. First we describe a vowel
detection system then briefly discuss how the detected vowels can feed to
recognition unit. According to pattern recognition, Support Vector Machines
(SVM) as a discriminative classifier and Gaussian mixture model (GMM) as a
generative model classifier are two most popular techniques. Current
state-ofthe- art systems try to combine them together for achieving more power
of classification and improving the performance of the recognition systems. The
main idea of the study is to combine probabilistic SVM and traditional GMM
pattern classification with some characteristic of speech like band-pass energy
to achieve better classification rate. This idea has been analytically
formulated and tested on a FarsDat based vowel recognition system. The results
show inconceivable increases in recognition accuracy. The tests have been
carried out by various proposed vowel recognition algorithms and the results
have been compared.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 16:08:04 GMT"
}
]
| 2008-12-15T00:00:00 | [
[
"Nazari",
"Mohammad",
""
],
[
"Sayadiyan",
"Abolghasem",
""
],
[
"Valiollahzadeh",
"SeyedMajid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.2423 | Benedikt Bollig | Benedikt Bollig | On the Expressive Power of 2-Stack Visibly Pushdown Automata | null | Logical Methods in Computer Science, Volume 4, Issue 4 (December
24, 2008) lmcs:1101 | 10.2168/LMCS-4(4:16)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Visibly pushdown automata are input-driven pushdown automata that recognize
some non-regular context-free languages while preserving the nice closure and
decidability properties of finite automata. Visibly pushdown automata with
multiple stacks have been considered recently by La Torre, Madhusudan, and
Parlato, who exploit the concept of visibility further to obtain a rich
automata class that can even express properties beyond the class of
context-free languages. At the same time, their automata are closed under
boolean operations, have a decidable emptiness and inclusion problem, and enjoy
a logical characterization in terms of a monadic second-order logic over words
with an additional nesting structure. These results require a restricted
version of visibly pushdown automata with multiple stacks whose behavior can be
split up into a fixed number of phases. In this paper, we consider 2-stack
visibly pushdown automata (i.e., visibly pushdown automata with two stacks) in
their unrestricted form. We show that they are expressively equivalent to the
existential fragment of monadic second-order logic. Furthermore, it turns out
that monadic second-order quantifier alternation forms an infinite hierarchy
wrt words with multiple nestings. Combining these results, we conclude that
2-stack visibly pushdown automata are not closed under complementation.
Finally, we discuss the expressive power of B\"{u}chi 2-stack visibly pushdown
automata running on infinite (nested) words. Extending the logic by an infinity
quantifier, we can likewise establish equivalence to existential monadic
second-order logic.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 16:43:48 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Dec 2008 12:06:52 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Bollig",
"Benedikt",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0812.2454 | Neri Merhav | Neri Merhav | On the statistical physics of directed polymers in a random medium and
their relation to tree codes | Submitted to IEEE Trans. on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using well-known results from statistical physics, concerning the almost-sure
behavior of the free energy of directed polymers in a random medium, we prove
that random tree codes achieve the distortion-rate function almost surely under
a certain symmetry condition.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 18:36:47 GMT"
}
]
| 2008-12-15T00:00:00 | [
[
"Merhav",
"Neri",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2458 | Smarajit Das | Smarajit Das and B. Sundar Rajan | Square Complex Orthogonal Designs with no Zero Entry for any $2^m$
Antennas | 11 pages, 7 figures, 1 tables | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Space-time block codes from square complex orthogonal designs (SCOD) have
been extensively studied and most of the existing SCODs contain large number of
zeros. The zeros in the designs result in high peak-to-average power ratio and
also impose a severe constraint on hardware implementation of the code while
turning off some of the transmitting antennas whenever a zero is transmitted.
Recently, SCODs with no zero entry have been constructed for $2^a$ transmit
antennas whenever $a+1$ is a power of 2. Though there exists codes for 4 and 16
transmit antennas with no zero entry, there is no general method of
construction which gives codes for any number of transmit antennas. In this
paper, we construct SCODs for any power of 2 number of transmit antennas having
all its entries non-zero. Simulation results show that the codes constructed in
this paper outperform the existing codes for the same number of antennas under
peak power constraint while performing the same under average power constraint.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 19:28:16 GMT"
}
]
| 2008-12-15T00:00:00 | [
[
"Das",
"Smarajit",
""
],
[
"Rajan",
"B. Sundar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2466 | Jeffrey Shallit | Yu-Hin Au, Aaron Robertson, Jeffrey Shallit | Van der Waerden's Theorem and Avoidability in Words | Co-author added; new results | null | null | null | math.CO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Pirillo and Varricchio, and independently, Halbeisen and Hungerbuhler
considered the following problem, open since 1994: Does there exist an infinite
word w over a finite subset of Z such that w contains no two consecutive blocks
of the same length and sum? We consider some variations on this problem in the
light of van der Waerden's theorem on arithmetic progressions.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 20:11:50 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2008 22:00:42 GMT"
},
{
"version": "v3",
"created": "Fri, 16 Jan 2009 19:56:48 GMT"
},
{
"version": "v4",
"created": "Sun, 18 Jan 2009 11:10:01 GMT"
},
{
"version": "v5",
"created": "Tue, 17 Nov 2009 18:39:24 GMT"
}
]
| 2009-11-17T00:00:00 | [
[
"Au",
"Yu-Hin",
""
],
[
"Robertson",
"Aaron",
""
],
[
"Shallit",
"Jeffrey",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0812.2518 | Yeow Meng Chee | Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, and Huaxiong Wang | Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing
Schemes | 18 pages | Advances in Cryptology - Asiacrypt 2008, vol. 5350 of Lecture
Notes in Computer Science, pp. 19-36, Springer-Verlag, 2008 | 10.1007/978-3-540-89255-7 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Strongly multiplicative linear secret sharing schemes (LSSS) have been a
powerful tool for constructing secure multiparty computation protocols.
However, it remains open whether or not there exist efficient constructions of
strongly multiplicative LSSS from general LSSS. In this paper, we propose the
new concept of a 3-multiplicative LSSS, and establish its relationship with
strongly multiplicative LSSS. More precisely, we show that any 3-multiplicative
LSSS is a strongly multiplicative LSSS, but the converse is not true; and that
any strongly multiplicative LSSS can be efficiently converted into a
3-multiplicative LSSS. Furthermore, we apply 3-multiplicative LSSS to the
computation of unbounded fan-in multiplication, which reduces its round
complexity to four (from five of the previous protocol based on strongly
multiplicative LSSS). We also give two constructions of 3-multiplicative LSSS
from Reed-Muller codes and algebraic geometric codes. We believe that the
construction and verification of 3-multiplicative LSSS are easier than those of
strongly multiplicative LSSS. This presents a step forward in settling the open
problem of efficient constructions of strongly multiplicative LSSS from general
LSSS.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2008 02:59:37 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Zhang",
"Zhifang",
""
],
[
"Liu",
"Mulan",
""
],
[
"Chee",
"Yeow Meng",
""
],
[
"Ling",
"San",
""
],
[
"Wang",
"Huaxiong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0812.2529 | Philippe Roose | Sophie Laplace (LIUPPA), Marc Dalmau (LIUPPA), Philippe Roose (LIUPPA) | Kalinahia: Considering Quality of Service to Design and Execute
Distributed Multimedia Applications | null | IEEE/IFIP Int'l Conference on Network Management and Management
Symposium, Salvador de Bahia : Br\'esil (2008) | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the current challenges of Information Systems is to ensure
semi-structured data transmission, such as multimedia data, in a distributed
and pervasive environment. Information Sytems must then guarantee users a
quality of service ensuring data accessibility whatever the hardware and
network conditions may be. They must also guarantee information coherence and
particularly intelligibility that imposes a personalization of the service.
Within this framework, we propose a design method based on original models of
multimedia applications and quality of service. We also define a supervision
platform Kalinahia using a user centered heuristic allowing us to define at any
moment which configuration of software components constitutes the best answers
to users' wishes in terms of service.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2008 07:46:52 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Laplace",
"Sophie",
"",
"LIUPPA"
],
[
"Dalmau",
"Marc",
"",
"LIUPPA"
],
[
"Roose",
"Philippe",
"",
"LIUPPA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0812.2535 | Kumar Eswaran Dr. | Dasika Ratna Deepthi and K.Eswaran | Pattern Recognition and Memory Mapping using Mirroring Neural Networks | null | Paper No 336, IEEE, ICETiC 2009, International Conference on
Emerging Trends in Computing | null | null | cs.AI cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a new kind of learning implementation to recognize
the patterns using the concept of Mirroring Neural Network (MNN) which can
extract information from distinct sensory input patterns and perform pattern
recognition tasks. It is also capable of being used as an advanced associative
memory wherein image data is associated with voice inputs in an unsupervised
manner. Since the architecture is hierarchical and modular it has the potential
of being used to devise learning engines of ever increasing complexity.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2008 09:21:31 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Deepthi",
"Dasika Ratna",
""
],
[
"Eswaran",
"K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0812.2543 | Philippe Robert | Christine Fricker (INRIA Rocquencourt), Fabrice Guillemin (FT R&D),
Philippe Robert (INRIA Rocquencourt) | Perturbation analysis of an M/M/1 queue in a diffusion random
environment | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study in this paper an $M/M/1$ queue whose server rate depends upon the
state of an independent Ornstein-Uhlenbeck diffusion process $(X(t))$ so that
its value at time $t$ is $\mu \phi(X(t))$, where $\phi(x)$ is some bounded
function and $\mu>0$. We first establish the differential system for the
conditional probability density functions of the couple $(L(t),X(t))$ in the
stationary regime, where $L(t)$ is the number of customers in the system at
time $t$. By assuming that $\phi(x)$ is defined by $\phi(x) = 1-\varepsilon
((x\wedge a/\varepsilon)\vee(-b/\varepsilon))$ for some positive real numbers
$a$, $b$ and $\varepsilon$, we show that the above differential system has a
unique solution under some condition on $a$ and $b$. We then show that this
solution is close, in some appropriate sense, to the solution to the
differential system obtained when $\phi$ is replaced with
$\Phi(x)=1-\varepsilon x$ for sufficiently small $\varepsilon$. We finally
perform a perturbation analysis of this latter solution for small
$\varepsilon$. This allows us to check at the first order the validity of the
so-called reduced service rate approximation, stating that everything happens
as if the server rate were constant and equal to $\mu(1-\eps\E(X(t)))$.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2008 12:56:44 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Fricker",
"Christine",
"",
"INRIA Rocquencourt"
],
[
"Guillemin",
"Fabrice",
"",
"FT R&D"
],
[
"Robert",
"Philippe",
"",
"INRIA Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.2544 | Philippe Robert | Yousra Chabchoub (INRIA Rocquencourt), Christine Fricker (INRIA
Rocquencourt), Fabrice Guillemin, Philippe Robert (INRIA Rocquencourt) | Inference of Flow Statistics via Packet Sampling in the Internet | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show in this note that by deterministic packet sampling, the tail of the
distribution of the original flow size can be obtained by rescaling that of the
sampled flow size. To recover information on the flow size distribution lost
through packet sampling, we propose some heuristics based on measurements from
different backbone IP networks. These heuristic arguments allow us to recover
the complete flow size distribution.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2008 12:57:31 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Chabchoub",
"Yousra",
"",
"INRIA Rocquencourt"
],
[
"Fricker",
"Christine",
"",
"INRIA\n Rocquencourt"
],
[
"Guillemin",
"Fabrice",
"",
"INRIA Rocquencourt"
],
[
"Robert",
"Philippe",
"",
"INRIA Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.2546 | Philippe Robert | Christine Fricker (INRIA Rocquencourt), Fabrice Guillemin, Philippe
Robert (INRIA Rocquencourt) | An identification problem in an urn and ball model with heavy tailed
distributions | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider in this paper an urn and ball problem with replacement, where
balls are with different colors and are drawn uniformly from a unique urn. The
numbers of balls with a given color are i.i.d. random variables with a heavy
tailed probability distribution, for instance a Pareto or a Weibull
distribution. We draw a small fraction $p\ll 1$ of the total number of balls.
The basic problem addressed in this paper is to know to which extent we can
infer the total number of colors and the distribution of the number of balls
with a given color. By means of Le Cam's inequality and Chen-Stein method,
bounds for the total variation norm between the distribution of the number of
balls drawn with a given color and the Poisson distribution with the same mean
are obtained. We then show that the distribution of the number of balls drawn
with a given color has the same tail as that of the original number of balls.
We finally establish explicit bounds between the two distributions when each
ball is drawn with fixed probability $p$.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2008 12:59:40 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Jun 2009 15:28:30 GMT"
}
]
| 2009-06-20T00:00:00 | [
[
"Fricker",
"Christine",
"",
"INRIA Rocquencourt"
],
[
"Guillemin",
"Fabrice",
"",
"INRIA Rocquencourt"
],
[
"Robert",
"Philippe",
"",
"INRIA Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.2559 | Akin Tanatmis | Akin Tanatmis, Stefan Ruzika, Horst W. Hamacher, Mayur Punekar, Frank
Kienle and Norbert Wehn | A Separation Algorithm for Improved LP-Decoding of Linear Block Codes | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Maximum Likelihood (ML) decoding is the optimal decoding algorithm for
arbitrary linear block codes and can be written as an Integer Programming (IP)
problem. Feldman et al. relaxed this IP problem and presented Linear
Programming (LP) based decoding algorithm for linear block codes. In this
paper, we propose a new IP formulation of the ML decoding problem and solve the
IP with generic methods. The formulation uses indicator variables to detect
violated parity checks. We derive Gomory cuts from our formulation and use them
in a separation algorithm to find ML codewords. We further propose an efficient
method of finding cuts induced by redundant parity checks (RPC). Under certain
circumstances we can guarantee that these RPC cuts are valid and cut off the
fractional optimal solutions of LP decoding. We demonstrate on two LDPC codes
and one BCH code that our separation algorithm performs significantly better
than LP decoding.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2008 15:55:37 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Tanatmis",
"Akin",
""
],
[
"Ruzika",
"Stefan",
""
],
[
"Hamacher",
"Horst W.",
""
],
[
"Punekar",
"Mayur",
""
],
[
"Kienle",
"Frank",
""
],
[
"Wehn",
"Norbert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2563 | Bernard Mourrain | Monique Laurent (CWI), Bernard Mourrain (INRIA Sophia Antipolis) | A Sparse Flat Extension Theorem for Moment Matrices | null | null | null | null | cs.SC math.AC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note we prove a generalization of the flat extension theorem of Curto
and Fialkow for truncated moment matrices. It applies to moment matrices
indexed by an arbitrary set of monomials and its border, assuming that this set
is connected to 1. When formulated in a basis-free setting, this gives an
equivalent result for truncated Hankel operators.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 07:49:22 GMT"
}
]
| 2009-01-19T00:00:00 | [
[
"Laurent",
"Monique",
"",
"CWI"
],
[
"Mourrain",
"Bernard",
"",
"INRIA Sophia Antipolis"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
]
|
0812.2567 | Jian Li | Jian Li | An $O({\log n\over \log\log n})$ Upper Bound on the Price of Stability
for Undirected Shapley Network Design Games | null | Information Processing Letters archive Volume 109 Issue 15, July,
2009 Pages 876-878 | 10.1016/j.ipl.2009.04.015 | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider the Shapley network design game on undirected
networks. In this game, we have an edge weighted undirected network $G(V,E)$
and $n$ selfish players where player $i$ wants to choose a path from source
vertex $s_i$ to destination vertex $t_i$. The cost of each edge is equally
split among players who pass it. The price of stability is defined as the ratio
of the cost of the best Nash equilibrium to that of the optimal solution. We
present an $O(\log n/\log\log n)$ upper bound on price of stability for the
single sink case, i.e, $t_i=t$ for all $i$.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2008 17:33:29 GMT"
}
]
| 2014-01-27T00:00:00 | [
[
"Li",
"Jian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.2574 | SeyyedMajid Valiollahzadeh | Seyyed Majid Valiollahzadeh, Abolghasem Sayadiyan, Mohammad Nazari | Feature Selection By KDDA For SVM-Based MultiView Face Recognition | 6 pages | null | null | IEEE SETIT 2007 | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Applications such as face recognition that deal with high-dimensional data
need a mapping technique that introduces representation of low-dimensional
features with enhanced discriminatory power and a proper classifier, able to
classify those complex features. Most of traditional Linear Discriminant
Analysis suffer from the disadvantage that their optimality criteria are not
directly related to the classification ability of the obtained feature
representation. Moreover, their classification accuracy is affected by the
"small sample size" problem which is often encountered in FR tasks. In this
short paper, we combine nonlinear kernel based mapping of data called KDDA with
Support Vector machine classifier to deal with both of the shortcomings in an
efficient and cost effective manner. The proposed here method is compared, in
terms of classification accuracy, to other commonly used FR methods on UMIST
face database. Results indicate that the performance of the proposed method is
overall superior to those of traditional FR approaches, such as the Eigenfaces,
Fisherfaces, and D-LDA methods and traditional linear classifiers.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2008 19:09:03 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Valiollahzadeh",
"Seyyed Majid",
""
],
[
"Sayadiyan",
"Abolghasem",
""
],
[
"Nazari",
"Mohammad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.2575 | SeyyedMajid Valiollahzadeh | Seyyed Majid Valiollahzadeh, Abolghasem Sayadiyan, Mohammad Nazari | Face Detection Using Adaboosted SVM-Based Component Classifier | 7 pages | null | null | ICEIS Portugal 2007 | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, Adaboost has been widely used to improve the accuracy of any given
learning algorithm. In this paper we focus on designing an algorithm to employ
combination of Adaboost with Support Vector Machine as weak component
classifiers to be used in Face Detection Task. To obtain a set of effective
SVM-weaklearner Classifier, this algorithm adaptively adjusts the kernel
parameter in SVM instead of using a fixed one. Proposed combination outperforms
in generalization in comparison with SVM on imbalanced classification problem.
The proposed here method is compared, in terms of classification accuracy, to
other commonly used Adaboost methods, such as Decision Trees and Neural
Networks, on CMU+MIT face database. Results indicate that the performance of
the proposed method is overall superior to previous Adaboost approaches.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2008 19:14:53 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Valiollahzadeh",
"Seyyed Majid",
""
],
[
"Sayadiyan",
"Abolghasem",
""
],
[
"Nazari",
"Mohammad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.2599 | Sewoong Oh | Raghunandan H. Keshavan, Andrea Montanari, Sewoong Oh | Learning Low Rank Matrices from O(n) Entries | 8 pages, 11 figures, Forty-sixth Allerton Conference on
Communication, Control and Computing, invited paper | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | How many random entries of an n by m, rank r matrix are necessary to
reconstruct the matrix within an accuracy d? We address this question in the
case of a random matrix with bounded rank, whereby the observed entries are
chosen uniformly at random. We prove that, for any d>0, C(r,d)n observations
are sufficient. Finally we discuss the question of reconstructing the matrix
efficiently, and demonstrate through extensive simulations that this task can
be accomplished in nPoly(log n) operations, for small rank.
| [
{
"version": "v1",
"created": "Sun, 14 Dec 2008 18:30:44 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Keshavan",
"Raghunandan H.",
""
],
[
"Montanari",
"Andrea",
""
],
[
"Oh",
"Sewoong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.2602 | Shamgar Gurevich | Shamgar Gurevich (University of California Berkeley) and Ronny Hadani
(University of Chicago) | The statistical restricted isometry property and the Wigner semicircle
distribution of incoherent dictionaries | Submitted for The 2009 IEEE International Symposium on Information
Theory; Key words: Compressive sensing, Stastical version of Candes-Tao RIP,
Incoherent Dictionaries, Semicircle distribution | null | null | null | cs.IT cs.DM math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we present a statistical version of the Candes-Tao restricted
isometry property (SRIP for short) which holds in general for any incoherent
dictionary which is a disjoint union of orthonormal bases. In addition, we show
that, under appropriate normalization, the eigenvalues of the associated Gram
matrix fluctuate around 1 according to the Wigner semicircle distribution. The
result is then applied to various dictionaries that arise naturally in the
setting of finite harmonic analysis, giving, in particular, a better
understanding on a remark of Applebaum-Howard-Searle-Calderbank concerning RIP
for the Heisenberg dictionary of chirp like functions.
| [
{
"version": "v1",
"created": "Sun, 14 Dec 2008 05:03:58 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Gurevich",
"Shamgar",
"",
"University of California Berkeley"
],
[
"Hadani",
"Ronny",
"",
"University of Chicago"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0812.2636 | Tobias Friedrich | Karl Bringmann, Tobias Friedrich | Approximating the least hypervolume contributor: NP-hard in general, but
fast in practice | 22 pages, to appear in Theoretical Computer Science | null | 10.1016/j.tcs.2010.09.026 | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The hypervolume indicator is an increasingly popular set measure to compare
the quality of two Pareto sets. The basic ingredient of most hypervolume
indicator based optimization algorithms is the calculation of the hypervolume
contribution of single solutions regarding a Pareto set. We show that exact
calculation of the hypervolume contribution is #P-hard while its approximation
is NP-hard. The same holds for the calculation of the minimal contribution. We
also prove that it is NP-hard to decide whether a solution has the least
hypervolume contribution. Even deciding whether the contribution of a solution
is at most $(1+\eps)$ times the minimal contribution is NP-hard. This implies
that it is neither possible to efficiently find the least contributing solution
(unless $P = NP$) nor to approximate it (unless $NP = BPP$).
Nevertheless, in the second part of the paper we present a fast approximation
algorithm for this problem. We prove that for arbitrarily given $\eps,\delta>0$
it calculates a solution with contribution at most $(1+\eps)$ times the minimal
contribution with probability at least $(1-\delta)$. Though it cannot run in
polynomial time for all instances, it performs extremely fast on various
benchmark datasets. The algorithm solves very large problem instances which are
intractable for exact algorithms (e.g., 10000 solutions in 100 dimensions)
within a few seconds.
| [
{
"version": "v1",
"created": "Sun, 14 Dec 2008 13:57:10 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Sep 2010 20:43:10 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Bringmann",
"Karl",
""
],
[
"Friedrich",
"Tobias",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0812.2702 | Mladen Pavicic | Mladen Pavicic and Norman D. Megill | Standard Logics Are Valuation-Nonmonotonic | 35 pages, 3 figures | Journal of Logic and Computation, 18 (6) 959-982 (2008) | null | null | cs.LO cs.AI quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It has recently been discovered that both quantum and classical propositional
logics can be modelled by classes of non-orthomodular and thus non-distributive
lattices that properly contain standard orthomodular and Boolean classes,
respectively. In this paper we prove that these logics are complete even for
those classes of the former lattices from which the standard orthomodular
lattices and Boolean algebras are excluded. We also show that neither quantum
nor classical computers can be founded on the latter models. It follows that
logics are "valuation-nonmonotonic" in the sense that their possible models
(corresponding to their possible hardware implementations) and the valuations
for them drastically change when we add new conditions to their defining
conditions. These valuations can even be completely separated by putting them
into disjoint lattice classes by a technique presented in the paper.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 00:49:12 GMT"
}
]
| 2008-12-17T00:00:00 | [
[
"Pavicic",
"Mladen",
""
],
[
"Megill",
"Norman D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0812.2709 | Bari\c{s} Nakibo\u{g}lu | Robert G. Gallager, Baris Nakiboglu | Variations on a theme by Schalkwijk and Kailath | 18 Pages, 4 figures (added reference) | IEEE Transactions on Information Theory, 56(1):6-17, Jan 2010 | 10.1109/TIT.2009.2034896 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Schalkwijk and Kailath (1966) developed a class of block codes for Gaussian
channels with ideal feedback for which the probability of decoding error
decreases as a second-order exponent in block length for rates below capacity.
This well-known but surprising result is explained and simply derived here in
terms of a result by Elias (1956) concerning the minimum mean-square distortion
achievable in transmitting a single Gaussian random variable over multiple uses
of the same Gaussian channel. A simple modification of the Schalkwijk-Kailath
scheme is then shown to have an error probability that decreases with an
exponential order which is linearly increasing with block length. In the
infinite bandwidth limit, this scheme produces zero error probability using
bounded expected energy at all rates below capacity. A lower bound on error
probability for the finite bandwidth case is then derived in which the error
probability decreases with an exponential order which is linearly increasing in
block length at the same rate as the upper bound.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 02:04:50 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Aug 2009 15:03:12 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Nov 2009 00:48:30 GMT"
},
{
"version": "v4",
"created": "Fri, 20 Nov 2009 18:05:24 GMT"
}
]
| 2018-03-20T00:00:00 | [
[
"Gallager",
"Robert G.",
""
],
[
"Nakiboglu",
"Baris",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2719 | John Shea | Tan F. Wong, Matthieu Bloch, and John M. Shea | Secret Sharing over Fast-Fading MIMO Wiretap Channels | Revision submitted to EURASIP Journal on Wireless Communications and
Networking, Special Issue on Wireless Physical Layer Security, Sept. 2009.
v.3: Fixes to proofs. Matthieu Bloch added as co-author for contributions to
proofs | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Secret sharing over the fast-fading MIMO wiretap channel is considered. A
source and a destination try to share secret information over a fast-fading
MIMO channel in the presence of a wiretapper who also makes channel
observations that are different from but correlated to those made by the
destination. An interactive authenticated unrestricted public channel is also
available for use by the source and destination in the secret sharing process.
This falls under the "channel-type model with wiretapper" considered by
Ahlswede and Csiszar. A minor extension of their result (to continuous channel
alphabets) is employed to evaluate the key capacity of the fast-fading MIMO
wiretap channel. The effects of spatial dimensionality provided by the use of
multiple antennas at the source, destination, and wiretapper are then
investigated.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 04:03:15 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jun 2009 00:52:02 GMT"
},
{
"version": "v3",
"created": "Sat, 12 Sep 2009 03:10:14 GMT"
}
]
| 2009-09-12T00:00:00 | [
[
"Wong",
"Tan F.",
""
],
[
"Bloch",
"Matthieu",
""
],
[
"Shea",
"John M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2726 | Tatsuto Murayama | Tatsuto Murayama and Peter Davis | Universal Behavior in Large-scale Aggregation of Independent Noisy
Observations | 10 pages, 3 figures | null | 10.1209/0295-5075/87/48003 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Aggregation of noisy observations involves a difficult tradeoff between
observation quality, which can be increased by increasing the number of
observations, and aggregation quality which decreases if the number of
observations is too large. We clarify this behavior for a protypical system in
which arbitrarily large numbers of observations exceeding the system capacity
can be aggregated using lossy data compression. We show the existence of a
scaling relation between the collective error and the system capacity, and show
that large scale lossy aggregation can outperform lossless aggregation above a
critical level of observation noise. Further, we show that universal results
for scaling and critical value of noise which are independent of system
capacity can be obtained by considering asymptotic behavior when the system
capacity increases toward infinity.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 06:05:06 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Murayama",
"Tatsuto",
""
],
[
"Davis",
"Peter",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2734 | Benjamin Leveque | Kathie Cameron, Chinh Ho\`ang, Benjamin L\'ev\^eque | Asteroids in rooted and directed path graphs | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An asteroidal triple is a stable set of three vertices such that each pair is
connected by a path avoiding the neighborhood of the third vertex. Asteroidal
triples play a central role in a classical characterization of interval graphs
by Lekkerkerker and Boland. Their result says that a chordal graph is an
interval graph if and only if it contains no asteroidal triple. In this paper,
we prove an analogous theorem for directed path graphs which are the
intersection graphs of directed paths in a directed tree. For this purpose, we
introduce the notion of a strong path. Two non-adjacent vertices are linked by
a strong path if either they have a common neighbor or they are the endpoints
of two vertex-disjoint chordless paths satisfying certain conditions. A strong
asteroidal triple is an asteroidal triple such that each pair is linked by a
strong path. We prove that a chordal graph is a directed path graph if and only
if it contains no strong asteroidal triple. We also introduce a related notion
of asteroidal quadruple, and conjecture a characterization of rooted path
graphs which are the intersection graphs of directed paths in a rooted tree.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 07:50:42 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Dec 2008 14:15:25 GMT"
}
]
| 2008-12-30T00:00:00 | [
[
"Cameron",
"Kathie",
""
],
[
"Hoàng",
"Chinh",
""
],
[
"Lévêque",
"Benjamin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.2769 | Dan Gordon | Dan Gordon (Univ. of Haifa), Rachel Gordon (Technion-Israel Inst. of
Technology) | Geometric scaling: a simple preconditioner for certain linear systems
with discontinuous coefficients | 22 pages, 13 tables, 14 figures, 22 references. Submitted for
publication | null | null | null | cs.MS cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Linear systems with large differences between coefficients ("discontinuous
coefficients") arise in many cases in which partial differential
equations(PDEs) model physical phenomena involving heterogeneous media. The
standard approach to solving such problems is to use domain decomposition
techniques, with domain boundaries conforming to the boundaries between the
different media. This approach can be difficult to implement when the geometry
of the domain boundaries is complicated or the grid is unstructured. This work
examines the simple preconditioning technique of scaling the equations by
dividing each equation by the Lp-norm of its coefficients. This preconditioning
is called geometric scaling (GS). It has long been known that diagonal scaling
can be useful in improving convergence, but there is no study on the general
usefulness of this approach for discontinuous coefficients. GS was tested on
several nonsymmetric linear systems with discontinuous coefficients derived
from convection-diffusion elliptic PDEs with small to moderate convection
terms. It is shown that GS improved the convergence properties of restarted
GMRES and Bi-CGSTAB, with and without the ILUT preconditioner. GS was also
shown to improve the distribution of the eigenvalues by reducing their
concentration around the origin very significantly.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 11:35:17 GMT"
},
{
"version": "v2",
"created": "Mon, 4 May 2009 15:31:09 GMT"
}
]
| 2009-05-04T00:00:00 | [
[
"Gordon",
"Dan",
"",
"Univ. of Haifa"
],
[
"Gordon",
"Rachel",
"",
"Technion-Israel Inst. of\n Technology"
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0812.2775 | Johannes Fischer | Johannes Fischer | Optimal Succinctness for Range Minimum Queries | 12 pages; to appear in Proc. LATIN'10 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a static array A of n ordered objects, a range minimum query asks for the
position of the minimum between two specified array indices. We show how to
preprocess A into a scheme of size 2n+o(n) bits that allows to answer range
minimum queries on A in constant time. This space is asymptotically optimal in
the important setting where access to A is not permitted after the
preprocessing step. Our scheme can be computed in linear time, using only n +
o(n) additional bits at construction time. In interesting by-product is that we
also improve on LCA-computation in BPS- or DFUDS-encoded trees.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 12:03:31 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Apr 2009 07:35:41 GMT"
},
{
"version": "v3",
"created": "Wed, 2 Dec 2009 09:22:49 GMT"
}
]
| 2009-12-02T00:00:00 | [
[
"Fischer",
"Johannes",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.2785 | Tshilidzi Marwala | Baruch Lubinsky, Bekir Genc and Tshilidzi Marwala | Prediction of Platinum Prices Using Dynamically Weighted Mixture of
Experts | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural networks are powerful tools for classification and regression in
static environments. This paper describes a technique for creating an ensemble
of neural networks that adapts dynamically to changing conditions. The model
separates the input space into four regions and each network is given a weight
in each region based on its performance on samples from that region. The
ensemble adapts dynamically by constantly adjusting these weights based on the
current performance of the networks. The data set used is a collection of
financial indicators with the goal of predicting the future platinum price. An
ensemble with no weightings does not improve on the naive estimate of no weekly
change; our weighting algorithm gives an average percentage error of 63% for
twenty weeks of prediction.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 12:35:42 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Lubinsky",
"Baruch",
""
],
[
"Genc",
"Bekir",
""
],
[
"Marwala",
"Tshilidzi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.2851 | Amr Elmasry | Amr Elmasry | The Violation Heap: A Relaxed Fibonacci-Like Heap | 10 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a priority queue that achieves the same amortized bounds as Fibonacci
heaps. Namely, find-min requires O(1) worst-case time, insert, meld and
decrease-key require O(1) amortized time, and delete-min requires $O(\log n)$
amortized time. Our structure is simple and promises an efficient practical
behavior when compared to other known Fibonacci-like heaps. The main idea
behind our construction is to propagate rank updates instead of performing
cascaded cuts following a decrease-key operation, allowing for a relaxed
structure.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 16:16:58 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Feb 2010 12:24:07 GMT"
}
]
| 2010-02-11T00:00:00 | [
[
"Elmasry",
"Amr",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.2868 | Travis Gagie | Pawel Gawrychowski and Travis Gagie | Minimax Trees in Linear Time | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A minimax tree is similar to a Huffman tree except that, instead of
minimizing the weighted average of the leaves' depths, it minimizes the maximum
of any leaf's weight plus its depth. Golumbic (1976) introduced minimax trees
and gave a Huffman-like, $\Oh{n \log n}$-time algorithm for building them.
Drmota and Szpankowski (2002) gave another $\Oh{n \log n}$-time algorithm,
which checks the Kraft Inequality in each step of a binary search. In this
paper we show how Drmota and Szpankowski's algorithm can be made to run in
linear time on a word RAM with (\Omega (\log n))-bit words. We also discuss how
our solution applies to problems in data compression, group testing and circuit
design.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 17:15:51 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jan 2009 13:45:39 GMT"
}
]
| 2009-01-28T00:00:00 | [
[
"Gawrychowski",
"Pawel",
""
],
[
"Gagie",
"Travis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.2870 | Piotr Micek | Kolja Knauer, Piotr Micek, Torsten Ueckerdt | How to eat 4/9 of a pizza | null | null | null | null | cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given two players alternately picking pieces of a pizza sliced by radial
cuts, in such a way that after the first piece is taken every subsequent chosen
piece is adjacent to some previously taken piece, we provide a strategy for the
starting player to get 4/9 of the pizza. This is best possible and settles a
conjecture of Peter Winkler.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 17:35:35 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Dec 2008 21:53:20 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Jan 2010 14:30:15 GMT"
},
{
"version": "v4",
"created": "Mon, 24 Jan 2011 12:47:59 GMT"
}
]
| 2011-01-25T00:00:00 | [
[
"Knauer",
"Kolja",
""
],
[
"Micek",
"Piotr",
""
],
[
"Ueckerdt",
"Torsten",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0812.2874 | Richard McClatchey | Andrew Branson, Tamas Hauer, Richard McClatchey, Dmitry Rogulin and
Jetendr Shamdasani | A Data Model for Integrating Heterogeneous Medical Data in the
Health-e-Child Project | 10 pages, 4 figures, 1 table. Proceedings the 6th HealthGrid Int.
Conference (HG08) | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There has been much research activity in recent times about providing the
data infrastructures needed for the provision of personalised healthcare. In
particular the requirement of integrating multiple, potentially distributed,
heterogeneous data sources in the medical domain for the use of clinicians has
set challenging goals for the healthgrid community. The approach advocated in
this paper surrounds the provision of an Integrated Data Model plus links
to/from ontologies to homogenize biomedical (from genomic, through cellular,
disease, patient and population-related) data in the context of the EC
Framework 6 Health-e-Child project. Clinical requirements are identified, the
design approach in constructing the model is detailed and the integrated model
described in the context of examples taken from that project. Pointers are
given to future work relating the model to medical ontologies and challenges to
the use of fully integrated models and ontologies are identified.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 18:25:51 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Branson",
"Andrew",
""
],
[
"Hauer",
"Tamas",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Rogulin",
"Dmitry",
""
],
[
"Shamdasani",
"Jetendr",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0812.2879 | Richard McClatchey | Kamran Munir, Mohammed Odeh and Richard McClatchey | Ontology Assisted Query Reformulation Using Semantic and Assertion
Capabilities of OWL-DL Ontologies | 15 pages, 4 figures. Proceedings of the 12th International Database
Engineering & Applications Symposium (Ideas2008) | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | End users of recent biomedical information systems are often unaware of the
storage structure and access mechanisms of the underlying data sources and can
require simplified mechanisms for writing domain specific complex queries. This
research aims to assist users and their applications in formulating queries
without requiring complete knowledge of the information structure of underlying
data sources. To achieve this, query reformulation techniques and algorithms
have been developed that can interpret ontology-based search criteria and
associated domain knowledge in order to reformulate a relational query. These
query reformulation algorithms exploit the semantic relationships and assertion
capabilities of OWL-DL based domain ontologies for query reformulation. In this
paper, this approach is applied to the integrated database schema of the EU
funded Health-e-Child (HeC) project with the aim of providing ontology assisted
query reformulation techniques to simplify the global access that is needed to
millions of medical records across the UK and Europe.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 18:34:44 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Munir",
"Kamran",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0812.2891 | Sandeep Chalasani | Sandeep Chalasani | On the Value of a Social Network | 12 pages; 13 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we investigate the value of a social network with respect to
the probability mechanism underlying its structure. Specifically, we compute
the value for small world and scale free networks. We provide evidence in
support of the value to be given by Zipfs law.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 19:20:15 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Chalasani",
"Sandeep",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.2892 | SeyyedMajid Valiollahzadeh | Hadi. Zayyani, Seyyedmajid Valiollahzadeh, Massoud. Babaie-Zadeh | Sparse Component Analysis (SCA) in Random-valued and Salt and Pepper
Noise Removal | 6 pages | null | null | ICEE 2008 | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a new method for impulse noise removal from images.
It uses the sparsity of images in the Discrete Cosine Transform (DCT) domain.
The zeros in this domain give us the exact mathematical equation to reconstruct
the pixels that are corrupted by random-value impulse noises. The proposed
method can also detect and correct the corrupted pixels. Moreover, in a simpler
case that salt and pepper noise is the brightest and darkest pixels in the
image, we propose a simpler version of our method. In addition to the proposed
method, we suggest a combination of the traditional median filter method with
our method to yield better results when the percentage of the corrupted samples
is high.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 19:24:45 GMT"
}
]
| 2008-12-16T00:00:00 | [
[
"Zayyani",
"Hadi.",
""
],
[
"Valiollahzadeh",
"Seyyedmajid",
""
],
[
"Babaie-Zadeh",
"Massoud.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0812.2926 | Gheorghe Stefanescu | Gheorghe Stefanescu and Camelia Chira | New parallel programming language design: a bridge between brain models
and multi-core/many-core computers? | To appear in: "From Natural Language to Soft Computing: New Paradigms
in Artificial Intelligence,", L.A. Zadeh et.al (Eds.), Editing House of
Romanian Academy, 2008 | null | null | null | cs.PL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The recurrent theme of this paper is that sequences of long temporal patterns
as opposed to sequences of simple statements are to be fed into computation
devices, being them (new proposed) models for brain activity or
multi-core/many-core computers. In such models, parts of these long temporal
patterns are already committed while other are predicted. This combination of
matching patterns and making predictions appears as a key element in producing
intelligent processing in brain models and getting efficient speculative
execution on multi-core/many-core computers. A bridge between these far-apart
models of computation could be provided by appropriate design of massively
parallel, interactive programming languages. Agapia is a recently proposed
language of this kind, where user controlled long high-level temporal
structures occur at the interaction interfaces of processes. In this paper
Agapia is used to link HTMs brain models with TRIPS multi-core/many-core
architectures.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2008 22:55:19 GMT"
}
]
| 2008-12-17T00:00:00 | [
[
"Stefanescu",
"Gheorghe",
""
],
[
"Chira",
"Camelia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.2967 | Jeff M Phillips | Maarten Loffler and Jeff M. Phillips | Shape Fitting on Point Sets with Probability Distributions | 19 pages, 24 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A typical computational geometry problem begins: Consider a set P of n points
in R^d. However, many applications today work with input that is not precisely
known, for example when the data is sensed and has some known error model. What
if we do not know the set P exactly, but rather we have a probability
distribution mu_p governing the location of each point p in P?
Consider a set of (non-fixed) points P, and let mu_P be the probability
distribution of this set. We study several measures (e.g. the radius of the
smallest enclosing ball, or the area of the smallest enclosing box) with
respect to mu_P. The solutions to these problems do not, as in the traditional
case, consist of a single answer, but rather a distribution of answers. We
describe several data structures that approximate distributions of answers for
shape fitting problems.
We provide simple and efficient randomized algorithms for computing all of
these data structures, which are easy to implement and practical. We provide
some experimental results to assert this. We also provide more involved
deterministic algorithms for some of these data structures that run in time
polynomial in n and 1/eps, where eps is the approximation factor.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 04:09:38 GMT"
}
]
| 2008-12-17T00:00:00 | [
[
"Loffler",
"Maarten",
""
],
[
"Phillips",
"Jeff M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0812.2969 | Marco Piastra | Marco Piastra | A Growing Self-Organizing Network for Reconstructing Curves and Surfaces | null | Neural Networks, 2009. IJCNN 2009. International Joint Conference
on , vol., no., pp.2533,2540, 14-19 June 2009 | 10.1109/IJCNN.2009.5178709 | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Self-organizing networks such as Neural Gas, Growing Neural Gas and many
others have been adopted in actual applications for both dimensionality
reduction and manifold learning. Typically, in these applications, the
structure of the adapted network yields a good estimate of the topology of the
unknown subspace from where the input data points are sampled. The approach
presented here takes a different perspective, namely by assuming that the input
space is a manifold of known dimension. In return, the new type of growing
self-organizing network presented gains the ability to adapt itself in way that
may guarantee the effective and stable recovery of the exact topological
structure of the input manifold.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 15:59:36 GMT"
},
{
"version": "v2",
"created": "Sun, 21 Dec 2008 17:22:02 GMT"
}
]
| 2015-03-23T00:00:00 | [
[
"Piastra",
"Marco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.2971 | Ning Chen | Meghanad D. Wagh, Ning Chen, and Zhiyuan Yan | Cyclotomic FFT of Length 2047 Based on a Novel 11-point Cyclic
Convolution | 11 pages, 1 figure | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this manuscript, we propose a novel 11-point cyclic convolution algorithm
based on alternate Fourier transform. With the proposed bilinear form, we
construct a length-2047 cyclotomic FFT.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 05:04:31 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Mar 2009 00:49:02 GMT"
},
{
"version": "v3",
"created": "Mon, 20 Apr 2009 15:44:27 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Wagh",
"Meghanad D.",
""
],
[
"Chen",
"Ning",
""
],
[
"Yan",
"Zhiyuan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.2988 | Philippe Roose | Emmanuel Bouix (LIUPPA), Philippe Roose (LIUPPA), Marc Dalmau (LIUPPA) | The Korrontea Data Modeling | null | Ambisys, Quebec City : Canada (2008) | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Needs of multimedia systems evolved due to the evolution of their
architecture which is now distributed into heterogeneous contexts. A critical
issue lies in the fact that they handle, process, and transmit multimedia data.
This data integrates several properties which should be considered since it
holds a considerable part of its semantics, for instance the lips
synchronization in a video. In this paper, we focus on the definition of a
model as a basic abstraction for describing and modeling media in multimedia
systems by taking into account their properties. This model will be used in
software architecture in order to handle data in efficient way. The provided
model is an interesting solution for the integration of media into
applications; we propose to consider and to handle them in a uniform way. This
model is proposed with synchronization policies to ensure synchronous transport
of media. Therefore, we use it in a component model that we develop for the
design and deployment of distributed multimedia systems.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 07:46:49 GMT"
}
]
| 2008-12-17T00:00:00 | [
[
"Bouix",
"Emmanuel",
"",
"LIUPPA"
],
[
"Roose",
"Philippe",
"",
"LIUPPA"
],
[
"Dalmau",
"Marc",
"",
"LIUPPA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0812.2989 | Philippe Roose | Christine Louberry (LIUPPA), Philippe Roose (LIUPPA), Marc Dalmau
(LIUPPA) | Heterogeneous component interactions: Sensors integration into
multimedia applications | null | Journal of Networks, Issue N6, Academy Publisher 3, 4 (2008) | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Resource-constrained embedded and mobile devices are becoming increasingly
common. Since few years, some mobile and ubiquitous devices such as wireless
sensor, able to be aware of their physical environment, appeared. Such devices
enable proposing applications which adapt to user's need according the context
evolution. It implies the collaboration of sensors and software components
which differ on their nature and their communication mechanisms. This paper
proposes a unified component model in order to easily design applications based
on software components and sensors without taking care of their nature. Then it
presents a state of the art of communication problems linked to heterogeneous
components and proposes an interaction mechanism which ensures information
exchanges between wireless sensors and software components.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 07:47:22 GMT"
}
]
| 2008-12-17T00:00:00 | [
[
"Louberry",
"Christine",
"",
"LIUPPA"
],
[
"Roose",
"Philippe",
"",
"LIUPPA"
],
[
"Dalmau",
"Marc",
"",
"LIUPPA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0812.2990 | Frederic Mazoit | Fr\'ed\'eric Mazoit (LaBRI) | Tree-width of hypergraphs and surface duality | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In Graph Minor III, Robertson and Seymour conjecture that the tree-width of a
planar graph and that of its dual differ by at most one. We prove that given a
hypergraph H on a surface of Euler genus k, the tree-width of H^* is at most
the maximum of tw(H) + 1 + k and the maximum size of a hyperedge of H^*.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 07:47:50 GMT"
}
]
| 2008-12-17T00:00:00 | [
[
"Mazoit",
"Frédéric",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.2991 | Thierry Poibeau | Amanda Bouffier (LIPN), Thierry Poibeau (LIPN), Catherine Duclos
(LIM&Bio) | Analyse et structuration automatique des guides de bonnes pratiques
cliniques : essai d'\'evaluation | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Health Practice Guideliens are supposed to unify practices and propose
recommendations to physicians. This paper describes GemFrame, a system capable
of semi-automatically filling an XML template from free texts in the clinical
domain. The XML template includes semantic information not explicitly encoded
in the text (pairs of conditions and ac-tions/recommendations). Therefore,
there is a need to compute the exact scope of condi-tions over text sequences
expressing the re-quired actions. We present a system developped for this task.
We show that it yields good performance when applied to the analysis of French
practice guidelines. We conclude with a precise evaluation of the tool.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 07:49:20 GMT"
}
]
| 2008-12-17T00:00:00 | [
[
"Bouffier",
"Amanda",
"",
"LIPN"
],
[
"Poibeau",
"Thierry",
"",
"LIPN"
],
[
"Duclos",
"Catherine",
"",
"LIM&Bio"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.3066 | Tomer Michaeli | Y. C. Eldar, T. Michaeli | Beyond Bandlimited Sampling: Nonlinearities, Smoothness and Sparsity | 35 pages, 16 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sampling theory has benefited from a surge of research in recent years, due
in part to the intense research in wavelet theory and the connections made
between the two fields. In this survey we present several extensions of the
Shannon theorem, that have been developed primarily in the past two decades,
which treat a wide class of input signals as well as nonideal sampling and
nonlinear distortions. This framework is based on viewing sampling in a broader
sense of projection onto appropriate subspaces, and then choosing the subspaces
to yield interesting new possibilities. For example, our results can be used to
uniformly sample non-bandlimited signals, and to perfectly compensate for
nonlinear effects.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 14:19:45 GMT"
}
]
| 2008-12-17T00:00:00 | [
[
"Eldar",
"Y. C.",
""
],
[
"Michaeli",
"T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.3068 | Bas Luttik | Rob van Glabbeek, Bas Luttik and Nikola Trcka | Branching Bisimilarity with Explicit Divergence | null | null | null | CS-R 08-25 | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the relational characterisation of branching bisimilarity with
explicit divergence. We prove that it is an equivalence and that it coincides
with the original definition of branching bisimilarity with explicit divergence
in terms of coloured traces. We also establish a correspondence with several
variants of an action-based modal logic with until- and divergence modalities.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 14:36:43 GMT"
}
]
| 2008-12-17T00:00:00 | [
[
"van Glabbeek",
"Rob",
""
],
[
"Luttik",
"Bas",
""
],
[
"Trcka",
"Nikola",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0812.3070 | Alex Arenas | J. Borge, A. Arenas | A Computational Model to Disentangle Semantic Information Embedded in
Word Association Norms | 9 pages, 3 figures | null | null | null | cs.CL cs.AI physics.data-an physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two well-known databases of semantic relationships between pairs of words
used in psycholinguistics, feature-based and association-based, are studied as
complex networks. We propose an algorithm to disentangle feature based
relationships from free association semantic networks. The algorithm uses the
rich topology of the free association semantic network to produce a new set of
relationships between words similar to those observed in feature production
norms.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 14:24:23 GMT"
}
]
| 2008-12-17T00:00:00 | [
[
"Borge",
"J.",
""
],
[
"Arenas",
"A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0812.3120 | Jun Zhang | Jun Zhang, Robert W. Heath Jr., Marios Kountouris, and Jeffrey G.
Andrews | Mode Switching for MIMO Broadcast Channel Based on Delay and Channel
Quantization | 29 pages, submitted to EURASIP Special Issue on Multiuser MIMO
Transmission with Limited Feedback, Cooperation, and Coordination | null | 10.1155/2009/802548 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Imperfect channel state information degrades the performance of
multiple-input multiple-output (MIMO) communications; its effect on single-user
(SU) and multi-user (MU) MIMO transmissions are quite different. In particular,
MU-MIMO suffers from residual inter-user interference due to imperfect channel
state information while SU-MIMO only suffers from a power loss. This paper
compares the throughput loss of both SU and MU MIMO on the downlink due to
delay and channel quantization. Accurate closed-form approximations are derived
for the achievable rates for both SU and MU MIMO. It is shown that SU-MIMO is
relatively robust to delayed and quantized channel information, while MU MIMO
with zero-forcing precoding loses spatial multiplexing gain with a fixed delay
or fixed codebook size. Based on derived achievable rates, a mode switching
algorithm is proposed that switches between SU and MU MIMO modes to improve the
spectral efficiency, based on the average signal-to-noise ratio (SNR), the
normalized Doppler frequency, and the channel quantization codebook size. The
operating regions for SU and MU modes with different delays and codebook sizes
are determined, which can be used to select the preferred mode. It is shown
that the MU mode is active only when the normalized Doppler frequency is very
small and the codebook size is large.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 18:15:02 GMT"
}
]
| 2016-02-17T00:00:00 | [
[
"Zhang",
"Jun",
""
],
[
"Heath",
"Robert W.",
"Jr."
],
[
"Kountouris",
"Marios",
""
],
[
"Andrews",
"Jeffrey G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.3124 | Jun Zhang | Jun Zhang, Marios Kountouris, Jeffrey G. Andrews and Robert W. Heath
Jr | Achievable Throughput of Multi-mode Multiuser MIMO with Imperfect CSI
Constraints | 5 pages, 3 figures, submitted to 2009 IEEE International Symposium on
Information Theory | null | 10.1109/ISIT.2009.5205915 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For the multiple-input multiple-output (MIMO) broadcast channel with
imperfect channel state information (CSI), neither the capacity nor the optimal
transmission technique have been fully discovered. In this paper, we derive
achievable ergodic rates for a MIMO fading broadcast channel when CSI is
delayed and quantized. It is shown that we should not support too many users
with spatial division multiplexing due to the residual inter-user interference
caused by imperfect CSI. Based on the derived achievable rates, we propose a
multi-mode transmission strategy to maximize the throughput, which adaptively
adjusts the number of active users based on the channel statistics information.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 18:25:29 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Zhang",
"Jun",
""
],
[
"Kountouris",
"Marios",
""
],
[
"Andrews",
"Jeffrey G.",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.3137 | Olga Holtz | Olga Holtz | Compressive sensing: a paradigm shift in signal processing | A short survey of compressive sensing | null | null | null | math.HO cs.DS cs.NA math.NA math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We survey a new paradigm in signal processing known as "compressive sensing".
Contrary to old practices of data acquisition and reconstruction based on the
Shannon-Nyquist sampling principle, the new theory shows that it is possible to
reconstruct images or signals of scientific interest accurately and even
exactly from a number of samples which is far smaller than the desired
resolution of the image/signal, e.g., the number of pixels in the image. This
new technique draws from results in several fields of mathematics, including
algebra, optimization, probability theory, and harmonic analysis. We will
discuss some of the key mathematical ideas behind compressive sensing, as well
as its implications to other fields: numerical analysis, information theory,
theoretical computer science, and engineering.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 19:53:30 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Holtz",
"Olga",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0812.3145 | Todd Young | Erik Boczko, Andrew DiLullo and Todd Young | Binary Classification Based on Potentials | 5 pages, 2 figures. Presented at the Ohio Collaborative Conference on
Bioinformatics (OCCBIO) June 2006 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a simple and computationally trivial method for binary
classification based on the evaluation of potential functions. We demonstrate
that despite the conceptual and computational simplicity of the method its
performance can match or exceed that of standard Support Vector Machine
methods.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 20:41:06 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Dec 2008 21:05:28 GMT"
}
]
| 2008-12-17T00:00:00 | [
[
"Boczko",
"Erik",
""
],
[
"DiLullo",
"Andrew",
""
],
[
"Young",
"Todd",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.3147 | Todd Young | Erik M. Boczko, Todd Young, Minhui Zie, and Di Wu | Comparison of Binary Classification Based on Signed Distance Functions
with Support Vector Machines | 5 pages, 4 figures. Presented at the Ohio Collaborative Conference on
Bioinformatics (OCCBIO), June 2006 | null | null | null | cs.LG cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the performance of a simple signed distance function (SDF)
based method by direct comparison with standard SVM packages, as well as
K-nearest neighbor and RBFN methods. We present experimental results comparing
the SDF approach with other classifiers on both synthetic geometric problems
and five benchmark clinical microarray data sets. On both geometric problems
and microarray data sets, the non-optimized SDF based classifiers perform just
as well or slightly better than well-developed, standard SVM methods. These
results demonstrate the potential accuracy of SDF-based methods on some types
of problems.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2008 20:58:24 GMT"
}
]
| 2008-12-17T00:00:00 | [
[
"Boczko",
"Erik M.",
""
],
[
"Young",
"Todd",
""
],
[
"Zie",
"Minhui",
""
],
[
"Wu",
"Di",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0812.3186 | Jeffrey Shallit | E. Grant, J. Shallit, T. Stoll | Bounds for the discrete correlation of infinite sequences on k symbols
and generalized Rudin-Shapiro sequences | Improved Introduction and new Section 6 (Lovasz local lemma) | null | 10.4064/aa140-4-5 | null | math.CO cs.FL math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by the known autocorrelation properties of the Rudin-Shapiro
sequence, we study the discrete correlation among infinite sequences over a
finite alphabet, where we just take into account whether two symbols are
identical. We show by combinatorial means that sequences cannot be "too"
different, and by an explicit construction generalizing the Rudin-Shapiro
sequence, we show that we can achieve the maximum possible difference.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2008 00:50:54 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Dec 2008 11:08:37 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Feb 2009 19:54:07 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Grant",
"E.",
""
],
[
"Shallit",
"J.",
""
],
[
"Stoll",
"T.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
]
|
0812.3214 | Malay Dutta | Malay Dutta (Tezpur University India) | Two conjectures such that the proof of any one of them will lead to the
proof that P = NP | Some minor corrections | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we define a construct called a time-graph. A complete
time-graph of order n is the cartesian product of a complete graph with n
vertices and a linear graph with n vertices. A time-graph of order n is given
by a subset of the set of edges E(n) of such a graph. The notion of a
hamiltonian time-graph is defined in a natural way and we define the
Hamiltonian time-graph problem (HAMTG) as : Given a time-graph is it
hamiltonian ? We show that the Hamiltonian path problem (HAMP) can be
transformed to HAMTG in polynomial time. We then define certain vector spaces
of functions from E(n) and E(n)xE(n) to B = {0,1}, the field of two elements
and derive certain properties of these spaces. We give two conjectures about
these spaces and prove that if any one of these conjectures is true, we get a
polynomial time algorithm for the Hamiltonian path problem. Since the
Hamiltonian path problem is NP-complete we obtain the proof of P = NP provided
any one of the two conjectures is true.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2008 07:03:53 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Dec 2008 03:53:16 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Dutta",
"Malay",
"",
"Tezpur University India"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0812.3226 | Jocelyne Troccaz | Stefano Sclaverano (TIMC), Gr\'egoire Chevreau (TIMC), Lucile Vadcard
(LSE), Pierre Mozer, Jocelyne Troccaz (TIMC) | BiopSym: a simulator for enhanced learning of ultrasound-guided prostate
biopsy | null | Medecine Meets Virtual Reality, Los Angeles : \'Etats-Unis
d'Am\'erique (2009) | 10.3233/978-1-58603-964-6-301 | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a simulator of ultrasound-guided prostate biopsies for
cancer diagnosis. When performing biopsy series, the clinician has to move the
ultrasound probe and to mentally integrate the real-time bi-dimensional images
into a three-dimensional (3D) representation of the anatomical environment.
Such a 3D representation is necessary to sample regularly the prostate in order
to maximize the probability of detecting a cancer if any. To make the training
of young physicians easier and faster we developed a simulator that combines
images computed from three-dimensional ultrasound recorded data to haptic
feedback. The paper presents the first version of this simulator.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2008 09:22:47 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Sclaverano",
"Stefano",
"",
"TIMC"
],
[
"Chevreau",
"Grégoire",
"",
"TIMC"
],
[
"Vadcard",
"Lucile",
"",
"LSE"
],
[
"Mozer",
"Pierre",
"",
"TIMC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0812.3232 | Raymond Louie Mr. | Raymond H. Y. Louie, Matthew R. McKay, Iain B. Collings | Maximum Sum-Rate of MIMO Multiuser Scheduling with Linear Receivers | 25 pages, 8 figures, corrected typos, Subject to minor revision in
IEEE Transactions on Communications | null | 10.1109/TCOMM.2009.11.080210 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze scheduling algorithms for multiuser communication systems with
users having multiple antennas and linear receivers. When there is no feedback
of channel information, we consider a common round robin scheduling algorithm,
and derive new exact and high signal-to-noise ratio (SNR) maximum sum-rate
results for the maximum ratio combining (MRC) and minimum mean squared error
(MMSE) receivers. We also present new analysis of MRC, zero forcing (ZF) and
MMSE receivers in the low SNR regime. When there are limited feedback
capabilities in the system, we consider a common practical scheduling scheme
based on signal-to-interference-and-noise ratio (SINR) feedback at the
transmitter. We derive new accurate approximations for the maximum sum-rate,
for the cases of MRC, ZF and MMSE receivers. We also derive maximum sum-rate
scaling laws, which reveal that the maximum sum-rate of all three linear
receivers converge to the same value for a large number of users, but at
different rates.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2008 09:39:03 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2008 00:14:57 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Louie",
"Raymond H. Y.",
""
],
[
"McKay",
"Matthew R.",
""
],
[
"Collings",
"Iain B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.3249 | Franco Milicchio | Antonio DiCarlo, Franco Milicchio, Alberto Paoluzzi, and Vadim Shapiro | Chain-Based Representations for Solid and Physical Modeling | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we show that the (co)chain complex associated with a
decomposition of the computational domain, commonly called a mesh in
computational science and engineering, can be represented by a block-bidiagonal
matrix that we call the Hasse matrix. Moreover, we show that
topology-preserving mesh refinements, produced by the action of (the simplest)
Euler operators, can be reduced to multilinear transformations of the Hasse
matrix representing the complex. Our main result is a new representation of the
(co)chain complex underlying field computations, a representation that provides
new insights into the transformations induced by local mesh refinements. Our
approach is based on first principles and is general in that it applies to most
representational domains that can be characterized as cell complexes, without
any restrictions on their type, dimension, codimension, orientability,
manifoldness, connectedness.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2008 11:03:31 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"DiCarlo",
"Antonio",
""
],
[
"Milicchio",
"Franco",
""
],
[
"Paoluzzi",
"Alberto",
""
],
[
"Shapiro",
"Vadim",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0812.3259 | Valmir Barbosa | Rodrigo S. C. Leao, Valmir C. Barbosa | Approximate conditional distributions of distances between nodes in a
two-dimensional sensor network | null | Lecture Notes in Computer Science 5513 (2009), 324-338 | 10.1007/978-3-642-02205-0_23 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When we represent a network of sensors in Euclidean space by a graph, there
are two distances between any two nodes that we may consider. One of them is
the Euclidean distance. The other is the distance between the two nodes in the
graph, defined to be the number of edges on a shortest path between them. In
this paper, we consider a network of sensors placed uniformly at random in a
two-dimensional region and study two conditional distributions related to these
distances. The first is the probability distribution of distances in the graph,
conditioned on Euclidean distances; the other is the probability density
function associated with Euclidean distances, conditioned on distances in the
graph. We study these distributions both analytically (when feasible) and by
means of simulations. To the best of our knowledge, our results constitute the
first of their kind and open up the possibility of discovering improved
solutions to certain sensor-network problems, as for example sensor
localization.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2008 11:23:59 GMT"
}
]
| 2009-06-10T00:00:00 | [
[
"Leao",
"Rodrigo S. C.",
""
],
[
"Barbosa",
"Valmir C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.3285 | Alina Maor | Alina Maor and Neri Merhav | On Successive Refinement for the Kaspi/Heegard-Berger Problem | Submitted to IEEE Trans. Inform. Theory, December 2008 | null | null | Technical Report, CCIT Pub. no. 711, EE Pub. no. 1668, December 2008 | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a source that produces independent copies of a triplet of jointly
distributed random variables, $\{X_{i},Y_{i},Z_{i}\}_{i=1}^{\infty}$. The
process $\{X_{i}\}$ is observed at the encoder, and is supposed to be
reproduced at two decoders, where $\{Y_{i}\}$ and $\{Z_{i}\}$ are observed, in
either a causal or non-causal manner. The communication between the encoder and
the decoders is carried in two successive stages. In the first stage, the
transmission is available to both decoders and the source is reconstructed
according to the received bit-stream and the individual side information (SI).
In the second stage, additional information is sent to both decoders and the
source reconstructions are refined according to the transmissions at both
stages and the available SI. It is desired to find the necessary and sufficient
conditions on the communication rates between the encoder and decoders, so that
the distortions incurred (at each stage) will not exceed given thresholds. For
the case of non-degraded causal SI at the decoders, an exact single-letter
characterization of the achievable region is derived for the case of pure
source-coding. Then, for the case of communication carried over independent
DMS's with random states known causally/non-causally at the encoder and with
causal SI about the source at the decoders, a single-letter characterization of
all achievable distortion in both stages is provided and it is shown that the
separation theorem holds. Finally, for non-causal degraded SI, inner and outer
bounds to the achievable rate-distortion region are derived. These bounds are
shown to be tight for certain cases of reconstruction requirements at the
decoders, thereby shading some light on the problem of successive refinement
with non-degraded SI at the decoders.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2008 13:28:52 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Maor",
"Alina",
""
],
[
"Merhav",
"Neri",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.3306 | Travis Gagie | Travis Gagie and Yakov Nekrich | Worst-Case Optimal Adaptive Prefix Coding | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A common complaint about adaptive prefix coding is that it is much slower
than static prefix coding. Karpinski and Nekrich recently took an important
step towards resolving this: they gave an adaptive Shannon coding algorithm
that encodes each character in (O (1)) amortized time and decodes it in (O
(\log H)) amortized time, where $H$ is the empirical entropy of the input
string $s$. For comparison, Gagie's adaptive Shannon coder and both Knuth's and
Vitter's adaptive Huffman coders all use (\Theta (H)) amortized time for each
character. In this paper we give an adaptive Shannon coder that both encodes
and decodes each character in (O (1)) worst-case time. As with both previous
adaptive Shannon coders, we store $s$ in at most ((H + 1) |s| + o (|s|)) bits.
We also show that this encoding length is worst-case optimal up to the lower
order term.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2008 14:47:34 GMT"
}
]
| 2008-12-18T00:00:00 | [
[
"Gagie",
"Travis",
""
],
[
"Nekrich",
"Yakov",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.3404 | Olivier Leveque | Olivier Leveque, Christophe Vignat, Melda Yuksel | Diversity-Multiplexing Tradeoff for the MIMO Static Half-Duplex Relay | 19 pages, 2 figures, submitted to the IEEE Transactions on
Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we investigate the diversity-multiplexing tradeoff (DMT) of the
multiple-antenna (MIMO) static half-duplex relay channel. A general expression
is derived for the DMT upper bound, which can be achieved by a
compress-and-forward protocol at the relay, under certain assumptions. The DMT
expression is given as the solution of a minimization problem in general, and
an explicit expression is found when the relay channel is symmetric in terms of
number of antennas, i.e. the source and the destination have n antennas each,
and the relay has m antennas. It is observed that the static half-duplex DMT
matches the full-duplex DMT when the relay has a single antenna, and is
strictly below the full-duplex DMT when the relay has multiple antennas.
Besides, the derivation of the upper bound involves a new asymptotic study of
spherical integrals (that is, integrals with respect to the Haar measure on the
unitary group U(n)), which is a topic of mathematical interest in itself.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2008 21:10:26 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Nov 2009 22:48:30 GMT"
}
]
| 2009-11-09T00:00:00 | [
[
"Leveque",
"Olivier",
""
],
[
"Vignat",
"Christophe",
""
],
[
"Yuksel",
"Melda",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.3429 | Dmytro Gavinsky | Dmytro Gavinsky | Quantum Predictive Learning and Communication Complexity with Single
Input | null | null | null | null | quant-ph cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define a new model of quantum learning that we call Predictive Quantum
(PQ). This is a quantum analogue of PAC, where during the testing phase the
student is only required to answer a polynomial number of testing queries.
We demonstrate a relational concept class that is efficiently learnable in
PQ, while in any "reasonable" classical model exponential amount of training
data would be required. This is the first unconditional separation between
quantum and classical learning.
We show that our separation is the best possible in several ways; in
particular, there is no analogous result for a functional class, as well as for
several weaker versions of quantum learning. In order to demonstrate tightness
of our separation we consider a special case of one-way communication that we
call single-input mode, where Bob receives no input. Somewhat surprisingly,
this setting becomes nontrivial when relational communication tasks are
considered. In particular, any problem with two-sided input can be transformed
into a single-input relational problem of equal classical one-way cost. We show
that the situation is different in the quantum case, where the same
transformation can make the communication complexity exponentially larger. This
happens if and only if the original problem has exponential gap between quantum
and classical one-way communication costs. We believe that these auxiliary
results might be of independent interest.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2008 22:46:18 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Feb 2010 05:06:20 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Mar 2012 03:31:18 GMT"
}
]
| 2022-03-29T00:00:00 | [
[
"Gavinsky",
"Dmytro",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.3447 | Chris Ng | Chris T. K. Ng, Muriel Medard, Asuman Ozdaglar | Completion Time Minimization and Robust Power Control in Wireless Packet
Networks | 16 pages, 7 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A wireless packet network is considered in which each user transmits a stream
of packets to its destination. The transmit power of each user interferes with
the transmission of all other users. A convex cost function of the completion
times of the user packets is minimized by optimally allocating the users'
transmission power subject to their respective power constraints. At all ranges
of SINR, completion time minimization can be formulated as a convex
optimization problem and hence can be efficiently solved. In particular,
although the feasible rate region of the wireless network is non-convex, its
corresponding completion time region is shown to be convex. When channel
knowledge is imperfect, robust power control is considered based on the channel
fading distribution subject to outage probability constraints. The problem is
shown to be convex when the fading distribution is log-concave in exponentiated
channel power gains; e.g., when each user is under independent Rayleigh,
Nakagami, or log-normal fading. Applying the optimization frameworks in a
wireless cellular network, the average completion time is significantly reduced
as compared to full power transmission.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2008 02:30:56 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Apr 2011 05:38:49 GMT"
}
]
| 2011-04-06T00:00:00 | [
[
"Ng",
"Chris T. K.",
""
],
[
"Medard",
"Muriel",
""
],
[
"Ozdaglar",
"Asuman",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.3465 | Paat Rusmevichientong | Paat Rusmevichientong and John N. Tsitsiklis | Linearly Parameterized Bandits | 40 pages; updated results and references | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider bandit problems involving a large (possibly infinite) collection
of arms, in which the expected reward of each arm is a linear function of an
$r$-dimensional random vector $\mathbf{Z} \in \mathbb{R}^r$, where $r \geq 2$.
The objective is to minimize the cumulative regret and Bayes risk. When the set
of arms corresponds to the unit sphere, we prove that the regret and Bayes risk
is of order $\Theta(r \sqrt{T})$, by establishing a lower bound for an
arbitrary policy, and showing that a matching upper bound is obtained through a
policy that alternates between exploration and exploitation phases. The
phase-based policy is also shown to be effective if the set of arms satisfies a
strong convexity condition. For the case of a general set of arms, we describe
a near-optimal policy whose regret and Bayes risk admit upper bounds of the
form $O(r \sqrt{T} \log^{3/2} T)$.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2008 07:59:33 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Feb 2010 15:54:49 GMT"
}
]
| 2010-02-24T00:00:00 | [
[
"Rusmevichientong",
"Paat",
""
],
[
"Tsitsiklis",
"John N.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.3478 | Wilson Wong | Wilson Wong, Wei Liu, Saujoe Liaw, Nicoletta Balliu, Hongwei Wu, Moses
Tade | Automatic Construction of Lightweight Domain Ontologies for Chemical
Engineering Risk Management | In the Proceedings of the 11th Conference on Process Integration,
Modelling and Optimisation for Energy Saving and Pollution Reduction (PRES),
Prague, Czech Rep., August, 2008 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The need for domain ontologies in mission critical applications such as risk
management and hazard identification is becoming more and more pressing. Most
research on ontology learning conducted in the academia remains unrealistic for
real-world applications. One of the main problems is the dependence on
non-incremental, rare knowledge and textual resources, and manually-crafted
patterns and rules. This paper reports work in progress aiming to address such
undesirable dependencies during ontology construction. Initial experiments
using a working prototype of the system revealed promising potentials in
automatically constructing high-quality domain ontologies using real-world
texts.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2008 08:58:52 GMT"
}
]
| 2008-12-19T00:00:00 | [
[
"Wong",
"Wilson",
""
],
[
"Liu",
"Wei",
""
],
[
"Liaw",
"Saujoe",
""
],
[
"Balliu",
"Nicoletta",
""
],
[
"Wu",
"Hongwei",
""
],
[
"Tade",
"Moses",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.3550 | Pierre Genev\`es | Pierre Geneves and Nabil Layaida | XML Static Analyzer User Manual | null | null | null | RR-6726 | cs.PL cs.DB cs.LO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This document describes how to use the XML static analyzer in practice. It
provides informal documentation for using the XML reasoning solver
implementation. The solver allows automated verification of properties that are
expressed as logical formulas over trees. A logical formula may for instance
express structural constraints or navigation properties (like e.g. path
existence and node selection) in finite trees. Logical formulas can be
expressed using the syntax of XPath expressions, DTD, XML Schemas, and Relax NG
definitions.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2008 15:22:46 GMT"
}
]
| 2008-12-19T00:00:00 | [
[
"Geneves",
"Pierre",
""
],
[
"Layaida",
"Nabil",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0812.3563 | Laurent Romary | Laurent Romary (LORIA) | Questions & Answers for TEI Newcomers | null | Jahrbuch f\"ur Computerphilologie 10 (2009) | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper provides an introduction to the Text Encoding Initia-tive (TEI),
focused at bringing in newcomers who have to deal with a digital document
project and are looking at the capacity that the TEI environment may have to
fulfil his needs. To this end, we avoid a strictly technical presentation of
the TEI and concentrate on the actual issues that such projects face, with
parallel made on the situation within two institutions. While a quick
walkthrough the TEI technical framework is provided, the papers ends up by
showing the essential role of the community in the actual technical
contributions that are being brought to the TEI.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2008 15:51:17 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jan 2009 09:51:37 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Romary",
"Laurent",
"",
"LORIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0812.3593 | Sergio Caracciolo | Sergio Caracciolo, Gregor Masbaum, Alan D. Sokal, Andrea Sportiello | A randomized polynomial-time algorithm for the Spanning Hypertree
Problem on 3-uniform hypergraphs | 6 pages, 1 figure | null | null | null | cs.CC math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider the problem of determining whether there exists a spanning hypertree
in a given k-uniform hypergraph. This problem is trivially in P for k=2, and is
NP-complete for k>= 4, whereas for k=3, there exists a polynomial-time
algorithm based on Lovasz' theory of polymatroid matching. Here we give a
completely different, randomized polynomial-time algorithm in the case k=3. The
main ingredients are a Pfaffian formula by Vaintrob and one of the authors
(G.M.) for a polynomial that enumerates spanning hypertrees with some signs,
and a lemma on the number of roots of polynomials over a finite field.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2008 17:17:33 GMT"
}
]
| 2008-12-19T00:00:00 | [
[
"Caracciolo",
"Sergio",
""
],
[
"Masbaum",
"Gregor",
""
],
[
"Sokal",
"Alan D.",
""
],
[
"Sportiello",
"Andrea",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0812.3632 | Krzysztof Szajowski | Wojciech Sarnowski, Krzysztof Szajowski | Optimal detection of homogeneous segment of observations in stochastic
sequence | 13 pages | Stochastics An International Journal of Probability and Stochastic
Processes, Vol. 83, Issue 4-6, 2011, pp. 569-581 | 10.1080/17442508.2010.540015 | Institute of Mathematics, Polish Academy of Science 696 | math.PR cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Markov process is registered. At random moment $\theta$ the distribution of
observed sequence changes. Using probability maximizing approach the optimal
stopping rule for detecting the change is identified. Some explicit solution is
obtained.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2008 19:50:00 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Feb 2009 05:43:02 GMT"
},
{
"version": "v3",
"created": "Sun, 13 Dec 2009 17:42:58 GMT"
}
]
| 2020-11-23T00:00:00 | [
[
"Sarnowski",
"Wojciech",
""
],
[
"Szajowski",
"Krzysztof",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0812.3642 | Deniz Gunduz | Deniz Gunduz, Andrea Goldsmith, H. Vincent Poor | MIMO Two-way Relay Channel: Diversity-Multiplexing Tradeoff Analysis | Presented at the Asilomar Conference on Signals, Systems and
Computers, Pacific Grove, CA, Oct. 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A multi-hop two-way relay channel is considered in which all the terminals
are equipped with multiple antennas. Assuming independent quasi-static Rayleigh
fading channels and channel state information available at the receivers, we
characterize the optimal diversity-multiplexing gain tradeoff (DMT) curve for a
full-duplex relay terminal. It is shown that the optimal DMT can be achieved by
a compress-and-forward type relaying strategy in which the relay quantizes its
received signal and transmits the corresponding channel codeword. It is
noteworthy that, with this transmission protocol, the two transmissions in
opposite directions can achieve their respective single user optimal DMT
performances simultaneously, despite the interference they cause to each other.
Motivated by the optimality of this scheme in the case of the two-way relay
channel, a novel dynamic compress-and-forward (DCF) protocol is proposed for
the one-way multi-hop MIMO relay channel for a half-duplex relay terminal, and
this scheme is shown to achieve the optimal DMT performance.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2008 20:25:14 GMT"
}
]
| 2008-12-19T00:00:00 | [
[
"Gunduz",
"Deniz",
""
],
[
"Goldsmith",
"Andrea",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.