id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0812.1857
Ravi Tandon
Ravi Tandon, Sennur Ulukus
Dependence Balance Based Outer Bounds for Gaussian Networks with Cooperation and Feedback
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2145150
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We obtain new outer bounds on the capacity regions of the two-user multiple access channel with generalized feedback (MAC-GF) and the two-user interference channel with generalized feedback (IC-GF). These outer bounds are based on the idea of dependence balance which was proposed by Hekstra and Willems [1]. To illustrate the usefulness of our outer bounds, we investigate three different channel models. We first consider a Gaussian MAC with noisy feedback (MAC-NF), where transmitter $k$, $k=1,2$, receives a feedback $Y_{F_{k}}$, which is the channel output $Y$ corrupted with additive white Gaussian noise $Z_{k}$. As the feedback noise variances become large, one would expect the feedback to become useless, which is not reflected by the cut-set bound. We demonstrate that our outer bound improves upon the cut-set bound for all non-zero values of the feedback noise variances. Moreover, in the limit as $\sigma_{Z_{k}}^{2}\to \infty$, $k=1,2$, our outer bound collapses to the capacity region of the Gaussian MAC without feedback. Secondly, we investigate a Gaussian MAC with user-cooperation (MAC-UC), where each transmitter receives an additive white Gaussian noise corrupted version of the channel input of the other transmitter [2]. For this channel model, the cut-set bound is sensitive to the cooperation noises, but not sensitive enough. For all non-zero values of cooperation noise variances, our outer bound strictly improves upon the cut-set outer bound. Thirdly, we investigate a Gaussian IC with user-cooperation (IC-UC). For this channel model, the cut-set bound is again sensitive to cooperation noise variances but not sensitive enough. We demonstrate that our outer bound strictly improves upon the cut-set bound for all non-zero values of cooperation noise variances.
[ { "version": "v1", "created": "Wed, 10 Dec 2008 07:56:36 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2008 03:06:58 GMT" } ]
2016-11-18T00:00:00
[ [ "Tandon", "Ravi", "" ], [ "Ulukus", "Sennur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.1869
Francis Bach
Francis Bach (INRIA Rocquencourt), Julien Mairal (INRIA Rocquencourt), Jean Ponce (INRIA Rocquencourt)
Convex Sparse Matrix Factorizations
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a convex formulation of dictionary learning for sparse signal decomposition. Convexity is obtained by replacing the usual explicit upper bound on the dictionary size by a convex rank-reducing term similar to the trace norm. In particular, our formulation introduces an explicit trade-off between size and sparsity of the decomposition of rectangular matrices. Using a large set of synthetic examples, we compare the estimation abilities of the convex and non-convex approaches, showing that while the convex formulation has a single local minimum, this may lead in some cases to performance which is inferior to the local minima of the non-convex formulation.
[ { "version": "v1", "created": "Wed, 10 Dec 2008 09:00:40 GMT" } ]
2008-12-11T00:00:00
[ [ "Bach", "Francis", "", "INRIA Rocquencourt" ], [ "Mairal", "Julien", "", "INRIA Rocquencourt" ], [ "Ponce", "Jean", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.1908
Robert Kooij
Robert Kooij, Phillip Schumm, Caterina Scoglio
A new metric for robustness with respect to virus spread
12 pages, 4 figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The robustness of a network is depending on the type of attack we are considering. In this paper we focus on the spread of viruses on networks. It is common practice to use the epidemic threshold as a measure for robustness. Because the epidemic threshold is inversely proportional to the largest eigenvalue of the adjacency matrix, it seems easy to compare the robustness of two networks. We will show in this paper that the comparison of the robustness with respect to virus spread for two networks actually depends on the value of the effective spreading rate tau. For this reason we propose a new metric, the viral conductance, which takes into account the complete range of values tau can obtain. In this paper we determine the viral conductance of regular graphs, complete bi-partite graphs and a number of realistic networks.
[ { "version": "v1", "created": "Wed, 10 Dec 2008 13:19:48 GMT" } ]
2008-12-11T00:00:00
[ [ "Kooij", "Robert", "" ], [ "Schumm", "Phillip", "" ], [ "Scoglio", "Caterina", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.1915
Marcel Marquardt
Wouter Gelade, Marcel Marquardt, Thomas Schwentick
Dynamic Complexity of Formal Languages
Contains the material presenten at STACS 2009, extendes with proofs and examples which were omitted due lack of space
null
null
null
cs.CC cs.DS cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper investigates the power of the dynamic complexity classes DynFO, DynQF and DynPROP over string languages. The latter two classes contain problems that can be maintained using quantifier-free first-order updates, with and without auxiliary functions, respectively. It is shown that the languages maintainable in DynPROP exactly are the regular languages, even when allowing arbitrary precomputation. This enables lower bounds for DynPROP and separates DynPROP from DynQF and DynFO. Further, it is shown that any context-free language can be maintained in DynFO and a number of specific context-free languages, for example all Dyck-languages, are maintainable in DynQF. Furthermore, the dynamic complexity of regular tree languages is investigated and some results concerning arbitrary structures are obtained: there exist first-order definable properties which are not maintainable in DynPROP. On the other hand any existential first-order property can be maintained in DynQF when allowing precomputation.
[ { "version": "v1", "created": "Wed, 10 Dec 2008 14:13:57 GMT" } ]
2008-12-11T00:00:00
[ [ "Gelade", "Wouter", "" ], [ "Marquardt", "Marcel", "" ], [ "Schwentick", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0812.1951
Jerome Leroux
Alain Finkel (LSV), J\'er\^ome Leroux (LaBRI)
The convex hull of a regular set of integer vectors is polyhedral and effectively computable
null
Information Processing Letters 96, 1 (2005) 30 - 35
10.1016/j.ipl.2005.04.004
null
cs.CG cs.DS cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Number Decision Diagrams (NDD) provide a natural finite symbolic representation for regular set of integer vectors encoded as strings of digit vectors (least or most significant digit first). The convex hull of the set of vectors represented by a NDD is proved to be an effectively computable convex polyhedron.
[ { "version": "v1", "created": "Wed, 10 Dec 2008 16:26:36 GMT" } ]
2008-12-13T00:00:00
[ [ "Finkel", "Alain", "", "LSV" ], [ "Leroux", "Jérôme", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0812.1967
Jerome Leroux
Florent Bouchy (LSV), Alain Finkel (LSV), J\'er\^ome Leroux (LaBRI)
Decomposition of Decidable First-Order Logics over Integers and Reals
null
Temporal Representation and Reasoning, 2008. TIME '08. 15th International Symposium on, Montreal, QC : Canada (2008)
10.1109/TIME.2008.22
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We tackle the issue of representing infinite sets of real- valued vectors. This paper introduces an operator for combining integer and real sets. Using this operator, we decompose three well-known logics extending Presburger with reals. Our decomposition splits a logic into two parts : one integer, and one decimal (i.e. on the interval [0,1]). We also give a basis for an implementation of our representation.
[ { "version": "v1", "created": "Wed, 10 Dec 2008 17:08:45 GMT" } ]
2008-12-11T00:00:00
[ [ "Bouchy", "Florent", "", "LSV" ], [ "Finkel", "Alain", "", "LSV" ], [ "Leroux", "Jérôme", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0812.1986
Eric Feron
Eric Feron and Fernando Alegre
Control software analysis, part II: Closed-loop analysis
16 pages, 2 figures
null
null
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The analysis and proper documentation of the properties of closed-loop control software presents many distinct aspects from the analysis of the same software running open-loop. Issues of physical system representations arise, and it is desired that such representations remain independent from the representations of the control program. For that purpose, a concurrent program representation of the plant and the control processes is proposed, although the closed-loop system is sufficiently serialized to enable a sequential analysis. While dealing with closed-loop system properties, it is also shown by means of examples how special treatment of nonlinearities extends from the analysis of control specifications to code analysis.
[ { "version": "v1", "created": "Wed, 10 Dec 2008 17:57:14 GMT" } ]
2008-12-11T00:00:00
[ [ "Feron", "Eric", "" ], [ "Alegre", "Fernando", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0812.2011
Jerome Leroux
J\'er\^ome Leroux (LaBRI), Gregoire Sutre (LaBRI)
Accelerated Data-Flow Analysis
null
Static Analysis, Kongens Lyngby : Danemark (2007)
10.1007/978-3-540-74061-2_12
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Acceleration in symbolic verification consists in computing the exact effect of some control-flow loops in order to speed up the iterative fix-point computation of reachable states. Even if no termination guarantee is provided in theory, successful results were obtained in practice by different tools implementing this framework. In this paper, the acceleration framework is extended to data-flow analysis. Compared to a classical widening/narrowing-based abstract interpretation, the loss of precision is controlled here by the choice of the abstract domain and does not depend on the way the abstract value is computed. Our approach is geared towards precision, but we don't loose efficiency on the way. Indeed, we provide a cubic-time acceleration-based algorithm for solving interval constraints with full multiplication.
[ { "version": "v1", "created": "Wed, 10 Dec 2008 20:08:08 GMT" } ]
2008-12-11T00:00:00
[ [ "Leroux", "Jérôme", "", "LaBRI" ], [ "Sutre", "Gregoire", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.2014
Jerome Leroux
J\'er\^ome Leroux (LaBRI)
Convex Hull of Arithmetic Automata
null
Static Analysis, Valencia : Espagne (2008)
10.1007/978-3-540-69166-2_4
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Arithmetic automata recognize infinite words of digits denoting decompositions of real and integer vectors. These automata are known expressive and efficient enough to represent the whole set of solutions of complex linear constraints combining both integral and real variables. In this paper, the closed convex hull of arithmetic automata is proved rational polyhedral. Moreover an algorithm computing the linear constraints defining these convex set is provided. Such an algorithm is useful for effectively extracting geometrical properties of the whole set of solutions of complex constraints symbolically represented by arithmetic automata.
[ { "version": "v1", "created": "Wed, 10 Dec 2008 20:33:27 GMT" } ]
2008-12-11T00:00:00
[ [ "Leroux", "Jérôme", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.2049
Jian Li
Jian Li, Amol Deshpande
Consensus Answers for Queries over Probabilistic Databases
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of finding a "best" deterministic query answer to a query over a probabilistic database. For this purpose, we propose the notion of a consensus world (or a consensus answer) which is a deterministic world (answer) that minimizes the expected distance to the possible worlds (answers). This problem can be seen as a generalization of the well-studied inconsistent information aggregation problems (e.g. rank aggregation) to probabilistic databases. We consider this problem for various types of queries including SPJ queries, \Topk queries, group-by aggregate queries, and clustering. For different distance metrics, we obtain polynomial time optimal or approximation algorithms for computing the consensus answers (or prove NP-hardness). Most of our results are for a general probabilistic database model, called {\em and/xor tree model}, which significantly generalizes previous probabilistic database models like x-tuples and block-independent disjoint models, and is of independent interest.
[ { "version": "v1", "created": "Wed, 10 Dec 2008 23:20:17 GMT" } ]
2008-12-12T00:00:00
[ [ "Li", "Jian", "" ], [ "Deshpande", "Amol", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0812.2094
Mikael Ates
Mika\"el Ates (DIOM), Christophe Gravier (DIOM), J\'er\'emy Lardon (DIOM), Jacques Fayolle (DIOM), B. Sauviac (DIOM)
Interoperability between Heterogeneous Federation Architectures: Illustration with SAML and WS-Federation
null
Third International IEEE Conference on Signal-Image Technologies and Internet-Based System (SITIS 07), Shangai : Chine (2007)
10.1109/SITIS.2007.148
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Digital identity management intra and inter information systems, and, service oriented architectures, are the roots of identity federation. This kind of security architectures aims at enabling information system interoperability. Existing architectures, however, do not consider interoperability of heterogeneous federation architectures, which rely on different federation protocols.In this paper, we try to initiate an in-depth reflection on this issue, through the comparison of two main federation architecture specifications: SAML and WS-Federation. We firstly propose an overall outline of identity federation. We furthermore address the issue of interoperability for federation architectures using a different federation protocol. Afterwards, we compare SAML and WS-Federation. Eventually, we define the ways of convergence, and therefore, of interoperability.
[ { "version": "v1", "created": "Thu, 11 Dec 2008 08:04:52 GMT" } ]
2008-12-12T00:00:00
[ [ "Ates", "Mikaël", "", "DIOM" ], [ "Gravier", "Christophe", "", "DIOM" ], [ "Lardon", "Jérémy", "", "DIOM" ], [ "Fayolle", "Jacques", "", "DIOM" ], [ "Sauviac", "B.", "", "DIOM" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0812.2115
Gabrio Curzio Caimi
Gabrio Caimi, Holger Flier, Martin Fuchsberger, Marc Nunkesser
Performance of a greedy algorithm for edge covering by cliques in interval graphs
8 pages, 3 pictures, technical report
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a greedy algorithm to detect conflict cliques in interval graphs and circular-arc graphs is analyzed. In a graph, a stable set requires that at most one vertex is chosen for each edge. It is equivalent to requiring that at most one vertex for each maximal clique is chosen. We show that this algorithm finds all maximal cliques for interval graphs, i.e. it can compute the convex hull of the stable set polytope. In case of circular-arc graphs, the algorithm is not able to detect all maximal cliques, yet remaining correct. This problem occurs in the context of railway scheduling. A train requests the allocation of a railway infrastructure resource for a specific time interval. As one is looking for conflict-free train schedules, the used resource allocation intervals in a schedule must not overlap. The conflict-free choices of used intervals for each resource correspond to stable sets in the interval graph associated to the allocation time intervals.
[ { "version": "v1", "created": "Thu, 11 Dec 2008 15:35:45 GMT" } ]
2008-12-12T00:00:00
[ [ "Caimi", "Gabrio", "" ], [ "Flier", "Holger", "" ], [ "Fuchsberger", "Martin", "" ], [ "Nunkesser", "Marc", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.2137
Marek Karpinski
Piotr Berman, Marek Karpinski, Alex Zelikovsky
A Factor 3/2 Approximation for Generalized Steiner Tree Problem with Distances One and Two
null
null
null
null
cs.CC cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We design a 3/2 approximation algorithm for the Generalized Steiner Tree problem (GST) in metrics with distances 1 and 2. This is the first polynomial time approximation algorithm for a wide class of non-geometric metric GST instances with approximation factor below 2.
[ { "version": "v1", "created": "Thu, 11 Dec 2008 12:50:54 GMT" } ]
2008-12-12T00:00:00
[ [ "Berman", "Piotr", "" ], [ "Karpinski", "Marek", "" ], [ "Zelikovsky", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.2164
Florin Pop Mr.
Florin Pop
Optimization of Decentralized Scheduling for Physic Applications in Grid Environments
null
D. Iordache, P. Sterian (eds.), Proceedings of the 4th edition of the Colloquium Mathematics in Engineering and Numerical Physics, pp. 150-153, October 6-8, Ed. Printech, 2007, ISBN: 978-973-718-761-1
null
null
cs.DC physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a scheduling framework that is configured for, and used in physic systems. Our work addresses the problem of scheduling various computationally intensive and data intensive applications that are required for extracting information from satellite images. The proposed solution allows mapping of image processing applications onto available resources. The scheduling is done at the level of groups of concurrent applications. It demonstrates a very good behavior for scheduling and executing groups of applications, while also achieving a near-optimal utilization of the resources.
[ { "version": "v1", "created": "Thu, 11 Dec 2008 14:52:35 GMT" } ]
2008-12-12T00:00:00
[ [ "Pop", "Florin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" } ]
0812.2195
Rada Chirkova
Rada Chirkova, Michael Genesereth
Equivalence of SQL Queries in Presence of Embedded Dependencies
Correction of the previous version as described in the last sentence of the Abstract
null
null
NCSU CSC TR-2008-27
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of finding equivalent minimal-size reformulations of SQL queries in presence of embedded dependencies [1]. Our focus is on select-project-join (SPJ) queries with equality comparisons, also known as safe conjunctive (CQ) queries, possibly with grouping and aggregation. For SPJ queries, the semantics of the SQL standard treat query answers as multisets (a.k.a. bags), whereas the stored relations may be treated either as sets, which is called bag-set semantics for query evaluation, or as bags, which is called bag semantics. (Under set semantics, both query answers and stored relations are treated as sets.) In the context of the above Query-Reformulation Problem, we develop a comprehensive framework for equivalence of CQ queries under bag and bag-set semantics in presence of embedded dependencies, and make a number of conceptual and technical contributions. Specifically, we develop equivalence tests for CQ queries in presence of arbitrary sets of embedded dependencies under bag and bag-set semantics, under the condition that chase [9] under set semantics (set-chase) on the inputs terminates. We also present equivalence tests for aggregate CQ queries in presence of embedded dependencies. We use our equivalence tests to develop sound and complete (whenever set-chase on the inputs terminates) algorithms for solving instances of the Query-Reformulation Problem with CQ queries under each of bag and bag-set semantics, as well as for instances of the problem with aggregate queries.
[ { "version": "v1", "created": "Thu, 11 Dec 2008 17:25:55 GMT" }, { "version": "v2", "created": "Fri, 26 Jun 2009 19:22:10 GMT" }, { "version": "v3", "created": "Fri, 26 Jun 2009 22:28:22 GMT" } ]
2009-06-27T00:00:00
[ [ "Chirkova", "Rada", "" ], [ "Genesereth", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0812.2202
Deanna Needell
D. Needell, J. A. Tropp and R. Vershynin
Greedy Signal Recovery Review
null
Proc. Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA Oct. 2008
null
null
math.NA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The two major approaches to sparse recovery are L1-minimization and greedy methods. Recently, Needell and Vershynin developed Regularized Orthogonal Matching Pursuit (ROMP) that has bridged the gap between these two approaches. ROMP is the first stable greedy algorithm providing uniform guarantees. Even more recently, Needell and Tropp developed the stable greedy algorithm Compressive Sampling Matching Pursuit (CoSaMP). CoSaMP provides uniform guarantees and improves upon the stability bounds and RIC requirements of ROMP. CoSaMP offers rigorous bounds on computational cost and storage. In many cases, the running time is just O(NlogN), where N is the ambient dimension of the signal. This review summarizes these major advances.
[ { "version": "v1", "created": "Thu, 11 Dec 2008 17:48:11 GMT" } ]
2008-12-12T00:00:00
[ [ "Needell", "D.", "" ], [ "Tropp", "J. A.", "" ], [ "Vershynin", "R.", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2257
Joseph O'Rourke
Jin-ichi Itoh, Joseph O'Rourke, Costin V\^ilcu
Unfolding Convex Polyhedra via Quasigeodesic Star Unfoldings
18 pages, 10 figures
null
null
Smith 091
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend the notion of a star unfolding to be based on a simple quasigeodesic loop Q rather than on a point. This gives a new general method to unfold the surface of any convex polyhedron P to a simple, planar polygon: shortest paths from all vertices of P to Q are cut, and all but one segment of Q is cut.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 15:05:25 GMT" } ]
2008-12-15T00:00:00
[ [ "Itoh", "Jin-ichi", "" ], [ "O'Rourke", "Joseph", "" ], [ "Vîlcu", "Costin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0812.2275
Vaneet Aggarwal
Vaneet Aggarwal and Lalitha Sankar and A. Robert Calderbank and H. Vincent Poor
Secrecy capacity of a class of orthogonal relay eavesdropper channels
Submitted to Eurasip Journal on Wireless Communications and Networking special issue on Wireless physical layer security, Dec. 2008, Revised Jun. 2009
Eurasip Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security, vol. 2009, Jun. 2009.
10.1155/2009/494696
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The secrecy capacity of relay channels with orthogonal components is studied in the presence of an additional passive eavesdropper node. The relay and destination receive signals from the source on two orthogonal channels such that the destination also receives transmissions from the relay on its channel. The eavesdropper can overhear either one or both of the orthogonal channels. Inner and outer bounds on the secrecy capacity are developed for both the discrete memoryless and the Gaussian channel models. For the discrete memoryless case, the secrecy capacity is shown to be achieved by a partial decode-and-forward (PDF) scheme when the eavesdropper can overhear only one of the two orthogonal channels. Two new outer bounds are presented for the Gaussian model using recent capacity results for a Gaussian multi-antenna point-to-point channel with a multi-antenna eavesdropper. The outer bounds are shown to be tight for two sub-classes of channels. The first sub-class is one in which the source and relay are clustered and the and the eavesdropper receives signals only on the channel from the source and the relay to the destination, for which the PDF strategy is optimal. The second is a sub-class in which the source does not transmit to the relay, for which a noise-forwarding strategy is optimal.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 00:27:52 GMT" }, { "version": "v2", "created": "Mon, 8 Jun 2009 14:36:03 GMT" } ]
2009-06-09T00:00:00
[ [ "Aggarwal", "Vaneet", "" ], [ "Sankar", "Lalitha", "" ], [ "Calderbank", "A. Robert", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2277
Constantinos Daskalakis
Constantinos Daskalakis
An Efficient PTAS for Two-Strategy Anonymous Games
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel polynomial time approximation scheme for two-strategy anonymous games, in which the players' utility functions, although potentially different, do not differentiate among the identities of the other players. Our algorithm computes an $eps$-approximate Nash equilibrium of an $n$-player 2-strategy anonymous game in time $poly(n) (1/eps)^{O(1/eps^2)}$, which significantly improves upon the running time $n^{O(1/eps^2)}$ required by the algorithm of Daskalakis & Papadimitriou, 2007. The improved running time is based on a new structural understanding of approximate Nash equilibria: We show that, for any $eps$, there exists an $eps$-approximate Nash equilibrium in which either only $O(1/eps^3)$ players randomize, or all players who randomize use the same mixed strategy. To show this result we employ tools from the literature on Stein's Method.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 00:43:07 GMT" } ]
2008-12-15T00:00:00
[ [ "Daskalakis", "Constantinos", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.2288
Muhammad Mostafa Monowar
Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan, and Choong Seon Hong
Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous Traffic
8 Pages
Proceedings of SMPE'08 in conjunction with MobiQuitous 2008
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Heterogeneous applications could be assimilated within the same wireless sensor network with the aid of modern motes that have multiple sensor boards on a single radio board. Different types of data generated from such types of motes might have different transmission characteristics in terms of priority, transmission rate, required bandwidth, tolerable packet loss, delay demands etc. Considering a sensor network consisting of such multi-purpose nodes, in this paper we propose Prioritized Heterogeneous Traffic-oriented Congestion Control Protocol (PHTCCP) which ensures efficient rate control for prioritized heterogeneous traffic. Our protocol uses intra-queue and inter-queue priorities for ensuring feasible transmission rates of heterogeneous data. It also guarantees efficient link utilization by using dynamic transmission rate adjustment. Detailed analysis and simulation results are presented along with the description of our protocol to demonstrate its effectiveness in handling prioritized heterogeneous traffic in wireless sensor networks.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 03:11:36 GMT" } ]
2008-12-15T00:00:00
[ [ "Monowar", "Muhammad Mostafa", "" ], [ "Rahman", "Md. Obaidur", "" ], [ "Pathan", "Al-Sakib Khan", "" ], [ "Hong", "Choong Seon", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.2291
Aleksandrs Slivkins
Moshe Babaioff, Yogeshwer Sharma, Aleksandrs Slivkins
Characterizing Truthful Multi-Armed Bandit Mechanisms
This is the full version of a conference paper published in ACM EC 2009. This revision is re-focused to emphasize the results that do not rely on the "IIA assumption" (see the paper for the definition)
null
null
null
cs.DS cs.GT cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a multi-round auction setting motivated by pay-per-click auctions for Internet advertising. In each round the auctioneer selects an advertiser and shows her ad, which is then either clicked or not. An advertiser derives value from clicks; the value of a click is her private information. Initially, neither the auctioneer nor the advertisers have any information about the likelihood of clicks on the advertisements. The auctioneer's goal is to design a (dominant strategies) truthful mechanism that (approximately) maximizes the social welfare. If the advertisers bid their true private values, our problem is equivalent to the "multi-armed bandit problem", and thus can be viewed as a strategic version of the latter. In particular, for both problems the quality of an algorithm can be characterized by "regret", the difference in social welfare between the algorithm and the benchmark which always selects the same "best" advertisement. We investigate how the design of multi-armed bandit algorithms is affected by the restriction that the resulting mechanism must be truthful. We find that truthful mechanisms have certain strong structural properties -- essentially, they must separate exploration from exploitation -- and they incur much higher regret than the optimal multi-armed bandit algorithms. Moreover, we provide a truthful mechanism which (essentially) matches our lower bound on regret.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 04:13:01 GMT" }, { "version": "v2", "created": "Thu, 15 Jan 2009 01:56:08 GMT" }, { "version": "v3", "created": "Fri, 20 Feb 2009 18:10:47 GMT" }, { "version": "v4", "created": "Tue, 23 Jun 2009 02:21:56 GMT" }, { "version": "v5", "created": "Fri, 18 Sep 2009 00:17:44 GMT" }, { "version": "v6", "created": "Tue, 15 May 2012 22:57:53 GMT" }, { "version": "v7", "created": "Mon, 3 Jun 2013 21:03:36 GMT" } ]
2013-06-05T00:00:00
[ [ "Babaioff", "Moshe", "" ], [ "Sharma", "Yogeshwer", "" ], [ "Slivkins", "Aleksandrs", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.2298
Francois Le Gall
Francois Le Gall
Efficient Isomorphism Testing for a Class of Group Extensions
17 pages, accepted to the STACS 2009 conference
Proceedings of the 26th International Symposium on Theoretical Aspects of Computer Science (STACS 2009), pp. 625-636, 2009
10.4230/LIPIcs.STACS.2009.1830
null
cs.DS cs.CC math.GR quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The group isomorphism problem asks whether two given groups are isomorphic or not. Whereas the case where both groups are abelian is well understood and can be solved efficiently, very little is known about the complexity of isomorphism testing for nonabelian groups. In this paper we study this problem for a class of groups corresponding to one of the simplest ways of constructing nonabelian groups from abelian groups: the groups that are extensions of an abelian group A by a cyclic group of order m. We present an efficient algorithm solving the group isomorphism problem for all the groups of this class such that the order of A is coprime with m. More precisely, our algorithm runs in time almost linear in the orders of the input groups and works in the general setting where the groups are given as black-boxes.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 09:39:02 GMT" } ]
2021-10-05T00:00:00
[ [ "Gall", "Francois Le", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0812.2301
Ilmu Byun
Ilmu Byun, and Kwang Soon Kim
Cooperative Hybrid ARQ Protocols: Unified Frameworks for Protocol Analysis
This paper has been withdrawn by the author for submission to another journal
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cooperative hybrid-ARQ (HARQ) protocols, which can exploit the spatial and temporal diversities, have been widely studied. The efficiency of cooperative HARQ protocols is higher than that of cooperative protocols, because retransmissions are only performed when necessary. We classify cooperative HARQ protocols as three decode-and-forward based HARQ (DF-HARQ) protocols and two amplified-and-forward based (AF-HARQ) protocols. To compare these protocols and obtain the optimum parameters, two unified frameworks are developed for protocol analysis. Using the frameworks, we can evaluate and compare the maximum throughput and outage probabilities according to the SNR, the relay location, and the delay constraint for the protocols.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 07:17:37 GMT" }, { "version": "v2", "created": "Tue, 16 Dec 2008 11:36:22 GMT" }, { "version": "v3", "created": "Mon, 18 Oct 2010 17:41:23 GMT" } ]
2010-10-19T00:00:00
[ [ "Byun", "Ilmu", "" ], [ "Kim", "Kwang Soon", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2309
Tobias Abenius
Tobias Abenius
Classification of Cell Images Using MPEG-7-influenced Descriptors and Support Vector Machines in Cell Morphology
For associated files and erratum, see http://Tobbe.nu/pub/2008/cell.morph.mpeg7.svm/
null
null
ISSN 1651-6389
stat.AP cs.CV stat.ML
http://creativecommons.org/licenses/by/3.0/
Counting and classifying blood cells is an important diagnostic tool in medicine. Support Vector Machines are increasingly popular and efficient and could replace artificial neural network systems. Here a method to classify blood cells is proposed using SVM. A set of statistics on images are implemented in C++. The MPEG-7 descriptors Scalable Color Descriptor, Color Structure Descriptor, Color Layout Descriptor and Homogeneous Texture Descriptor are extended in size and combined with textural features corresponding to textural properties perceived visually by humans. From a set of images of human blood cells these statistics are collected. A SVM is implemented and trained to classify the cell images. The cell images come from a CellaVision DM-96 machine which classify cells from images from microscopy. The output images and classification of the CellaVision machine is taken as ground truth, a truth that is 90-95% correct. The problem is divided in two -- the primary and the simplified. The primary problem is to classify the same classes as the CellaVision machine. The simplified problem is to differ between the five most common types of white blood cells. An encouraging result is achieved in both cases -- error rates of 10.8% and 3.1% -- considering that the SVM is misled by the errors in ground truth. Conclusion is that further investigation of performance is worthwhile.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 08:27:02 GMT" } ]
2008-12-15T00:00:00
[ [ "Abenius", "Tobias", "" ] ]
[ { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0812.2313
Jocelyne Troccaz
Pierre Mozer (TIMC, URObotics), Jocelyne Troccaz (TIMC), Dan Stoianovici (URObotics)
Urologic robots and future directions
null
Current Opinion in Urology 19, 1 (2009) 114-9
10.1097/MOU.0b013e32831cc1ba
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
PURPOSE OF REVIEW: Robot-assisted laparoscopic surgery in urology has gained immense popularity with the daVinci system, but a lot of research teams are working on new robots. The purpose of this study is to review current urologic robots and present future development directions. RECENT FINDINGS: Future systems are expected to advance in two directions: improvements of remote manipulation robots and developments of image-guided robots. SUMMARY: The final goal of robots is to allow safer and more homogeneous outcomes with less variability of surgeon performance, as well as new tools to perform tasks on the basis of medical transcutaneous imaging, in a less invasive way, at lower costs. It is expected that improvements for a remote system could be augmented in reality, with haptic feedback, size reduction, and development of new tools for natural orifice translumenal endoscopic surgery. The paradigm of image-guided robots is close to clinical availability and the most advanced robots are presented with end-user technical assessments. It is also notable that the potential of robots lies much further ahead than the accomplishments of the daVinci system. The integration of imaging with robotics holds a substantial promise, because this can accomplish tasks otherwise impossible. Image-guided robots have the potential to offer a paradigm shift.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 08:38:23 GMT" } ]
2008-12-15T00:00:00
[ [ "Mozer", "Pierre", "", "TIMC, URObotics" ], [ "Troccaz", "Jocelyne", "", "TIMC" ], [ "Stoianovici", "Dan", "", "URObotics" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0812.2324
Gesualdo Scutari
Gesualdo Scutari, Daniel P. Palomar, and Sergio Barbarossa
The MIMO Iterative Waterfilling Algorithm
IEEE Transactions on Signal Processing (accepted)
null
10.1109/TSP.2009.2013894
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the non-cooperative maximization of mutual information in the vector Gaussian interference channel in a fully distributed fashion via game theory. This problem has been widely studied in a number of works during the past decade for frequency-selective channels, and recently for the more general MIMO case, for which the state-of-the art results are valid only for nonsingular square channel matrices. Surprisingly, these results do not hold true when the channel matrices are rectangular and/or rank deficient matrices. The goal of this paper is to provide a complete characterization of the MIMO game for arbitrary channel matrices, in terms of conditions guaranteeing both the uniqueness of the Nash equilibrium and the convergence of asynchronous distributed iterative waterfilling algorithms. Our analysis hinges on new technical intermediate results, such as a new expression for the MIMO waterfilling projection valid (also) for singular matrices, a mean-value theorem for complex matrix-valued functions, and a general contraction theorem for the multiuser MIMO watefilling mapping valid for arbitrary channel matrices. The quite surprising result is that uniqueness/convergence conditions in the case of tall (possibly singular) channel matrices are more restrictive than those required in the case of (full rank) fat channel matrices. We also propose a modified game and algorithm with milder conditions for the uniqueness of the equilibrium and convergence, and virtually the same performance (in terms of Nash equilibria) of the original game.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 09:13:57 GMT" } ]
2015-05-13T00:00:00
[ [ "Scutari", "Gesualdo", "" ], [ "Palomar", "Daniel P.", "" ], [ "Barbarossa", "Sergio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2379
Maximilien Gadouleau
Maximilien Gadouleau and Zhiyuan Yan
On the Decoder Error Probability of Rank Metric Codes and Constant-Dimension Codes
19 pages, 2 figures, submitted to IEEE Transactions on Information Theory. Revised in May 2010.
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rank metric codes and constant-dimension codes (CDCs) have been considered for error control in random network coding. Since decoder errors are more detrimental to system performance than decoder failures, in this paper we investigate the decoder error probability (DEP) of bounded distance decoders (BDDs) for rank metric codes and CDCs. For rank metric codes, we consider a channel motivated by network coding, where errors with the same row space are equiprobable. Over such channels, we establish upper bounds on the DEPs of BDDs, determine the exact DEP of BDDs for maximum rank distance (MRD) codes, and show that MRD codes have the greatest DEPs up to a scalar. To evaluate the DEPs of BDDs for CDCs, we first establish some fundamental geometric properties of the projective space. Using these geometric properties, we then consider BDDs in both subspace and injection metrics and derive analytical expressions of their DEPs for CDCs, over a symmetric operator channel, as functions of their distance distributions. Finally, we focus on CDCs obtained by lifting rank metric codes and establish two important results: First, we derive asymptotically tight upper bounds on the DEPs of BDDs in both metrics; Second, we show that the DEPs for KK codes are the greatest up to a scalar among all CDCs obtained by lifting rank metric codes.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 14:15:47 GMT" }, { "version": "v2", "created": "Thu, 21 May 2009 19:02:11 GMT" }, { "version": "v3", "created": "Tue, 23 Jun 2009 14:24:18 GMT" }, { "version": "v4", "created": "Wed, 31 Mar 2010 08:03:44 GMT" } ]
2010-04-01T00:00:00
[ [ "Gadouleau", "Maximilien", "" ], [ "Yan", "Zhiyuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2386
Sonny Ben-Shimon
Noga Alon, Sonny Ben-Shimon, Michael Krivelevich
A note on regular Ramsey graphs
5 pages
Journal of Graph Theory, 64 (3):244--249, 2010
10.1002/jgt.20453
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that there is an absolute constant $C>0$ so that for every natural $n$ there exists a triangle-free \emph{regular} graph with no independent set of size at least $C\sqrt{n\log n}$.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 14:40:47 GMT" }, { "version": "v2", "created": "Tue, 21 Jul 2009 22:00:55 GMT" } ]
2010-08-12T00:00:00
[ [ "Alon", "Noga", "" ], [ "Ben-Shimon", "Sonny", "" ], [ "Krivelevich", "Michael", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.2388
Vyacheslav Yukalov
V.I. Yukalov and D. Sornette
Physics of risk and uncertainty in quantum decision making
Latex file, 30 pages. Published variant
Eur. Phys. J. B 71 (2009) 533-548
10.1140/epjb/e2009-00245-9
null
physics.soc-ph cs.AI quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Quantum Decision Theory, developed recently by the authors, is applied to clarify the role of risk and uncertainty in decision making and in particular in relation to the phenomenon of dynamic inconsistency. By formulating this notion in precise mathematical terms, we distinguish three types of inconsistency: time inconsistency, planning paradox, and inconsistency occurring in some discounting effects. While time inconsistency is well accounted for in classical decision theory, the planning paradox is in contradiction with classical utility theory. It finds a natural explanation in the frame of the Quantum Decision Theory. Different types of discounting effects are analyzed and shown to enjoy a straightforward explanation within the suggested theory. We also introduce a general methodology based on self-similar approximation theory for deriving the evolution equations for the probabilities of future prospects. This provides a novel classification of possible discount factors, which include the previously known cases (exponential or hyperbolic discounting), but also predicts a novel class of discount factors that decay to a strictly positive constant for very large future time horizons. This class may be useful to deal with very long-term discounting situations associated with intergenerational public policy choices, encompassing issues such as global warming and nuclear waste disposal.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 14:46:41 GMT" }, { "version": "v2", "created": "Wed, 21 Oct 2009 09:50:11 GMT" } ]
2015-05-13T00:00:00
[ [ "Yukalov", "V. I.", "" ], [ "Sornette", "D.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0812.2390
Luigi Santocanale
Luigi Santocanale (LIF), Yde Venema (ILLC)
Completeness for Flat Modal Fixpoint Logics
null
null
null
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper exhibits a general and uniform method to prove completeness for certain modal fixpoint logics. Given a set \Gamma of modal formulas of the form \gamma(x, p1, . . ., pn), where x occurs only positively in \gamma, the language L\sharp (\Gamma) is obtained by adding to the language of polymodal logic a connective \sharp\_\gamma for each \gamma \epsilon. The term \sharp\_\gamma (\varphi1, . . ., \varphin) is meant to be interpreted as the least fixed point of the functional interpretation of the term \gamma(x, \varphi 1, . . ., \varphi n). We consider the following problem: given \Gamma, construct an axiom system which is sound and complete with respect to the concrete interpretation of the language L\sharp (\Gamma) on Kripke frames. We prove two results that solve this problem. First, let K\sharp (\Gamma) be the logic obtained from the basic polymodal K by adding a Kozen-Park style fixpoint axiom and a least fixpoint rule, for each fixpoint connective \sharp\_\gamma. Provided that each indexing formula \gamma satisfies the syntactic criterion of being untied in x, we prove this axiom system to be complete. Second, addressing the general case, we prove the soundness and completeness of an extension K+ (\Gamma) of K\_\sharp (\Gamma). This extension is obtained via an effective procedure that, given an indexing formula \gamma as input, returns a finite set of axioms and derivation rules for \sharp\_\gamma, of size bounded by the length of \gamma. Thus the axiom system K+ (\Gamma) is finite whenever \Gamma is finite.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 15:04:57 GMT" } ]
2008-12-16T00:00:00
[ [ "Santocanale", "Luigi", "", "LIF" ], [ "Venema", "Yde", "", "ILLC" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0812.2405
SeyyedMajid Valiollahzadeh
SeyyedMajid Valiollahzadeh, Mohammad Nazari, Massoud Babaie-Zadeh, Christian Jutten
A New Trend in Optimization on Multi Overcomplete Dictionary toward Inpainting
4 pages
null
null
ICASSP 2009
cs.MM cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, great attention was intended toward overcomplete dictionaries and the sparse representations they can provide. In a wide variety of signal processing problems, sparsity serves a crucial property leading to high performance. Inpainting, the process of reconstructing lost or deteriorated parts of images or videos, is an interesting application which can be handled by suitably decomposition of an image through combination of overcomplete dictionaries. This paper addresses a novel technique of such a decomposition and investigate that through inpainting of images. Simulations are presented to demonstrate the validation of our approach.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 15:56:42 GMT" } ]
2008-12-15T00:00:00
[ [ "Valiollahzadeh", "SeyyedMajid", "" ], [ "Nazari", "Mohammad", "" ], [ "Babaie-Zadeh", "Massoud", "" ], [ "Jutten", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.2409
Ashraf Hossain Mr.
Ashraf Hossain, S. Chakrabarti and P. K. Biswas
Sensing Models and Its Impact on Network Coverage in Wireless Sensor Network
5 pages, 5 figures, IEEE Region 10 Colloquium and the Third ICIIS, Kharagpur, INDIA December 8-10, 2008
null
10.1109/ICIINFS.2008.4798455
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network coverage of wireless sensor network (WSN) means how well an area of interest is being monitored by the deployed network. It depends mainly on sensing model of nodes. In this paper, we present three types of sensing models viz. Boolean sensing model, shadow-fading sensing model and Elfes sensing model. We investigate the impact of sensing models on network coverage. We also investigate network coverage based on Poisson node distribution. A comparative study between regular and random node placement has also been presented in this paper. This study will be useful for coverage analysis of WSN.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 16:04:19 GMT" } ]
2016-11-18T00:00:00
[ [ "Hossain", "Ashraf", "" ], [ "Chakrabarti", "S.", "" ], [ "Biswas", "P. K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2411
SeyyedMajid Valiollahzadeh
Mohammad Nazari, Abolghasem Sayadiyan, SeyedMajid Valiollahzadeh
Probabilistic SVM/GMM Classifier for Speaker-Independent Vowel Recognition in Continues Speech
4 pages
null
null
ICASSP 2009
cs.MM cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we discuss the issues in automatic recognition of vowels in Persian language. The present work focuses on new statistical method of recognition of vowels as a basic unit of syllables. First we describe a vowel detection system then briefly discuss how the detected vowels can feed to recognition unit. According to pattern recognition, Support Vector Machines (SVM) as a discriminative classifier and Gaussian mixture model (GMM) as a generative model classifier are two most popular techniques. Current state-ofthe- art systems try to combine them together for achieving more power of classification and improving the performance of the recognition systems. The main idea of the study is to combine probabilistic SVM and traditional GMM pattern classification with some characteristic of speech like band-pass energy to achieve better classification rate. This idea has been analytically formulated and tested on a FarsDat based vowel recognition system. The results show inconceivable increases in recognition accuracy. The tests have been carried out by various proposed vowel recognition algorithms and the results have been compared.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 16:08:04 GMT" } ]
2008-12-15T00:00:00
[ [ "Nazari", "Mohammad", "" ], [ "Sayadiyan", "Abolghasem", "" ], [ "Valiollahzadeh", "SeyedMajid", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.2423
Benedikt Bollig
Benedikt Bollig
On the Expressive Power of 2-Stack Visibly Pushdown Automata
null
Logical Methods in Computer Science, Volume 4, Issue 4 (December 24, 2008) lmcs:1101
10.2168/LMCS-4(4:16)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visibly pushdown automata are input-driven pushdown automata that recognize some non-regular context-free languages while preserving the nice closure and decidability properties of finite automata. Visibly pushdown automata with multiple stacks have been considered recently by La Torre, Madhusudan, and Parlato, who exploit the concept of visibility further to obtain a rich automata class that can even express properties beyond the class of context-free languages. At the same time, their automata are closed under boolean operations, have a decidable emptiness and inclusion problem, and enjoy a logical characterization in terms of a monadic second-order logic over words with an additional nesting structure. These results require a restricted version of visibly pushdown automata with multiple stacks whose behavior can be split up into a fixed number of phases. In this paper, we consider 2-stack visibly pushdown automata (i.e., visibly pushdown automata with two stacks) in their unrestricted form. We show that they are expressively equivalent to the existential fragment of monadic second-order logic. Furthermore, it turns out that monadic second-order quantifier alternation forms an infinite hierarchy wrt words with multiple nestings. Combining these results, we conclude that 2-stack visibly pushdown automata are not closed under complementation. Finally, we discuss the expressive power of B\"{u}chi 2-stack visibly pushdown automata running on infinite (nested) words. Extending the logic by an infinity quantifier, we can likewise establish equivalence to existential monadic second-order logic.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 16:43:48 GMT" }, { "version": "v2", "created": "Wed, 24 Dec 2008 12:06:52 GMT" } ]
2015-07-01T00:00:00
[ [ "Bollig", "Benedikt", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0812.2454
Neri Merhav
Neri Merhav
On the statistical physics of directed polymers in a random medium and their relation to tree codes
Submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using well-known results from statistical physics, concerning the almost-sure behavior of the free energy of directed polymers in a random medium, we prove that random tree codes achieve the distortion-rate function almost surely under a certain symmetry condition.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 18:36:47 GMT" } ]
2008-12-15T00:00:00
[ [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2458
Smarajit Das
Smarajit Das and B. Sundar Rajan
Square Complex Orthogonal Designs with no Zero Entry for any $2^m$ Antennas
11 pages, 7 figures, 1 tables
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Space-time block codes from square complex orthogonal designs (SCOD) have been extensively studied and most of the existing SCODs contain large number of zeros. The zeros in the designs result in high peak-to-average power ratio and also impose a severe constraint on hardware implementation of the code while turning off some of the transmitting antennas whenever a zero is transmitted. Recently, SCODs with no zero entry have been constructed for $2^a$ transmit antennas whenever $a+1$ is a power of 2. Though there exists codes for 4 and 16 transmit antennas with no zero entry, there is no general method of construction which gives codes for any number of transmit antennas. In this paper, we construct SCODs for any power of 2 number of transmit antennas having all its entries non-zero. Simulation results show that the codes constructed in this paper outperform the existing codes for the same number of antennas under peak power constraint while performing the same under average power constraint.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 19:28:16 GMT" } ]
2008-12-15T00:00:00
[ [ "Das", "Smarajit", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2466
Jeffrey Shallit
Yu-Hin Au, Aaron Robertson, Jeffrey Shallit
Van der Waerden's Theorem and Avoidability in Words
Co-author added; new results
null
null
null
math.CO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pirillo and Varricchio, and independently, Halbeisen and Hungerbuhler considered the following problem, open since 1994: Does there exist an infinite word w over a finite subset of Z such that w contains no two consecutive blocks of the same length and sum? We consider some variations on this problem in the light of van der Waerden's theorem on arithmetic progressions.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 20:11:50 GMT" }, { "version": "v2", "created": "Thu, 18 Dec 2008 22:00:42 GMT" }, { "version": "v3", "created": "Fri, 16 Jan 2009 19:56:48 GMT" }, { "version": "v4", "created": "Sun, 18 Jan 2009 11:10:01 GMT" }, { "version": "v5", "created": "Tue, 17 Nov 2009 18:39:24 GMT" } ]
2009-11-17T00:00:00
[ [ "Au", "Yu-Hin", "" ], [ "Robertson", "Aaron", "" ], [ "Shallit", "Jeffrey", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0812.2518
Yeow Meng Chee
Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, and Huaxiong Wang
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
18 pages
Advances in Cryptology - Asiacrypt 2008, vol. 5350 of Lecture Notes in Computer Science, pp. 19-36, Springer-Verlag, 2008
10.1007/978-3-540-89255-7
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Strongly multiplicative linear secret sharing schemes (LSSS) have been a powerful tool for constructing secure multiparty computation protocols. However, it remains open whether or not there exist efficient constructions of strongly multiplicative LSSS from general LSSS. In this paper, we propose the new concept of a 3-multiplicative LSSS, and establish its relationship with strongly multiplicative LSSS. More precisely, we show that any 3-multiplicative LSSS is a strongly multiplicative LSSS, but the converse is not true; and that any strongly multiplicative LSSS can be efficiently converted into a 3-multiplicative LSSS. Furthermore, we apply 3-multiplicative LSSS to the computation of unbounded fan-in multiplication, which reduces its round complexity to four (from five of the previous protocol based on strongly multiplicative LSSS). We also give two constructions of 3-multiplicative LSSS from Reed-Muller codes and algebraic geometric codes. We believe that the construction and verification of 3-multiplicative LSSS are easier than those of strongly multiplicative LSSS. This presents a step forward in settling the open problem of efficient constructions of strongly multiplicative LSSS from general LSSS.
[ { "version": "v1", "created": "Sat, 13 Dec 2008 02:59:37 GMT" } ]
2008-12-16T00:00:00
[ [ "Zhang", "Zhifang", "" ], [ "Liu", "Mulan", "" ], [ "Chee", "Yeow Meng", "" ], [ "Ling", "San", "" ], [ "Wang", "Huaxiong", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0812.2529
Philippe Roose
Sophie Laplace (LIUPPA), Marc Dalmau (LIUPPA), Philippe Roose (LIUPPA)
Kalinahia: Considering Quality of Service to Design and Execute Distributed Multimedia Applications
null
IEEE/IFIP Int'l Conference on Network Management and Management Symposium, Salvador de Bahia : Br\'esil (2008)
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the current challenges of Information Systems is to ensure semi-structured data transmission, such as multimedia data, in a distributed and pervasive environment. Information Sytems must then guarantee users a quality of service ensuring data accessibility whatever the hardware and network conditions may be. They must also guarantee information coherence and particularly intelligibility that imposes a personalization of the service. Within this framework, we propose a design method based on original models of multimedia applications and quality of service. We also define a supervision platform Kalinahia using a user centered heuristic allowing us to define at any moment which configuration of software components constitutes the best answers to users' wishes in terms of service.
[ { "version": "v1", "created": "Sat, 13 Dec 2008 07:46:52 GMT" } ]
2008-12-16T00:00:00
[ [ "Laplace", "Sophie", "", "LIUPPA" ], [ "Dalmau", "Marc", "", "LIUPPA" ], [ "Roose", "Philippe", "", "LIUPPA" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0812.2535
Kumar Eswaran Dr.
Dasika Ratna Deepthi and K.Eswaran
Pattern Recognition and Memory Mapping using Mirroring Neural Networks
null
Paper No 336, IEEE, ICETiC 2009, International Conference on Emerging Trends in Computing
null
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a new kind of learning implementation to recognize the patterns using the concept of Mirroring Neural Network (MNN) which can extract information from distinct sensory input patterns and perform pattern recognition tasks. It is also capable of being used as an advanced associative memory wherein image data is associated with voice inputs in an unsupervised manner. Since the architecture is hierarchical and modular it has the potential of being used to devise learning engines of ever increasing complexity.
[ { "version": "v1", "created": "Sat, 13 Dec 2008 09:21:31 GMT" } ]
2008-12-16T00:00:00
[ [ "Deepthi", "Dasika Ratna", "" ], [ "Eswaran", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0812.2543
Philippe Robert
Christine Fricker (INRIA Rocquencourt), Fabrice Guillemin (FT R&D), Philippe Robert (INRIA Rocquencourt)
Perturbation analysis of an M/M/1 queue in a diffusion random environment
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study in this paper an $M/M/1$ queue whose server rate depends upon the state of an independent Ornstein-Uhlenbeck diffusion process $(X(t))$ so that its value at time $t$ is $\mu \phi(X(t))$, where $\phi(x)$ is some bounded function and $\mu>0$. We first establish the differential system for the conditional probability density functions of the couple $(L(t),X(t))$ in the stationary regime, where $L(t)$ is the number of customers in the system at time $t$. By assuming that $\phi(x)$ is defined by $\phi(x) = 1-\varepsilon ((x\wedge a/\varepsilon)\vee(-b/\varepsilon))$ for some positive real numbers $a$, $b$ and $\varepsilon$, we show that the above differential system has a unique solution under some condition on $a$ and $b$. We then show that this solution is close, in some appropriate sense, to the solution to the differential system obtained when $\phi$ is replaced with $\Phi(x)=1-\varepsilon x$ for sufficiently small $\varepsilon$. We finally perform a perturbation analysis of this latter solution for small $\varepsilon$. This allows us to check at the first order the validity of the so-called reduced service rate approximation, stating that everything happens as if the server rate were constant and equal to $\mu(1-\eps\E(X(t)))$.
[ { "version": "v1", "created": "Sat, 13 Dec 2008 12:56:44 GMT" } ]
2008-12-16T00:00:00
[ [ "Fricker", "Christine", "", "INRIA Rocquencourt" ], [ "Guillemin", "Fabrice", "", "FT R&D" ], [ "Robert", "Philippe", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.2544
Philippe Robert
Yousra Chabchoub (INRIA Rocquencourt), Christine Fricker (INRIA Rocquencourt), Fabrice Guillemin, Philippe Robert (INRIA Rocquencourt)
Inference of Flow Statistics via Packet Sampling in the Internet
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show in this note that by deterministic packet sampling, the tail of the distribution of the original flow size can be obtained by rescaling that of the sampled flow size. To recover information on the flow size distribution lost through packet sampling, we propose some heuristics based on measurements from different backbone IP networks. These heuristic arguments allow us to recover the complete flow size distribution.
[ { "version": "v1", "created": "Sat, 13 Dec 2008 12:57:31 GMT" } ]
2008-12-16T00:00:00
[ [ "Chabchoub", "Yousra", "", "INRIA Rocquencourt" ], [ "Fricker", "Christine", "", "INRIA\n Rocquencourt" ], [ "Guillemin", "Fabrice", "", "INRIA Rocquencourt" ], [ "Robert", "Philippe", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.2546
Philippe Robert
Christine Fricker (INRIA Rocquencourt), Fabrice Guillemin, Philippe Robert (INRIA Rocquencourt)
An identification problem in an urn and ball model with heavy tailed distributions
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider in this paper an urn and ball problem with replacement, where balls are with different colors and are drawn uniformly from a unique urn. The numbers of balls with a given color are i.i.d. random variables with a heavy tailed probability distribution, for instance a Pareto or a Weibull distribution. We draw a small fraction $p\ll 1$ of the total number of balls. The basic problem addressed in this paper is to know to which extent we can infer the total number of colors and the distribution of the number of balls with a given color. By means of Le Cam's inequality and Chen-Stein method, bounds for the total variation norm between the distribution of the number of balls drawn with a given color and the Poisson distribution with the same mean are obtained. We then show that the distribution of the number of balls drawn with a given color has the same tail as that of the original number of balls. We finally establish explicit bounds between the two distributions when each ball is drawn with fixed probability $p$.
[ { "version": "v1", "created": "Sat, 13 Dec 2008 12:59:40 GMT" }, { "version": "v2", "created": "Sat, 20 Jun 2009 15:28:30 GMT" } ]
2009-06-20T00:00:00
[ [ "Fricker", "Christine", "", "INRIA Rocquencourt" ], [ "Guillemin", "Fabrice", "", "INRIA Rocquencourt" ], [ "Robert", "Philippe", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.2559
Akin Tanatmis
Akin Tanatmis, Stefan Ruzika, Horst W. Hamacher, Mayur Punekar, Frank Kienle and Norbert Wehn
A Separation Algorithm for Improved LP-Decoding of Linear Block Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maximum Likelihood (ML) decoding is the optimal decoding algorithm for arbitrary linear block codes and can be written as an Integer Programming (IP) problem. Feldman et al. relaxed this IP problem and presented Linear Programming (LP) based decoding algorithm for linear block codes. In this paper, we propose a new IP formulation of the ML decoding problem and solve the IP with generic methods. The formulation uses indicator variables to detect violated parity checks. We derive Gomory cuts from our formulation and use them in a separation algorithm to find ML codewords. We further propose an efficient method of finding cuts induced by redundant parity checks (RPC). Under certain circumstances we can guarantee that these RPC cuts are valid and cut off the fractional optimal solutions of LP decoding. We demonstrate on two LDPC codes and one BCH code that our separation algorithm performs significantly better than LP decoding.
[ { "version": "v1", "created": "Sat, 13 Dec 2008 15:55:37 GMT" } ]
2008-12-16T00:00:00
[ [ "Tanatmis", "Akin", "" ], [ "Ruzika", "Stefan", "" ], [ "Hamacher", "Horst W.", "" ], [ "Punekar", "Mayur", "" ], [ "Kienle", "Frank", "" ], [ "Wehn", "Norbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2563
Bernard Mourrain
Monique Laurent (CWI), Bernard Mourrain (INRIA Sophia Antipolis)
A Sparse Flat Extension Theorem for Moment Matrices
null
null
null
null
cs.SC math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note we prove a generalization of the flat extension theorem of Curto and Fialkow for truncated moment matrices. It applies to moment matrices indexed by an arbitrary set of monomials and its border, assuming that this set is connected to 1. When formulated in a basis-free setting, this gives an equivalent result for truncated Hankel operators.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 07:49:22 GMT" } ]
2009-01-19T00:00:00
[ [ "Laurent", "Monique", "", "CWI" ], [ "Mourrain", "Bernard", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
0812.2567
Jian Li
Jian Li
An $O({\log n\over \log\log n})$ Upper Bound on the Price of Stability for Undirected Shapley Network Design Games
null
Information Processing Letters archive Volume 109 Issue 15, July, 2009 Pages 876-878
10.1016/j.ipl.2009.04.015
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the Shapley network design game on undirected networks. In this game, we have an edge weighted undirected network $G(V,E)$ and $n$ selfish players where player $i$ wants to choose a path from source vertex $s_i$ to destination vertex $t_i$. The cost of each edge is equally split among players who pass it. The price of stability is defined as the ratio of the cost of the best Nash equilibrium to that of the optimal solution. We present an $O(\log n/\log\log n)$ upper bound on price of stability for the single sink case, i.e, $t_i=t$ for all $i$.
[ { "version": "v1", "created": "Sat, 13 Dec 2008 17:33:29 GMT" } ]
2014-01-27T00:00:00
[ [ "Li", "Jian", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.2574
SeyyedMajid Valiollahzadeh
Seyyed Majid Valiollahzadeh, Abolghasem Sayadiyan, Mohammad Nazari
Feature Selection By KDDA For SVM-Based MultiView Face Recognition
6 pages
null
null
IEEE SETIT 2007
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Applications such as face recognition that deal with high-dimensional data need a mapping technique that introduces representation of low-dimensional features with enhanced discriminatory power and a proper classifier, able to classify those complex features. Most of traditional Linear Discriminant Analysis suffer from the disadvantage that their optimality criteria are not directly related to the classification ability of the obtained feature representation. Moreover, their classification accuracy is affected by the "small sample size" problem which is often encountered in FR tasks. In this short paper, we combine nonlinear kernel based mapping of data called KDDA with Support Vector machine classifier to deal with both of the shortcomings in an efficient and cost effective manner. The proposed here method is compared, in terms of classification accuracy, to other commonly used FR methods on UMIST face database. Results indicate that the performance of the proposed method is overall superior to those of traditional FR approaches, such as the Eigenfaces, Fisherfaces, and D-LDA methods and traditional linear classifiers.
[ { "version": "v1", "created": "Sat, 13 Dec 2008 19:09:03 GMT" } ]
2008-12-16T00:00:00
[ [ "Valiollahzadeh", "Seyyed Majid", "" ], [ "Sayadiyan", "Abolghasem", "" ], [ "Nazari", "Mohammad", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.2575
SeyyedMajid Valiollahzadeh
Seyyed Majid Valiollahzadeh, Abolghasem Sayadiyan, Mohammad Nazari
Face Detection Using Adaboosted SVM-Based Component Classifier
7 pages
null
null
ICEIS Portugal 2007
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, Adaboost has been widely used to improve the accuracy of any given learning algorithm. In this paper we focus on designing an algorithm to employ combination of Adaboost with Support Vector Machine as weak component classifiers to be used in Face Detection Task. To obtain a set of effective SVM-weaklearner Classifier, this algorithm adaptively adjusts the kernel parameter in SVM instead of using a fixed one. Proposed combination outperforms in generalization in comparison with SVM on imbalanced classification problem. The proposed here method is compared, in terms of classification accuracy, to other commonly used Adaboost methods, such as Decision Trees and Neural Networks, on CMU+MIT face database. Results indicate that the performance of the proposed method is overall superior to previous Adaboost approaches.
[ { "version": "v1", "created": "Sat, 13 Dec 2008 19:14:53 GMT" } ]
2008-12-16T00:00:00
[ [ "Valiollahzadeh", "Seyyed Majid", "" ], [ "Sayadiyan", "Abolghasem", "" ], [ "Nazari", "Mohammad", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.2599
Sewoong Oh
Raghunandan H. Keshavan, Andrea Montanari, Sewoong Oh
Learning Low Rank Matrices from O(n) Entries
8 pages, 11 figures, Forty-sixth Allerton Conference on Communication, Control and Computing, invited paper
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How many random entries of an n by m, rank r matrix are necessary to reconstruct the matrix within an accuracy d? We address this question in the case of a random matrix with bounded rank, whereby the observed entries are chosen uniformly at random. We prove that, for any d>0, C(r,d)n observations are sufficient. Finally we discuss the question of reconstructing the matrix efficiently, and demonstrate through extensive simulations that this task can be accomplished in nPoly(log n) operations, for small rank.
[ { "version": "v1", "created": "Sun, 14 Dec 2008 18:30:44 GMT" } ]
2008-12-16T00:00:00
[ [ "Keshavan", "Raghunandan H.", "" ], [ "Montanari", "Andrea", "" ], [ "Oh", "Sewoong", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.2602
Shamgar Gurevich
Shamgar Gurevich (University of California Berkeley) and Ronny Hadani (University of Chicago)
The statistical restricted isometry property and the Wigner semicircle distribution of incoherent dictionaries
Submitted for The 2009 IEEE International Symposium on Information Theory; Key words: Compressive sensing, Stastical version of Candes-Tao RIP, Incoherent Dictionaries, Semicircle distribution
null
null
null
cs.IT cs.DM math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we present a statistical version of the Candes-Tao restricted isometry property (SRIP for short) which holds in general for any incoherent dictionary which is a disjoint union of orthonormal bases. In addition, we show that, under appropriate normalization, the eigenvalues of the associated Gram matrix fluctuate around 1 according to the Wigner semicircle distribution. The result is then applied to various dictionaries that arise naturally in the setting of finite harmonic analysis, giving, in particular, a better understanding on a remark of Applebaum-Howard-Searle-Calderbank concerning RIP for the Heisenberg dictionary of chirp like functions.
[ { "version": "v1", "created": "Sun, 14 Dec 2008 05:03:58 GMT" } ]
2008-12-16T00:00:00
[ [ "Gurevich", "Shamgar", "", "University of California Berkeley" ], [ "Hadani", "Ronny", "", "University of Chicago" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0812.2636
Tobias Friedrich
Karl Bringmann, Tobias Friedrich
Approximating the least hypervolume contributor: NP-hard in general, but fast in practice
22 pages, to appear in Theoretical Computer Science
null
10.1016/j.tcs.2010.09.026
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The hypervolume indicator is an increasingly popular set measure to compare the quality of two Pareto sets. The basic ingredient of most hypervolume indicator based optimization algorithms is the calculation of the hypervolume contribution of single solutions regarding a Pareto set. We show that exact calculation of the hypervolume contribution is #P-hard while its approximation is NP-hard. The same holds for the calculation of the minimal contribution. We also prove that it is NP-hard to decide whether a solution has the least hypervolume contribution. Even deciding whether the contribution of a solution is at most $(1+\eps)$ times the minimal contribution is NP-hard. This implies that it is neither possible to efficiently find the least contributing solution (unless $P = NP$) nor to approximate it (unless $NP = BPP$). Nevertheless, in the second part of the paper we present a fast approximation algorithm for this problem. We prove that for arbitrarily given $\eps,\delta>0$ it calculates a solution with contribution at most $(1+\eps)$ times the minimal contribution with probability at least $(1-\delta)$. Though it cannot run in polynomial time for all instances, it performs extremely fast on various benchmark datasets. The algorithm solves very large problem instances which are intractable for exact algorithms (e.g., 10000 solutions in 100 dimensions) within a few seconds.
[ { "version": "v1", "created": "Sun, 14 Dec 2008 13:57:10 GMT" }, { "version": "v2", "created": "Fri, 24 Sep 2010 20:43:10 GMT" } ]
2015-03-13T00:00:00
[ [ "Bringmann", "Karl", "" ], [ "Friedrich", "Tobias", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0812.2702
Mladen Pavicic
Mladen Pavicic and Norman D. Megill
Standard Logics Are Valuation-Nonmonotonic
35 pages, 3 figures
Journal of Logic and Computation, 18 (6) 959-982 (2008)
null
null
cs.LO cs.AI quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It has recently been discovered that both quantum and classical propositional logics can be modelled by classes of non-orthomodular and thus non-distributive lattices that properly contain standard orthomodular and Boolean classes, respectively. In this paper we prove that these logics are complete even for those classes of the former lattices from which the standard orthomodular lattices and Boolean algebras are excluded. We also show that neither quantum nor classical computers can be founded on the latter models. It follows that logics are "valuation-nonmonotonic" in the sense that their possible models (corresponding to their possible hardware implementations) and the valuations for them drastically change when we add new conditions to their defining conditions. These valuations can even be completely separated by putting them into disjoint lattice classes by a technique presented in the paper.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 00:49:12 GMT" } ]
2008-12-17T00:00:00
[ [ "Pavicic", "Mladen", "" ], [ "Megill", "Norman D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0812.2709
Bari\c{s} Nakibo\u{g}lu
Robert G. Gallager, Baris Nakiboglu
Variations on a theme by Schalkwijk and Kailath
18 Pages, 4 figures (added reference)
IEEE Transactions on Information Theory, 56(1):6-17, Jan 2010
10.1109/TIT.2009.2034896
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Schalkwijk and Kailath (1966) developed a class of block codes for Gaussian channels with ideal feedback for which the probability of decoding error decreases as a second-order exponent in block length for rates below capacity. This well-known but surprising result is explained and simply derived here in terms of a result by Elias (1956) concerning the minimum mean-square distortion achievable in transmitting a single Gaussian random variable over multiple uses of the same Gaussian channel. A simple modification of the Schalkwijk-Kailath scheme is then shown to have an error probability that decreases with an exponential order which is linearly increasing with block length. In the infinite bandwidth limit, this scheme produces zero error probability using bounded expected energy at all rates below capacity. A lower bound on error probability for the finite bandwidth case is then derived in which the error probability decreases with an exponential order which is linearly increasing in block length at the same rate as the upper bound.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 02:04:50 GMT" }, { "version": "v2", "created": "Sun, 16 Aug 2009 15:03:12 GMT" }, { "version": "v3", "created": "Wed, 11 Nov 2009 00:48:30 GMT" }, { "version": "v4", "created": "Fri, 20 Nov 2009 18:05:24 GMT" } ]
2018-03-20T00:00:00
[ [ "Gallager", "Robert G.", "" ], [ "Nakiboglu", "Baris", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2719
John Shea
Tan F. Wong, Matthieu Bloch, and John M. Shea
Secret Sharing over Fast-Fading MIMO Wiretap Channels
Revision submitted to EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security, Sept. 2009. v.3: Fixes to proofs. Matthieu Bloch added as co-author for contributions to proofs
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of a wiretapper who also makes channel observations that are different from but correlated to those made by the destination. An interactive authenticated unrestricted public channel is also available for use by the source and destination in the secret sharing process. This falls under the "channel-type model with wiretapper" considered by Ahlswede and Csiszar. A minor extension of their result (to continuous channel alphabets) is employed to evaluate the key capacity of the fast-fading MIMO wiretap channel. The effects of spatial dimensionality provided by the use of multiple antennas at the source, destination, and wiretapper are then investigated.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 04:03:15 GMT" }, { "version": "v2", "created": "Tue, 30 Jun 2009 00:52:02 GMT" }, { "version": "v3", "created": "Sat, 12 Sep 2009 03:10:14 GMT" } ]
2009-09-12T00:00:00
[ [ "Wong", "Tan F.", "" ], [ "Bloch", "Matthieu", "" ], [ "Shea", "John M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2726
Tatsuto Murayama
Tatsuto Murayama and Peter Davis
Universal Behavior in Large-scale Aggregation of Independent Noisy Observations
10 pages, 3 figures
null
10.1209/0295-5075/87/48003
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aggregation of noisy observations involves a difficult tradeoff between observation quality, which can be increased by increasing the number of observations, and aggregation quality which decreases if the number of observations is too large. We clarify this behavior for a protypical system in which arbitrarily large numbers of observations exceeding the system capacity can be aggregated using lossy data compression. We show the existence of a scaling relation between the collective error and the system capacity, and show that large scale lossy aggregation can outperform lossless aggregation above a critical level of observation noise. Further, we show that universal results for scaling and critical value of noise which are independent of system capacity can be obtained by considering asymptotic behavior when the system capacity increases toward infinity.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 06:05:06 GMT" } ]
2015-05-13T00:00:00
[ [ "Murayama", "Tatsuto", "" ], [ "Davis", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2734
Benjamin Leveque
Kathie Cameron, Chinh Ho\`ang, Benjamin L\'ev\^eque
Asteroids in rooted and directed path graphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An asteroidal triple is a stable set of three vertices such that each pair is connected by a path avoiding the neighborhood of the third vertex. Asteroidal triples play a central role in a classical characterization of interval graphs by Lekkerkerker and Boland. Their result says that a chordal graph is an interval graph if and only if it contains no asteroidal triple. In this paper, we prove an analogous theorem for directed path graphs which are the intersection graphs of directed paths in a directed tree. For this purpose, we introduce the notion of a strong path. Two non-adjacent vertices are linked by a strong path if either they have a common neighbor or they are the endpoints of two vertex-disjoint chordless paths satisfying certain conditions. A strong asteroidal triple is an asteroidal triple such that each pair is linked by a strong path. We prove that a chordal graph is a directed path graph if and only if it contains no strong asteroidal triple. We also introduce a related notion of asteroidal quadruple, and conjecture a characterization of rooted path graphs which are the intersection graphs of directed paths in a rooted tree.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 07:50:42 GMT" }, { "version": "v2", "created": "Tue, 30 Dec 2008 14:15:25 GMT" } ]
2008-12-30T00:00:00
[ [ "Cameron", "Kathie", "" ], [ "Hoàng", "Chinh", "" ], [ "Lévêque", "Benjamin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.2769
Dan Gordon
Dan Gordon (Univ. of Haifa), Rachel Gordon (Technion-Israel Inst. of Technology)
Geometric scaling: a simple preconditioner for certain linear systems with discontinuous coefficients
22 pages, 13 tables, 14 figures, 22 references. Submitted for publication
null
null
null
cs.MS cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear systems with large differences between coefficients ("discontinuous coefficients") arise in many cases in which partial differential equations(PDEs) model physical phenomena involving heterogeneous media. The standard approach to solving such problems is to use domain decomposition techniques, with domain boundaries conforming to the boundaries between the different media. This approach can be difficult to implement when the geometry of the domain boundaries is complicated or the grid is unstructured. This work examines the simple preconditioning technique of scaling the equations by dividing each equation by the Lp-norm of its coefficients. This preconditioning is called geometric scaling (GS). It has long been known that diagonal scaling can be useful in improving convergence, but there is no study on the general usefulness of this approach for discontinuous coefficients. GS was tested on several nonsymmetric linear systems with discontinuous coefficients derived from convection-diffusion elliptic PDEs with small to moderate convection terms. It is shown that GS improved the convergence properties of restarted GMRES and Bi-CGSTAB, with and without the ILUT preconditioner. GS was also shown to improve the distribution of the eigenvalues by reducing their concentration around the origin very significantly.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 11:35:17 GMT" }, { "version": "v2", "created": "Mon, 4 May 2009 15:31:09 GMT" } ]
2009-05-04T00:00:00
[ [ "Gordon", "Dan", "", "Univ. of Haifa" ], [ "Gordon", "Rachel", "", "Technion-Israel Inst. of\n Technology" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0812.2775
Johannes Fischer
Johannes Fischer
Optimal Succinctness for Range Minimum Queries
12 pages; to appear in Proc. LATIN'10
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a static array A of n ordered objects, a range minimum query asks for the position of the minimum between two specified array indices. We show how to preprocess A into a scheme of size 2n+o(n) bits that allows to answer range minimum queries on A in constant time. This space is asymptotically optimal in the important setting where access to A is not permitted after the preprocessing step. Our scheme can be computed in linear time, using only n + o(n) additional bits at construction time. In interesting by-product is that we also improve on LCA-computation in BPS- or DFUDS-encoded trees.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 12:03:31 GMT" }, { "version": "v2", "created": "Thu, 9 Apr 2009 07:35:41 GMT" }, { "version": "v3", "created": "Wed, 2 Dec 2009 09:22:49 GMT" } ]
2009-12-02T00:00:00
[ [ "Fischer", "Johannes", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.2785
Tshilidzi Marwala
Baruch Lubinsky, Bekir Genc and Tshilidzi Marwala
Prediction of Platinum Prices Using Dynamically Weighted Mixture of Experts
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neural networks are powerful tools for classification and regression in static environments. This paper describes a technique for creating an ensemble of neural networks that adapts dynamically to changing conditions. The model separates the input space into four regions and each network is given a weight in each region based on its performance on samples from that region. The ensemble adapts dynamically by constantly adjusting these weights based on the current performance of the networks. The data set used is a collection of financial indicators with the goal of predicting the future platinum price. An ensemble with no weightings does not improve on the naive estimate of no weekly change; our weighting algorithm gives an average percentage error of 63% for twenty weeks of prediction.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 12:35:42 GMT" } ]
2008-12-16T00:00:00
[ [ "Lubinsky", "Baruch", "" ], [ "Genc", "Bekir", "" ], [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.2851
Amr Elmasry
Amr Elmasry
The Violation Heap: A Relaxed Fibonacci-Like Heap
10 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a priority queue that achieves the same amortized bounds as Fibonacci heaps. Namely, find-min requires O(1) worst-case time, insert, meld and decrease-key require O(1) amortized time, and delete-min requires $O(\log n)$ amortized time. Our structure is simple and promises an efficient practical behavior when compared to other known Fibonacci-like heaps. The main idea behind our construction is to propagate rank updates instead of performing cascaded cuts following a decrease-key operation, allowing for a relaxed structure.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 16:16:58 GMT" }, { "version": "v2", "created": "Thu, 11 Feb 2010 12:24:07 GMT" } ]
2010-02-11T00:00:00
[ [ "Elmasry", "Amr", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.2868
Travis Gagie
Pawel Gawrychowski and Travis Gagie
Minimax Trees in Linear Time
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A minimax tree is similar to a Huffman tree except that, instead of minimizing the weighted average of the leaves' depths, it minimizes the maximum of any leaf's weight plus its depth. Golumbic (1976) introduced minimax trees and gave a Huffman-like, $\Oh{n \log n}$-time algorithm for building them. Drmota and Szpankowski (2002) gave another $\Oh{n \log n}$-time algorithm, which checks the Kraft Inequality in each step of a binary search. In this paper we show how Drmota and Szpankowski's algorithm can be made to run in linear time on a word RAM with (\Omega (\log n))-bit words. We also discuss how our solution applies to problems in data compression, group testing and circuit design.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 17:15:51 GMT" }, { "version": "v2", "created": "Wed, 28 Jan 2009 13:45:39 GMT" } ]
2009-01-28T00:00:00
[ [ "Gawrychowski", "Pawel", "" ], [ "Gagie", "Travis", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.2870
Piotr Micek
Kolja Knauer, Piotr Micek, Torsten Ueckerdt
How to eat 4/9 of a pizza
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given two players alternately picking pieces of a pizza sliced by radial cuts, in such a way that after the first piece is taken every subsequent chosen piece is adjacent to some previously taken piece, we provide a strategy for the starting player to get 4/9 of the pizza. This is best possible and settles a conjecture of Peter Winkler.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 17:35:35 GMT" }, { "version": "v2", "created": "Mon, 15 Dec 2008 21:53:20 GMT" }, { "version": "v3", "created": "Tue, 19 Jan 2010 14:30:15 GMT" }, { "version": "v4", "created": "Mon, 24 Jan 2011 12:47:59 GMT" } ]
2011-01-25T00:00:00
[ [ "Knauer", "Kolja", "" ], [ "Micek", "Piotr", "" ], [ "Ueckerdt", "Torsten", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0812.2874
Richard McClatchey
Andrew Branson, Tamas Hauer, Richard McClatchey, Dmitry Rogulin and Jetendr Shamdasani
A Data Model for Integrating Heterogeneous Medical Data in the Health-e-Child Project
10 pages, 4 figures, 1 table. Proceedings the 6th HealthGrid Int. Conference (HG08)
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There has been much research activity in recent times about providing the data infrastructures needed for the provision of personalised healthcare. In particular the requirement of integrating multiple, potentially distributed, heterogeneous data sources in the medical domain for the use of clinicians has set challenging goals for the healthgrid community. The approach advocated in this paper surrounds the provision of an Integrated Data Model plus links to/from ontologies to homogenize biomedical (from genomic, through cellular, disease, patient and population-related) data in the context of the EC Framework 6 Health-e-Child project. Clinical requirements are identified, the design approach in constructing the model is detailed and the integrated model described in the context of examples taken from that project. Pointers are given to future work relating the model to medical ontologies and challenges to the use of fully integrated models and ontologies are identified.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 18:25:51 GMT" } ]
2008-12-16T00:00:00
[ [ "Branson", "Andrew", "" ], [ "Hauer", "Tamas", "" ], [ "McClatchey", "Richard", "" ], [ "Rogulin", "Dmitry", "" ], [ "Shamdasani", "Jetendr", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0812.2879
Richard McClatchey
Kamran Munir, Mohammed Odeh and Richard McClatchey
Ontology Assisted Query Reformulation Using Semantic and Assertion Capabilities of OWL-DL Ontologies
15 pages, 4 figures. Proceedings of the 12th International Database Engineering & Applications Symposium (Ideas2008)
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
End users of recent biomedical information systems are often unaware of the storage structure and access mechanisms of the underlying data sources and can require simplified mechanisms for writing domain specific complex queries. This research aims to assist users and their applications in formulating queries without requiring complete knowledge of the information structure of underlying data sources. To achieve this, query reformulation techniques and algorithms have been developed that can interpret ontology-based search criteria and associated domain knowledge in order to reformulate a relational query. These query reformulation algorithms exploit the semantic relationships and assertion capabilities of OWL-DL based domain ontologies for query reformulation. In this paper, this approach is applied to the integrated database schema of the EU funded Health-e-Child (HeC) project with the aim of providing ontology assisted query reformulation techniques to simplify the global access that is needed to millions of medical records across the UK and Europe.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 18:34:44 GMT" } ]
2008-12-16T00:00:00
[ [ "Munir", "Kamran", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0812.2891
Sandeep Chalasani
Sandeep Chalasani
On the Value of a Social Network
12 pages; 13 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate the value of a social network with respect to the probability mechanism underlying its structure. Specifically, we compute the value for small world and scale free networks. We provide evidence in support of the value to be given by Zipfs law.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 19:20:15 GMT" } ]
2008-12-16T00:00:00
[ [ "Chalasani", "Sandeep", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.2892
SeyyedMajid Valiollahzadeh
Hadi. Zayyani, Seyyedmajid Valiollahzadeh, Massoud. Babaie-Zadeh
Sparse Component Analysis (SCA) in Random-valued and Salt and Pepper Noise Removal
6 pages
null
null
ICEE 2008
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new method for impulse noise removal from images. It uses the sparsity of images in the Discrete Cosine Transform (DCT) domain. The zeros in this domain give us the exact mathematical equation to reconstruct the pixels that are corrupted by random-value impulse noises. The proposed method can also detect and correct the corrupted pixels. Moreover, in a simpler case that salt and pepper noise is the brightest and darkest pixels in the image, we propose a simpler version of our method. In addition to the proposed method, we suggest a combination of the traditional median filter method with our method to yield better results when the percentage of the corrupted samples is high.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 19:24:45 GMT" } ]
2008-12-16T00:00:00
[ [ "Zayyani", "Hadi.", "" ], [ "Valiollahzadeh", "Seyyedmajid", "" ], [ "Babaie-Zadeh", "Massoud.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0812.2926
Gheorghe Stefanescu
Gheorghe Stefanescu and Camelia Chira
New parallel programming language design: a bridge between brain models and multi-core/many-core computers?
To appear in: "From Natural Language to Soft Computing: New Paradigms in Artificial Intelligence,", L.A. Zadeh et.al (Eds.), Editing House of Romanian Academy, 2008
null
null
null
cs.PL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recurrent theme of this paper is that sequences of long temporal patterns as opposed to sequences of simple statements are to be fed into computation devices, being them (new proposed) models for brain activity or multi-core/many-core computers. In such models, parts of these long temporal patterns are already committed while other are predicted. This combination of matching patterns and making predictions appears as a key element in producing intelligent processing in brain models and getting efficient speculative execution on multi-core/many-core computers. A bridge between these far-apart models of computation could be provided by appropriate design of massively parallel, interactive programming languages. Agapia is a recently proposed language of this kind, where user controlled long high-level temporal structures occur at the interaction interfaces of processes. In this paper Agapia is used to link HTMs brain models with TRIPS multi-core/many-core architectures.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 22:55:19 GMT" } ]
2008-12-17T00:00:00
[ [ "Stefanescu", "Gheorghe", "" ], [ "Chira", "Camelia", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.2967
Jeff M Phillips
Maarten Loffler and Jeff M. Phillips
Shape Fitting on Point Sets with Probability Distributions
19 pages, 24 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A typical computational geometry problem begins: Consider a set P of n points in R^d. However, many applications today work with input that is not precisely known, for example when the data is sensed and has some known error model. What if we do not know the set P exactly, but rather we have a probability distribution mu_p governing the location of each point p in P? Consider a set of (non-fixed) points P, and let mu_P be the probability distribution of this set. We study several measures (e.g. the radius of the smallest enclosing ball, or the area of the smallest enclosing box) with respect to mu_P. The solutions to these problems do not, as in the traditional case, consist of a single answer, but rather a distribution of answers. We describe several data structures that approximate distributions of answers for shape fitting problems. We provide simple and efficient randomized algorithms for computing all of these data structures, which are easy to implement and practical. We provide some experimental results to assert this. We also provide more involved deterministic algorithms for some of these data structures that run in time polynomial in n and 1/eps, where eps is the approximation factor.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 04:09:38 GMT" } ]
2008-12-17T00:00:00
[ [ "Loffler", "Maarten", "" ], [ "Phillips", "Jeff M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0812.2969
Marco Piastra
Marco Piastra
A Growing Self-Organizing Network for Reconstructing Curves and Surfaces
null
Neural Networks, 2009. IJCNN 2009. International Joint Conference on , vol., no., pp.2533,2540, 14-19 June 2009
10.1109/IJCNN.2009.5178709
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Self-organizing networks such as Neural Gas, Growing Neural Gas and many others have been adopted in actual applications for both dimensionality reduction and manifold learning. Typically, in these applications, the structure of the adapted network yields a good estimate of the topology of the unknown subspace from where the input data points are sampled. The approach presented here takes a different perspective, namely by assuming that the input space is a manifold of known dimension. In return, the new type of growing self-organizing network presented gains the ability to adapt itself in way that may guarantee the effective and stable recovery of the exact topological structure of the input manifold.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 15:59:36 GMT" }, { "version": "v2", "created": "Sun, 21 Dec 2008 17:22:02 GMT" } ]
2015-03-23T00:00:00
[ [ "Piastra", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.2971
Ning Chen
Meghanad D. Wagh, Ning Chen, and Zhiyuan Yan
Cyclotomic FFT of Length 2047 Based on a Novel 11-point Cyclic Convolution
11 pages, 1 figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this manuscript, we propose a novel 11-point cyclic convolution algorithm based on alternate Fourier transform. With the proposed bilinear form, we construct a length-2047 cyclotomic FFT.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 05:04:31 GMT" }, { "version": "v2", "created": "Tue, 10 Mar 2009 00:49:02 GMT" }, { "version": "v3", "created": "Mon, 20 Apr 2009 15:44:27 GMT" } ]
2009-04-20T00:00:00
[ [ "Wagh", "Meghanad D.", "" ], [ "Chen", "Ning", "" ], [ "Yan", "Zhiyuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.2988
Philippe Roose
Emmanuel Bouix (LIUPPA), Philippe Roose (LIUPPA), Marc Dalmau (LIUPPA)
The Korrontea Data Modeling
null
Ambisys, Quebec City : Canada (2008)
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Needs of multimedia systems evolved due to the evolution of their architecture which is now distributed into heterogeneous contexts. A critical issue lies in the fact that they handle, process, and transmit multimedia data. This data integrates several properties which should be considered since it holds a considerable part of its semantics, for instance the lips synchronization in a video. In this paper, we focus on the definition of a model as a basic abstraction for describing and modeling media in multimedia systems by taking into account their properties. This model will be used in software architecture in order to handle data in efficient way. The provided model is an interesting solution for the integration of media into applications; we propose to consider and to handle them in a uniform way. This model is proposed with synchronization policies to ensure synchronous transport of media. Therefore, we use it in a component model that we develop for the design and deployment of distributed multimedia systems.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 07:46:49 GMT" } ]
2008-12-17T00:00:00
[ [ "Bouix", "Emmanuel", "", "LIUPPA" ], [ "Roose", "Philippe", "", "LIUPPA" ], [ "Dalmau", "Marc", "", "LIUPPA" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0812.2989
Philippe Roose
Christine Louberry (LIUPPA), Philippe Roose (LIUPPA), Marc Dalmau (LIUPPA)
Heterogeneous component interactions: Sensors integration into multimedia applications
null
Journal of Networks, Issue N6, Academy Publisher 3, 4 (2008)
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Resource-constrained embedded and mobile devices are becoming increasingly common. Since few years, some mobile and ubiquitous devices such as wireless sensor, able to be aware of their physical environment, appeared. Such devices enable proposing applications which adapt to user's need according the context evolution. It implies the collaboration of sensors and software components which differ on their nature and their communication mechanisms. This paper proposes a unified component model in order to easily design applications based on software components and sensors without taking care of their nature. Then it presents a state of the art of communication problems linked to heterogeneous components and proposes an interaction mechanism which ensures information exchanges between wireless sensors and software components.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 07:47:22 GMT" } ]
2008-12-17T00:00:00
[ [ "Louberry", "Christine", "", "LIUPPA" ], [ "Roose", "Philippe", "", "LIUPPA" ], [ "Dalmau", "Marc", "", "LIUPPA" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0812.2990
Frederic Mazoit
Fr\'ed\'eric Mazoit (LaBRI)
Tree-width of hypergraphs and surface duality
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Graph Minor III, Robertson and Seymour conjecture that the tree-width of a planar graph and that of its dual differ by at most one. We prove that given a hypergraph H on a surface of Euler genus k, the tree-width of H^* is at most the maximum of tw(H) + 1 + k and the maximum size of a hyperedge of H^*.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 07:47:50 GMT" } ]
2008-12-17T00:00:00
[ [ "Mazoit", "Frédéric", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.2991
Thierry Poibeau
Amanda Bouffier (LIPN), Thierry Poibeau (LIPN), Catherine Duclos (LIM&Bio)
Analyse et structuration automatique des guides de bonnes pratiques cliniques : essai d'\'evaluation
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Health Practice Guideliens are supposed to unify practices and propose recommendations to physicians. This paper describes GemFrame, a system capable of semi-automatically filling an XML template from free texts in the clinical domain. The XML template includes semantic information not explicitly encoded in the text (pairs of conditions and ac-tions/recommendations). Therefore, there is a need to compute the exact scope of condi-tions over text sequences expressing the re-quired actions. We present a system developped for this task. We show that it yields good performance when applied to the analysis of French practice guidelines. We conclude with a precise evaluation of the tool.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 07:49:20 GMT" } ]
2008-12-17T00:00:00
[ [ "Bouffier", "Amanda", "", "LIPN" ], [ "Poibeau", "Thierry", "", "LIPN" ], [ "Duclos", "Catherine", "", "LIM&Bio" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.3066
Tomer Michaeli
Y. C. Eldar, T. Michaeli
Beyond Bandlimited Sampling: Nonlinearities, Smoothness and Sparsity
35 pages, 16 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sampling theory has benefited from a surge of research in recent years, due in part to the intense research in wavelet theory and the connections made between the two fields. In this survey we present several extensions of the Shannon theorem, that have been developed primarily in the past two decades, which treat a wide class of input signals as well as nonideal sampling and nonlinear distortions. This framework is based on viewing sampling in a broader sense of projection onto appropriate subspaces, and then choosing the subspaces to yield interesting new possibilities. For example, our results can be used to uniformly sample non-bandlimited signals, and to perfectly compensate for nonlinear effects.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 14:19:45 GMT" } ]
2008-12-17T00:00:00
[ [ "Eldar", "Y. C.", "" ], [ "Michaeli", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.3068
Bas Luttik
Rob van Glabbeek, Bas Luttik and Nikola Trcka
Branching Bisimilarity with Explicit Divergence
null
null
null
CS-R 08-25
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the relational characterisation of branching bisimilarity with explicit divergence. We prove that it is an equivalence and that it coincides with the original definition of branching bisimilarity with explicit divergence in terms of coloured traces. We also establish a correspondence with several variants of an action-based modal logic with until- and divergence modalities.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 14:36:43 GMT" } ]
2008-12-17T00:00:00
[ [ "van Glabbeek", "Rob", "" ], [ "Luttik", "Bas", "" ], [ "Trcka", "Nikola", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0812.3070
Alex Arenas
J. Borge, A. Arenas
A Computational Model to Disentangle Semantic Information Embedded in Word Association Norms
9 pages, 3 figures
null
null
null
cs.CL cs.AI physics.data-an physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two well-known databases of semantic relationships between pairs of words used in psycholinguistics, feature-based and association-based, are studied as complex networks. We propose an algorithm to disentangle feature based relationships from free association semantic networks. The algorithm uses the rich topology of the free association semantic network to produce a new set of relationships between words similar to those observed in feature production norms.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 14:24:23 GMT" } ]
2008-12-17T00:00:00
[ [ "Borge", "J.", "" ], [ "Arenas", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0812.3120
Jun Zhang
Jun Zhang, Robert W. Heath Jr., Marios Kountouris, and Jeffrey G. Andrews
Mode Switching for MIMO Broadcast Channel Based on Delay and Channel Quantization
29 pages, submitted to EURASIP Special Issue on Multiuser MIMO Transmission with Limited Feedback, Cooperation, and Coordination
null
10.1155/2009/802548
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Imperfect channel state information degrades the performance of multiple-input multiple-output (MIMO) communications; its effect on single-user (SU) and multi-user (MU) MIMO transmissions are quite different. In particular, MU-MIMO suffers from residual inter-user interference due to imperfect channel state information while SU-MIMO only suffers from a power loss. This paper compares the throughput loss of both SU and MU MIMO on the downlink due to delay and channel quantization. Accurate closed-form approximations are derived for the achievable rates for both SU and MU MIMO. It is shown that SU-MIMO is relatively robust to delayed and quantized channel information, while MU MIMO with zero-forcing precoding loses spatial multiplexing gain with a fixed delay or fixed codebook size. Based on derived achievable rates, a mode switching algorithm is proposed that switches between SU and MU MIMO modes to improve the spectral efficiency, based on the average signal-to-noise ratio (SNR), the normalized Doppler frequency, and the channel quantization codebook size. The operating regions for SU and MU modes with different delays and codebook sizes are determined, which can be used to select the preferred mode. It is shown that the MU mode is active only when the normalized Doppler frequency is very small and the codebook size is large.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 18:15:02 GMT" } ]
2016-02-17T00:00:00
[ [ "Zhang", "Jun", "" ], [ "Heath", "Robert W.", "Jr." ], [ "Kountouris", "Marios", "" ], [ "Andrews", "Jeffrey G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.3124
Jun Zhang
Jun Zhang, Marios Kountouris, Jeffrey G. Andrews and Robert W. Heath Jr
Achievable Throughput of Multi-mode Multiuser MIMO with Imperfect CSI Constraints
5 pages, 3 figures, submitted to 2009 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2009.5205915
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the multiple-input multiple-output (MIMO) broadcast channel with imperfect channel state information (CSI), neither the capacity nor the optimal transmission technique have been fully discovered. In this paper, we derive achievable ergodic rates for a MIMO fading broadcast channel when CSI is delayed and quantized. It is shown that we should not support too many users with spatial division multiplexing due to the residual inter-user interference caused by imperfect CSI. Based on the derived achievable rates, we propose a multi-mode transmission strategy to maximize the throughput, which adaptively adjusts the number of active users based on the channel statistics information.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 18:25:29 GMT" } ]
2016-11-18T00:00:00
[ [ "Zhang", "Jun", "" ], [ "Kountouris", "Marios", "" ], [ "Andrews", "Jeffrey G.", "" ], [ "Heath", "Robert W.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.3137
Olga Holtz
Olga Holtz
Compressive sensing: a paradigm shift in signal processing
A short survey of compressive sensing
null
null
null
math.HO cs.DS cs.NA math.NA math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We survey a new paradigm in signal processing known as "compressive sensing". Contrary to old practices of data acquisition and reconstruction based on the Shannon-Nyquist sampling principle, the new theory shows that it is possible to reconstruct images or signals of scientific interest accurately and even exactly from a number of samples which is far smaller than the desired resolution of the image/signal, e.g., the number of pixels in the image. This new technique draws from results in several fields of mathematics, including algebra, optimization, probability theory, and harmonic analysis. We will discuss some of the key mathematical ideas behind compressive sensing, as well as its implications to other fields: numerical analysis, information theory, theoretical computer science, and engineering.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 19:53:30 GMT" } ]
2009-03-13T00:00:00
[ [ "Holtz", "Olga", "" ] ]
[ { "class": "Mathematics", "code": "math.HO", "description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics", "span": "(History and Overview)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0812.3145
Todd Young
Erik Boczko, Andrew DiLullo and Todd Young
Binary Classification Based on Potentials
5 pages, 2 figures. Presented at the Ohio Collaborative Conference on Bioinformatics (OCCBIO) June 2006
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a simple and computationally trivial method for binary classification based on the evaluation of potential functions. We demonstrate that despite the conceptual and computational simplicity of the method its performance can match or exceed that of standard Support Vector Machine methods.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 20:41:06 GMT" }, { "version": "v2", "created": "Tue, 16 Dec 2008 21:05:28 GMT" } ]
2008-12-17T00:00:00
[ [ "Boczko", "Erik", "" ], [ "DiLullo", "Andrew", "" ], [ "Young", "Todd", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.3147
Todd Young
Erik M. Boczko, Todd Young, Minhui Zie, and Di Wu
Comparison of Binary Classification Based on Signed Distance Functions with Support Vector Machines
5 pages, 4 figures. Presented at the Ohio Collaborative Conference on Bioinformatics (OCCBIO), June 2006
null
null
null
cs.LG cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the performance of a simple signed distance function (SDF) based method by direct comparison with standard SVM packages, as well as K-nearest neighbor and RBFN methods. We present experimental results comparing the SDF approach with other classifiers on both synthetic geometric problems and five benchmark clinical microarray data sets. On both geometric problems and microarray data sets, the non-optimized SDF based classifiers perform just as well or slightly better than well-developed, standard SVM methods. These results demonstrate the potential accuracy of SDF-based methods on some types of problems.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 20:58:24 GMT" } ]
2008-12-17T00:00:00
[ [ "Boczko", "Erik M.", "" ], [ "Young", "Todd", "" ], [ "Zie", "Minhui", "" ], [ "Wu", "Di", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0812.3186
Jeffrey Shallit
E. Grant, J. Shallit, T. Stoll
Bounds for the discrete correlation of infinite sequences on k symbols and generalized Rudin-Shapiro sequences
Improved Introduction and new Section 6 (Lovasz local lemma)
null
10.4064/aa140-4-5
null
math.CO cs.FL math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the known autocorrelation properties of the Rudin-Shapiro sequence, we study the discrete correlation among infinite sequences over a finite alphabet, where we just take into account whether two symbols are identical. We show by combinatorial means that sequences cannot be "too" different, and by an explicit construction generalizing the Rudin-Shapiro sequence, we show that we can achieve the maximum possible difference.
[ { "version": "v1", "created": "Wed, 17 Dec 2008 00:50:54 GMT" }, { "version": "v2", "created": "Mon, 22 Dec 2008 11:08:37 GMT" }, { "version": "v3", "created": "Wed, 11 Feb 2009 19:54:07 GMT" } ]
2015-05-13T00:00:00
[ [ "Grant", "E.", "" ], [ "Shallit", "J.", "" ], [ "Stoll", "T.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0812.3214
Malay Dutta
Malay Dutta (Tezpur University India)
Two conjectures such that the proof of any one of them will lead to the proof that P = NP
Some minor corrections
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we define a construct called a time-graph. A complete time-graph of order n is the cartesian product of a complete graph with n vertices and a linear graph with n vertices. A time-graph of order n is given by a subset of the set of edges E(n) of such a graph. The notion of a hamiltonian time-graph is defined in a natural way and we define the Hamiltonian time-graph problem (HAMTG) as : Given a time-graph is it hamiltonian ? We show that the Hamiltonian path problem (HAMP) can be transformed to HAMTG in polynomial time. We then define certain vector spaces of functions from E(n) and E(n)xE(n) to B = {0,1}, the field of two elements and derive certain properties of these spaces. We give two conjectures about these spaces and prove that if any one of these conjectures is true, we get a polynomial time algorithm for the Hamiltonian path problem. Since the Hamiltonian path problem is NP-complete we obtain the proof of P = NP provided any one of the two conjectures is true.
[ { "version": "v1", "created": "Wed, 17 Dec 2008 07:03:53 GMT" }, { "version": "v2", "created": "Wed, 31 Dec 2008 03:53:16 GMT" } ]
2008-12-31T00:00:00
[ [ "Dutta", "Malay", "", "Tezpur University India" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0812.3226
Jocelyne Troccaz
Stefano Sclaverano (TIMC), Gr\'egoire Chevreau (TIMC), Lucile Vadcard (LSE), Pierre Mozer, Jocelyne Troccaz (TIMC)
BiopSym: a simulator for enhanced learning of ultrasound-guided prostate biopsy
null
Medecine Meets Virtual Reality, Los Angeles : \'Etats-Unis d'Am\'erique (2009)
10.3233/978-1-58603-964-6-301
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a simulator of ultrasound-guided prostate biopsies for cancer diagnosis. When performing biopsy series, the clinician has to move the ultrasound probe and to mentally integrate the real-time bi-dimensional images into a three-dimensional (3D) representation of the anatomical environment. Such a 3D representation is necessary to sample regularly the prostate in order to maximize the probability of detecting a cancer if any. To make the training of young physicians easier and faster we developed a simulator that combines images computed from three-dimensional ultrasound recorded data to haptic feedback. The paper presents the first version of this simulator.
[ { "version": "v1", "created": "Wed, 17 Dec 2008 09:22:47 GMT" } ]
2009-02-10T00:00:00
[ [ "Sclaverano", "Stefano", "", "TIMC" ], [ "Chevreau", "Grégoire", "", "TIMC" ], [ "Vadcard", "Lucile", "", "LSE" ], [ "Mozer", "Pierre", "", "TIMC" ], [ "Troccaz", "Jocelyne", "", "TIMC" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0812.3232
Raymond Louie Mr.
Raymond H. Y. Louie, Matthew R. McKay, Iain B. Collings
Maximum Sum-Rate of MIMO Multiuser Scheduling with Linear Receivers
25 pages, 8 figures, corrected typos, Subject to minor revision in IEEE Transactions on Communications
null
10.1109/TCOMM.2009.11.080210
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze scheduling algorithms for multiuser communication systems with users having multiple antennas and linear receivers. When there is no feedback of channel information, we consider a common round robin scheduling algorithm, and derive new exact and high signal-to-noise ratio (SNR) maximum sum-rate results for the maximum ratio combining (MRC) and minimum mean squared error (MMSE) receivers. We also present new analysis of MRC, zero forcing (ZF) and MMSE receivers in the low SNR regime. When there are limited feedback capabilities in the system, we consider a common practical scheduling scheme based on signal-to-interference-and-noise ratio (SINR) feedback at the transmitter. We derive new accurate approximations for the maximum sum-rate, for the cases of MRC, ZF and MMSE receivers. We also derive maximum sum-rate scaling laws, which reveal that the maximum sum-rate of all three linear receivers converge to the same value for a large number of users, but at different rates.
[ { "version": "v1", "created": "Wed, 17 Dec 2008 09:39:03 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2008 00:14:57 GMT" } ]
2016-11-18T00:00:00
[ [ "Louie", "Raymond H. Y.", "" ], [ "McKay", "Matthew R.", "" ], [ "Collings", "Iain B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.3249
Franco Milicchio
Antonio DiCarlo, Franco Milicchio, Alberto Paoluzzi, and Vadim Shapiro
Chain-Based Representations for Solid and Physical Modeling
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we show that the (co)chain complex associated with a decomposition of the computational domain, commonly called a mesh in computational science and engineering, can be represented by a block-bidiagonal matrix that we call the Hasse matrix. Moreover, we show that topology-preserving mesh refinements, produced by the action of (the simplest) Euler operators, can be reduced to multilinear transformations of the Hasse matrix representing the complex. Our main result is a new representation of the (co)chain complex underlying field computations, a representation that provides new insights into the transformations induced by local mesh refinements. Our approach is based on first principles and is general in that it applies to most representational domains that can be characterized as cell complexes, without any restrictions on their type, dimension, codimension, orientability, manifoldness, connectedness.
[ { "version": "v1", "created": "Wed, 17 Dec 2008 11:03:31 GMT" } ]
2008-12-18T00:00:00
[ [ "DiCarlo", "Antonio", "" ], [ "Milicchio", "Franco", "" ], [ "Paoluzzi", "Alberto", "" ], [ "Shapiro", "Vadim", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0812.3259
Valmir Barbosa
Rodrigo S. C. Leao, Valmir C. Barbosa
Approximate conditional distributions of distances between nodes in a two-dimensional sensor network
null
Lecture Notes in Computer Science 5513 (2009), 324-338
10.1007/978-3-642-02205-0_23
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When we represent a network of sensors in Euclidean space by a graph, there are two distances between any two nodes that we may consider. One of them is the Euclidean distance. The other is the distance between the two nodes in the graph, defined to be the number of edges on a shortest path between them. In this paper, we consider a network of sensors placed uniformly at random in a two-dimensional region and study two conditional distributions related to these distances. The first is the probability distribution of distances in the graph, conditioned on Euclidean distances; the other is the probability density function associated with Euclidean distances, conditioned on distances in the graph. We study these distributions both analytically (when feasible) and by means of simulations. To the best of our knowledge, our results constitute the first of their kind and open up the possibility of discovering improved solutions to certain sensor-network problems, as for example sensor localization.
[ { "version": "v1", "created": "Wed, 17 Dec 2008 11:23:59 GMT" } ]
2009-06-10T00:00:00
[ [ "Leao", "Rodrigo S. C.", "" ], [ "Barbosa", "Valmir C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.3285
Alina Maor
Alina Maor and Neri Merhav
On Successive Refinement for the Kaspi/Heegard-Berger Problem
Submitted to IEEE Trans. Inform. Theory, December 2008
null
null
Technical Report, CCIT Pub. no. 711, EE Pub. no. 1668, December 2008
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a source that produces independent copies of a triplet of jointly distributed random variables, $\{X_{i},Y_{i},Z_{i}\}_{i=1}^{\infty}$. The process $\{X_{i}\}$ is observed at the encoder, and is supposed to be reproduced at two decoders, where $\{Y_{i}\}$ and $\{Z_{i}\}$ are observed, in either a causal or non-causal manner. The communication between the encoder and the decoders is carried in two successive stages. In the first stage, the transmission is available to both decoders and the source is reconstructed according to the received bit-stream and the individual side information (SI). In the second stage, additional information is sent to both decoders and the source reconstructions are refined according to the transmissions at both stages and the available SI. It is desired to find the necessary and sufficient conditions on the communication rates between the encoder and decoders, so that the distortions incurred (at each stage) will not exceed given thresholds. For the case of non-degraded causal SI at the decoders, an exact single-letter characterization of the achievable region is derived for the case of pure source-coding. Then, for the case of communication carried over independent DMS's with random states known causally/non-causally at the encoder and with causal SI about the source at the decoders, a single-letter characterization of all achievable distortion in both stages is provided and it is shown that the separation theorem holds. Finally, for non-causal degraded SI, inner and outer bounds to the achievable rate-distortion region are derived. These bounds are shown to be tight for certain cases of reconstruction requirements at the decoders, thereby shading some light on the problem of successive refinement with non-degraded SI at the decoders.
[ { "version": "v1", "created": "Wed, 17 Dec 2008 13:28:52 GMT" } ]
2008-12-18T00:00:00
[ [ "Maor", "Alina", "" ], [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.3306
Travis Gagie
Travis Gagie and Yakov Nekrich
Worst-Case Optimal Adaptive Prefix Coding
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A common complaint about adaptive prefix coding is that it is much slower than static prefix coding. Karpinski and Nekrich recently took an important step towards resolving this: they gave an adaptive Shannon coding algorithm that encodes each character in (O (1)) amortized time and decodes it in (O (\log H)) amortized time, where $H$ is the empirical entropy of the input string $s$. For comparison, Gagie's adaptive Shannon coder and both Knuth's and Vitter's adaptive Huffman coders all use (\Theta (H)) amortized time for each character. In this paper we give an adaptive Shannon coder that both encodes and decodes each character in (O (1)) worst-case time. As with both previous adaptive Shannon coders, we store $s$ in at most ((H + 1) |s| + o (|s|)) bits. We also show that this encoding length is worst-case optimal up to the lower order term.
[ { "version": "v1", "created": "Wed, 17 Dec 2008 14:47:34 GMT" } ]
2008-12-18T00:00:00
[ [ "Gagie", "Travis", "" ], [ "Nekrich", "Yakov", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.3404
Olivier Leveque
Olivier Leveque, Christophe Vignat, Melda Yuksel
Diversity-Multiplexing Tradeoff for the MIMO Static Half-Duplex Relay
19 pages, 2 figures, submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we investigate the diversity-multiplexing tradeoff (DMT) of the multiple-antenna (MIMO) static half-duplex relay channel. A general expression is derived for the DMT upper bound, which can be achieved by a compress-and-forward protocol at the relay, under certain assumptions. The DMT expression is given as the solution of a minimization problem in general, and an explicit expression is found when the relay channel is symmetric in terms of number of antennas, i.e. the source and the destination have n antennas each, and the relay has m antennas. It is observed that the static half-duplex DMT matches the full-duplex DMT when the relay has a single antenna, and is strictly below the full-duplex DMT when the relay has multiple antennas. Besides, the derivation of the upper bound involves a new asymptotic study of spherical integrals (that is, integrals with respect to the Haar measure on the unitary group U(n)), which is a topic of mathematical interest in itself.
[ { "version": "v1", "created": "Wed, 17 Dec 2008 21:10:26 GMT" }, { "version": "v2", "created": "Sun, 8 Nov 2009 22:48:30 GMT" } ]
2009-11-09T00:00:00
[ [ "Leveque", "Olivier", "" ], [ "Vignat", "Christophe", "" ], [ "Yuksel", "Melda", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.3429
Dmytro Gavinsky
Dmytro Gavinsky
Quantum Predictive Learning and Communication Complexity with Single Input
null
null
null
null
quant-ph cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define a new model of quantum learning that we call Predictive Quantum (PQ). This is a quantum analogue of PAC, where during the testing phase the student is only required to answer a polynomial number of testing queries. We demonstrate a relational concept class that is efficiently learnable in PQ, while in any "reasonable" classical model exponential amount of training data would be required. This is the first unconditional separation between quantum and classical learning. We show that our separation is the best possible in several ways; in particular, there is no analogous result for a functional class, as well as for several weaker versions of quantum learning. In order to demonstrate tightness of our separation we consider a special case of one-way communication that we call single-input mode, where Bob receives no input. Somewhat surprisingly, this setting becomes nontrivial when relational communication tasks are considered. In particular, any problem with two-sided input can be transformed into a single-input relational problem of equal classical one-way cost. We show that the situation is different in the quantum case, where the same transformation can make the communication complexity exponentially larger. This happens if and only if the original problem has exponential gap between quantum and classical one-way communication costs. We believe that these auxiliary results might be of independent interest.
[ { "version": "v1", "created": "Wed, 17 Dec 2008 22:46:18 GMT" }, { "version": "v2", "created": "Thu, 4 Feb 2010 05:06:20 GMT" }, { "version": "v3", "created": "Thu, 15 Mar 2012 03:31:18 GMT" } ]
2022-03-29T00:00:00
[ [ "Gavinsky", "Dmytro", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.3447
Chris Ng
Chris T. K. Ng, Muriel Medard, Asuman Ozdaglar
Completion Time Minimization and Robust Power Control in Wireless Packet Networks
16 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A wireless packet network is considered in which each user transmits a stream of packets to its destination. The transmit power of each user interferes with the transmission of all other users. A convex cost function of the completion times of the user packets is minimized by optimally allocating the users' transmission power subject to their respective power constraints. At all ranges of SINR, completion time minimization can be formulated as a convex optimization problem and hence can be efficiently solved. In particular, although the feasible rate region of the wireless network is non-convex, its corresponding completion time region is shown to be convex. When channel knowledge is imperfect, robust power control is considered based on the channel fading distribution subject to outage probability constraints. The problem is shown to be convex when the fading distribution is log-concave in exponentiated channel power gains; e.g., when each user is under independent Rayleigh, Nakagami, or log-normal fading. Applying the optimization frameworks in a wireless cellular network, the average completion time is significantly reduced as compared to full power transmission.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 02:30:56 GMT" }, { "version": "v2", "created": "Tue, 5 Apr 2011 05:38:49 GMT" } ]
2011-04-06T00:00:00
[ [ "Ng", "Chris T. K.", "" ], [ "Medard", "Muriel", "" ], [ "Ozdaglar", "Asuman", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.3465
Paat Rusmevichientong
Paat Rusmevichientong and John N. Tsitsiklis
Linearly Parameterized Bandits
40 pages; updated results and references
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider bandit problems involving a large (possibly infinite) collection of arms, in which the expected reward of each arm is a linear function of an $r$-dimensional random vector $\mathbf{Z} \in \mathbb{R}^r$, where $r \geq 2$. The objective is to minimize the cumulative regret and Bayes risk. When the set of arms corresponds to the unit sphere, we prove that the regret and Bayes risk is of order $\Theta(r \sqrt{T})$, by establishing a lower bound for an arbitrary policy, and showing that a matching upper bound is obtained through a policy that alternates between exploration and exploitation phases. The phase-based policy is also shown to be effective if the set of arms satisfies a strong convexity condition. For the case of a general set of arms, we describe a near-optimal policy whose regret and Bayes risk admit upper bounds of the form $O(r \sqrt{T} \log^{3/2} T)$.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 07:59:33 GMT" }, { "version": "v2", "created": "Wed, 24 Feb 2010 15:54:49 GMT" } ]
2010-02-24T00:00:00
[ [ "Rusmevichientong", "Paat", "" ], [ "Tsitsiklis", "John N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.3478
Wilson Wong
Wilson Wong, Wei Liu, Saujoe Liaw, Nicoletta Balliu, Hongwei Wu, Moses Tade
Automatic Construction of Lightweight Domain Ontologies for Chemical Engineering Risk Management
In the Proceedings of the 11th Conference on Process Integration, Modelling and Optimisation for Energy Saving and Pollution Reduction (PRES), Prague, Czech Rep., August, 2008
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The need for domain ontologies in mission critical applications such as risk management and hazard identification is becoming more and more pressing. Most research on ontology learning conducted in the academia remains unrealistic for real-world applications. One of the main problems is the dependence on non-incremental, rare knowledge and textual resources, and manually-crafted patterns and rules. This paper reports work in progress aiming to address such undesirable dependencies during ontology construction. Initial experiments using a working prototype of the system revealed promising potentials in automatically constructing high-quality domain ontologies using real-world texts.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 08:58:52 GMT" } ]
2008-12-19T00:00:00
[ [ "Wong", "Wilson", "" ], [ "Liu", "Wei", "" ], [ "Liaw", "Saujoe", "" ], [ "Balliu", "Nicoletta", "" ], [ "Wu", "Hongwei", "" ], [ "Tade", "Moses", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.3550
Pierre Genev\`es
Pierre Geneves and Nabil Layaida
XML Static Analyzer User Manual
null
null
null
RR-6726
cs.PL cs.DB cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This document describes how to use the XML static analyzer in practice. It provides informal documentation for using the XML reasoning solver implementation. The solver allows automated verification of properties that are expressed as logical formulas over trees. A logical formula may for instance express structural constraints or navigation properties (like e.g. path existence and node selection) in finite trees. Logical formulas can be expressed using the syntax of XPath expressions, DTD, XML Schemas, and Relax NG definitions.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 15:22:46 GMT" } ]
2008-12-19T00:00:00
[ [ "Geneves", "Pierre", "" ], [ "Layaida", "Nabil", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0812.3563
Laurent Romary
Laurent Romary (LORIA)
Questions & Answers for TEI Newcomers
null
Jahrbuch f\"ur Computerphilologie 10 (2009)
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides an introduction to the Text Encoding Initia-tive (TEI), focused at bringing in newcomers who have to deal with a digital document project and are looking at the capacity that the TEI environment may have to fulfil his needs. To this end, we avoid a strictly technical presentation of the TEI and concentrate on the actual issues that such projects face, with parallel made on the situation within two institutions. While a quick walkthrough the TEI technical framework is provided, the papers ends up by showing the essential role of the community in the actual technical contributions that are being brought to the TEI.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 15:51:17 GMT" }, { "version": "v2", "created": "Mon, 26 Jan 2009 09:51:37 GMT" } ]
2009-01-26T00:00:00
[ [ "Romary", "Laurent", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0812.3593
Sergio Caracciolo
Sergio Caracciolo, Gregor Masbaum, Alan D. Sokal, Andrea Sportiello
A randomized polynomial-time algorithm for the Spanning Hypertree Problem on 3-uniform hypergraphs
6 pages, 1 figure
null
null
null
cs.CC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider the problem of determining whether there exists a spanning hypertree in a given k-uniform hypergraph. This problem is trivially in P for k=2, and is NP-complete for k>= 4, whereas for k=3, there exists a polynomial-time algorithm based on Lovasz' theory of polymatroid matching. Here we give a completely different, randomized polynomial-time algorithm in the case k=3. The main ingredients are a Pfaffian formula by Vaintrob and one of the authors (G.M.) for a polynomial that enumerates spanning hypertrees with some signs, and a lemma on the number of roots of polynomials over a finite field.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 17:17:33 GMT" } ]
2008-12-19T00:00:00
[ [ "Caracciolo", "Sergio", "" ], [ "Masbaum", "Gregor", "" ], [ "Sokal", "Alan D.", "" ], [ "Sportiello", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0812.3632
Krzysztof Szajowski
Wojciech Sarnowski, Krzysztof Szajowski
Optimal detection of homogeneous segment of observations in stochastic sequence
13 pages
Stochastics An International Journal of Probability and Stochastic Processes, Vol. 83, Issue 4-6, 2011, pp. 569-581
10.1080/17442508.2010.540015
Institute of Mathematics, Polish Academy of Science 696
math.PR cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Markov process is registered. At random moment $\theta$ the distribution of observed sequence changes. Using probability maximizing approach the optimal stopping rule for detecting the change is identified. Some explicit solution is obtained.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 19:50:00 GMT" }, { "version": "v2", "created": "Wed, 4 Feb 2009 05:43:02 GMT" }, { "version": "v3", "created": "Sun, 13 Dec 2009 17:42:58 GMT" } ]
2020-11-23T00:00:00
[ [ "Sarnowski", "Wojciech", "" ], [ "Szajowski", "Krzysztof", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0812.3642
Deniz Gunduz
Deniz Gunduz, Andrea Goldsmith, H. Vincent Poor
MIMO Two-way Relay Channel: Diversity-Multiplexing Tradeoff Analysis
Presented at the Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, Oct. 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A multi-hop two-way relay channel is considered in which all the terminals are equipped with multiple antennas. Assuming independent quasi-static Rayleigh fading channels and channel state information available at the receivers, we characterize the optimal diversity-multiplexing gain tradeoff (DMT) curve for a full-duplex relay terminal. It is shown that the optimal DMT can be achieved by a compress-and-forward type relaying strategy in which the relay quantizes its received signal and transmits the corresponding channel codeword. It is noteworthy that, with this transmission protocol, the two transmissions in opposite directions can achieve their respective single user optimal DMT performances simultaneously, despite the interference they cause to each other. Motivated by the optimality of this scheme in the case of the two-way relay channel, a novel dynamic compress-and-forward (DCF) protocol is proposed for the one-way multi-hop MIMO relay channel for a half-duplex relay terminal, and this scheme is shown to achieve the optimal DMT performance.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 20:25:14 GMT" } ]
2008-12-19T00:00:00
[ [ "Gunduz", "Deniz", "" ], [ "Goldsmith", "Andrea", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]