id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0812.3648 | Mehdi Bahrami | Mehdi Bahrami | A New Method for Knowledge Representation in Expert System's (XMLKR) | IEEE Procceding 2008 | Emerging Trends in Engineering and Technology, 2008. ICETET '08.
First International Conference, IEEE | 10.1109/ICETET.2008.194 | null | cs.DC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowledge representation it is an essential section of a Expert Systems,
Because in this section we have a framework to establish an expert system then
we can modeling and use by this to design an expert system. Many method it is
exist for knowledge representation but each method have problems, in this paper
we introduce a new method of object oriented by XML language as XMLKR to
knowledge representation, and we want to discuss advantage and disadvantage of
this method.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2008 20:39:48 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Bahrami",
"Mehdi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.3677 | Sam Payne | Sam Payne and Elina Robeva | Artificial intelligence for Bidding Hex | 7 pages, 2 figures | Games of No Chance 4, MSRI Publications 63 (2015), 207-214 | null | null | math.CO cs.GT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a Monte Carlo algorithm for efficiently finding near optimal moves
and bids in the game of Bidding Hex. The algorithm is based on the recent
solution of Random-Turn Hex by Peres, Schramm, Sheffield, and Wilson together
with Richman's work connecting random-turn games to bidding games.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2008 23:04:10 GMT"
}
]
| 2016-04-19T00:00:00 | [
[
"Payne",
"Sam",
""
],
[
"Robeva",
"Elina",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0812.3702 | Michael Mahoney | Michael W. Mahoney, Lek-Heng Lim, and Gunnar E. Carlsson | Algorithmic and Statistical Challenges in Modern Large-Scale Data
Analysis are the Focus of MMDS 2008 | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The 2008 Workshop on Algorithms for Modern Massive Data Sets (MMDS 2008),
sponsored by the NSF, DARPA, LinkedIn, and Yahoo!, was held at Stanford
University, June 25--28. The goals of MMDS 2008 were (1) to explore novel
techniques for modeling and analyzing massive, high-dimensional, and
nonlinearly-structured scientific and internet data sets; and (2) to bring
together computer scientists, statisticians, mathematicians, and data analysis
practitioners to promote cross-fertilization of ideas.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2008 03:53:03 GMT"
}
]
| 2008-12-22T00:00:00 | [
[
"Mahoney",
"Michael W.",
""
],
[
"Lim",
"Lek-Heng",
""
],
[
"Carlsson",
"Gunnar E.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.3709 | Chris Ng | Chris T. K. Ng, Chao Tian, Andrea J. Goldsmith, Shlomo Shamai (Shitz) | Minimum Expected Distortion in Gaussian Source Coding with Fading Side
Information | 24 pages, 10 figures | IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5725-5739, Sep. 2012 | 10.1109/TIT.2012.2204476 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An encoder, subject to a rate constraint, wishes to describe a Gaussian
source under squared error distortion. The decoder, besides receiving the
encoder's description, also observes side information consisting of
uncompressed source symbol subject to slow fading and noise. The decoder knows
the fading realization but the encoder knows only its distribution. The
rate-distortion function that simultaneously satisfies the distortion
constraints for all fading states was derived by Heegard and Berger. A layered
encoding strategy is considered in which each codeword layer targets a given
fading state. When the side-information channel has two discrete fading states,
the expected distortion is minimized by optimally allocating the encoding rate
between the two codeword layers. For multiple fading states, the minimum
expected distortion is formulated as the solution of a convex optimization
problem with linearly many variables and constraints. Through a limiting
process on the primal and dual solutions, it is shown that single-layer rate
allocation is optimal when the fading probability density function is
continuous and quasiconcave (e.g., Rayleigh, Rician, Nakagami, and log-normal).
In particular, under Rayleigh fading, the optimal single codeword layer targets
the least favorable state as if the side information was absent.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2008 06:41:19 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Apr 2010 22:55:00 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Nov 2011 04:11:30 GMT"
},
{
"version": "v4",
"created": "Tue, 22 May 2012 15:48:36 GMT"
}
]
| 2013-05-10T00:00:00 | [
[
"Ng",
"Chris T. K.",
"",
"Shitz"
],
[
"Tian",
"Chao",
"",
"Shitz"
],
[
"Goldsmith",
"Andrea J.",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.3715 | Aurelie Bissay | Aur\'elie Bissay (LIESP), Philippe Pernelle (LIESP), Arnaud Lefebvre
(LIESP), Abdelaziz Bouras (LIESP) | Business processes integration and performance indicators in a PLM | null | APMS'08, Espoo : Finlande (2008) | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In an economic environment more and more competitive, the effective
management of information and knowledge is a strategic issue for industrial
enterprises. In the global marketplace, companies must use reactive strategies
and reduce their products development cycle. In this context, the PLM (Product
Lifecycle Management) is considered as a key component of the information
system. The aim of this paper is to present an approach to integrate Business
Processes in a PLM system. This approach is implemented in automotive sector
with second-tier subcontractor
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2008 07:52:46 GMT"
}
]
| 2008-12-22T00:00:00 | [
[
"Bissay",
"Aurélie",
"",
"LIESP"
],
[
"Pernelle",
"Philippe",
"",
"LIESP"
],
[
"Lefebvre",
"Arnaud",
"",
"LIESP"
],
[
"Bouras",
"Abdelaziz",
"",
"LIESP"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0812.3716 | Ismael Bouassida Rodriguez | Ismael Bouassida Rodriguez (LAAS), Khalil DRIRA (LAAS), Christophe
Chassot (LAAS), Mohamed Jmaiel (ReDCAD) | Context-aware adaptation for group communication support applications
with dynamic architecture | null | System and Information Sciences Notes 2, 1 (2007) 88 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a refinement-based adaptation approach for the
architecture of distributed group communication support applications. Unlike
most of previous works, our approach reaches implementable, context-aware and
dynamically adaptable architectures. To model the context, we manage
simultaneously four parameters that influence Qos provided by the application.
These parameters are: the available bandwidth, the exchanged data communication
priority, the energy level and the available memory for processing. These
parameters make it possible to refine the choice between the various
architectural configurations when passing from a given abstraction level to the
lower level which implements it. Our approach allows the importance degree
associated with each parameter to be adapted dynamically. To implement
adaptation, we switch between the various configurations of the same level, and
we modify the state of the entities of a given configuration when necessary. We
adopt the direct and mediated Producer- Consumer architectural styles and
graphs for architecture modelling. In order to validate our approach we
elaborate a simulation model.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2008 07:53:12 GMT"
}
]
| 2008-12-22T00:00:00 | [
[
"Rodriguez",
"Ismael Bouassida",
"",
"LAAS"
],
[
"DRIRA",
"Khalil",
"",
"LAAS"
],
[
"Chassot",
"Christophe",
"",
"LAAS"
],
[
"Jmaiel",
"Mohamed",
"",
"ReDCAD"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0812.3719 | Philippe Roose | Christine Louberry (LIUPPA), Marc Dalmau (LIUPPA), Philippe Roose
(LIUPPA) | Architecture Logicielles pour des Applications h\'et\'erog\`enes,
distribu\'ees et reconfigurables | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The recent apparition of mobile wireless sensor aware to their physical
environment and able to process information must allow proposing applications
able to take into account their physical context and to react according to the
changes of the environment. It suppose to design applications integrating both
software and hardware components able to communicate. Applications must use
context information from components to measure the quality of the proposed
services in order to adapt them in real time. This work is interested in the
integration of sensors in distributed applications. It present a service
oriented software architecture allowing to manage and to reconfigure
applications in heterogeneous environment where entities of different nature
collaborate: software components and wireless sensors.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2008 08:03:21 GMT"
}
]
| 2008-12-22T00:00:00 | [
[
"Louberry",
"Christine",
"",
"LIUPPA"
],
[
"Dalmau",
"Marc",
"",
"LIUPPA"
],
[
"Roose",
"Philippe",
"",
"LIUPPA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0812.3742 | Vasanthan Raghavan | Vasanthan Raghavan, Venugopal V. Veeravalli | Quickest Change Detection of a Markov Process Across a Sensor Array | 40 pages, 5 figures, Submitted to IEEE Trans. Inform. Theory | null | 10.1109/TIT.2010.2040869 | null | cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent attention in quickest change detection in the multi-sensor setting has
been on the case where the densities of the observations change at the same
instant at all the sensors due to the disruption. In this work, a more general
scenario is considered where the change propagates across the sensors, and its
propagation can be modeled as a Markov process. A centralized, Bayesian version
of this problem, with a fusion center that has perfect information about the
observations and a priori knowledge of the statistics of the change process, is
considered. The problem of minimizing the average detection delay subject to
false alarm constraints is formulated as a partially observable Markov decision
process (POMDP). Insights into the structure of the optimal stopping rule are
presented. In the limiting case of rare disruptions, we show that the structure
of the optimal test reduces to thresholding the a posteriori probability of the
hypothesis that no change has happened. We establish the asymptotic optimality
(in the vanishing false alarm probability regime) of this threshold test under
a certain condition on the Kullback-Leibler (K-L) divergence between the post-
and the pre-change densities. In the special case of near-instantaneous change
propagation across the sensors, this condition reduces to the mild condition
that the K-L divergence be positive. Numerical studies show that this low
complexity threshold test results in a substantial improvement in performance
over naive tests such as a single-sensor test or a test that wrongly assumes
that the change propagates instantaneously.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2008 10:08:48 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Raghavan",
"Vasanthan",
""
],
[
"Veeravalli",
"Venugopal V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0812.3788 | Michael Schmidt | Michael Schmidt, Michael Meier, Georg Lausen | Foundations of SPARQL Query Optimization | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The SPARQL query language is a recent W3C standard for processing RDF data, a
format that has been developed to encode information in a machine-readable way.
We investigate the foundations of SPARQL query optimization and (a) provide
novel complexity results for the SPARQL evaluation problem, showing that the
main source of complexity is operator OPTIONAL alone; (b) propose a
comprehensive set of algebraic query rewriting rules; (c) present a framework
for constraint-based SPARQL optimization based upon the well-known chase
procedure for Conjunctive Query minimization. In this line, we develop two
novel termination conditions for the chase. They subsume the strongest
conditions known so far and do not increase the complexity of the recognition
problem, thus making a larger class of both Conjunctive and SPARQL queries
amenable to constraint-based optimization. Our results are of immediate
practical interest and might empower any SPARQL query optimizer.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2008 13:51:57 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jan 2009 12:52:36 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Schmidt",
"Michael",
""
],
[
"Meier",
"Michael",
""
],
[
"Lausen",
"Georg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0812.3836 | Lutz Schr\"oder | Lutz Schr\"oder | Bootstrapping Inductive and Coinductive Types in HasCASL | null | Logical Methods in Computer Science, Volume 4, Issue 4 (December
25, 2008) lmcs:1166 | 10.2168/LMCS-4(4:17)2008 | null | cs.LO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss the treatment of initial datatypes and final process types in the
wide-spectrum language HasCASL. In particular, we present specifications that
illustrate how datatypes and process types arise as bootstrapped concepts using
HasCASL's type class mechanism, and we describe constructions of types of
finite and infinite trees that establish the conservativity of datatype and
process type declarations adhering to certain reasonable formats. The latter
amounts to modifying known constructions from HOL to avoid unique choice; in
categorical terminology, this means that we establish that quasitoposes with an
internal natural numbers object support initial algebras and final coalgebras
for a range of polynomial functors, thereby partially generalising
corresponding results from topos theory. Moreover, we present similar
constructions in categories of internal complete partial orders in
quasitoposes.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2008 16:22:15 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Dec 2008 18:36:36 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Schröder",
"Lutz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0812.3871 | Nuno Alves | Nuno Alves | Decting Errors in Reversible Circuits With Invariant Relationships | null | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reversible logic is experience renewed interest as we are approach the limits
of CMOS technologies. While physical implementations of reversible gates have
yet to materialize, it is safe to assume that they will rely on faulty
individual components. In this work we present a present a method to provide
fault tolerance to a reversible circuit based on invariant relationships.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2008 18:14:54 GMT"
}
]
| 2008-12-22T00:00:00 | [
[
"Alves",
"Nuno",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
]
|
0812.3873 | Li Chia Choo | Li-Chia Choo, Kai-Kit Wong | The K-Receiver Broadcast Channel with Confidential Messages | 19 pages, 1 figure, submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The secrecy capacity region for the K-receiver degraded broadcast channel
(BC) is given for confidential messages sent to the receivers and to be kept
secret from an external wiretapper. Superposition coding and Wyner's random
code partitioning are used to show the achievable rate tuples. Error
probability analysis and equivocation calculation are also provided. In the
converse proof, a new definition for the auxiliary random variables is used,
which is different from either the case of the 2-receiver BC without common
message or the K-receiver BC with common message, both with an external
wiretapper; or the K-receiver BC without a wiretapper.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2008 18:15:52 GMT"
}
]
| 2008-12-22T00:00:00 | [
[
"Choo",
"Li-Chia",
""
],
[
"Wong",
"Kai-Kit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.3890 | Raviraj Adve | Elzbieta Beres and Raviraj Adve | Optimal Relay-Subset Selection and Time-Allocation in Decode-and-Forward
Cooperative Networks | Submitted to IEEE Trans. on Wirless Comm., Dec. 19th 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the optimal relay-subset selection and transmission-time for a
decode-and-forward, half-duplex cooperative network of arbitrary size. The
resource allocation is obtained by maximizing over the rates obtained for each
possible subset of active relays, and the unique time allocation for each set
can be obtained by solving a linear system of equations. We also present a
simple recursive algorithm for the optimization problem which reduces the
computational load of finding the required matrix inverses, and reduces the
number of required iterations. Our results, in terms of outage rate, confirm
the benefit of adding potential relays to a small network and the diminishing
marginal returns for a larger network. We also show that optimizing over the
channel resources ensures that more relays are active over a larger SNR range,
and that linear network constellations significantly outperform grid
constellations. Through simulations, the optimization is shown to be robust to
node numbering.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2008 20:39:10 GMT"
}
]
| 2008-12-22T00:00:00 | [
[
"Beres",
"Elzbieta",
""
],
[
"Adve",
"Raviraj",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.3893 | Darren Strash | Michael T. Goodrich and Darren Strash | Succinct Greedy Geometric Routing in the Euclidean Plane | 19 pages, 5 figures. To appear at 20th International Symposium on
Algorithms and Computation (ISAAC 2009) | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In greedy geometric routing, messages are passed in a network embedded in a
metric space according to the greedy strategy of always forwarding messages to
nodes that are closer to the destination. We show that greedy geometric routing
schemes exist for the Euclidean metric in R^2, for 3-connected planar graphs,
with coordinates that can be represented succinctly, that is, with O(log n)
bits, where n is the number of vertices in the graph. Moreover, our embedding
strategy introduces a coordinate system for R^2 that supports distance
comparisons using our succinct coordinates. Thus, our scheme can be used to
significantly reduce bandwidth, space, and header size over other recently
discovered greedy geometric routing implementations for R^2.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2008 20:42:33 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Apr 2009 21:57:33 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Oct 2009 19:05:10 GMT"
}
]
| 2009-10-02T00:00:00 | [
[
"Goodrich",
"Michael T.",
""
],
[
"Strash",
"Darren",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0812.3933 | Masud Hasan | Masud Hasan, Atif Rahman, M. Sohel Rahman, Mahfuza Sharmin, and
Rukhsana Yeasmin | Pancake Flipping with Two Spatulas | 10 pages, 3 figures | null | null | null | cs.DS cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study several variations of the \emph{pancake flipping
problem}, which is also well known as the problem of \emph{sorting by prefix
reversals}. We consider the variations in the sorting process by adding with
prefix reversals other similar operations such as prefix transpositions and
prefix transreversals. These type of sorting problems have applications in
interconnection networks and computational biology. We first study the problem
of sorting unsigned permutations by prefix reversals and prefix transpositions
and present a 3-approximation algorithm for this problem. Then we give a
2-approximation algorithm for sorting by prefix reversals and prefix
transreversals. We also provide a 3-approximation algorithm for sorting by
prefix reversals and prefix transpositions where the operations are always
applied at the unsorted suffix of the permutation. We further analyze the
problem in more practical way and show quantitatively how approximation ratios
of our algorithms improve with the increase of number of prefix reversals
applied by optimal algorithms. Finally, we present experimental results to
support our analysis.
| [
{
"version": "v1",
"created": "Sat, 20 Dec 2008 03:10:11 GMT"
},
{
"version": "v2",
"created": "Mon, 4 May 2009 12:06:02 GMT"
}
]
| 2009-05-04T00:00:00 | [
[
"Hasan",
"Masud",
""
],
[
"Rahman",
"Atif",
""
],
[
"Rahman",
"M. Sohel",
""
],
[
"Sharmin",
"Mahfuza",
""
],
[
"Yeasmin",
"Rukhsana",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0812.3946 | Stephane Vialette | Guillaume Blin (IGM), Sylvie Hamel (DIRO), St\'ephane Vialette (IGM) | Comparing RNA structures using a full set of biologically relevant edit
operations is intractable | 7 pages | null | null | null | cs.DS q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Arc-annotated sequences are useful for representing structural information of
RNAs and have been extensively used for comparing RNA structures in both terms
of sequence and structural similarities. Among the many paradigms referring to
arc-annotated sequences and RNA structures comparison (see
\cite{IGMA_BliDenDul08} for more details), the most important one is the
general edit distance. The problem of computing an edit distance between two
non-crossing arc-annotated sequences was introduced in \cite{Evans99}. The
introduced model uses edit operations that involve either single letters or
pairs of letters (never considered separately) and is solvable in
polynomial-time \cite{ZhangShasha:1989}. To account for other possible RNA
structural evolutionary events, new edit operations, allowing to consider
either silmutaneously or separately letters of a pair were introduced in
\cite{jiangli}; unfortunately at the cost of computational tractability. It has
been proved that comparing two RNA secondary structures using a full set of
biologically relevant edit operations is {\sf\bf NP}-complete. Nevertheless, in
\cite{DBLP:conf/spire/GuignonCH05}, the authors have used a strong
combinatorial restriction in order to compare two RNA stem-loops with a full
set of biologically relevant edit operations; which have allowed them to design
a polynomial-time and space algorithm for comparing general secondary RNA
structures. In this paper we will prove theoretically that comparing two RNA
structures using a full set of biologically relevant edit operations cannot be
done without strong combinatorial restrictions.
| [
{
"version": "v1",
"created": "Sat, 20 Dec 2008 08:04:25 GMT"
}
]
| 2008-12-23T00:00:00 | [
[
"Blin",
"Guillaume",
"",
"IGM"
],
[
"Hamel",
"Sylvie",
"",
"DIRO"
],
[
"Vialette",
"Stéphane",
"",
"IGM"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0812.4009 | Joshua Herman J | Joshua Herman, Keith David Pedersen | Graph Field Automata | totally wrong doesn't make any sense would like to widthdraw | null | null | null | cs.CC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The Graph Automata have been the paradigm in the expression of utilizing
Graphs as a language. Matrix Graph grammars \cite{Pedro} are an algebratization
of graph rewriting systems. Here we present the dual of this formalizm which
some extensions which we term Graph Field Automata The advantage to this
approach is a framework for expressing machines that can use Matrix Graph
Grammars.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2008 00:26:29 GMT"
},
{
"version": "v10",
"created": "Mon, 12 Jan 2009 08:00:08 GMT"
},
{
"version": "v11",
"created": "Sun, 18 Jan 2009 19:06:52 GMT"
},
{
"version": "v12",
"created": "Thu, 22 Jan 2009 05:51:57 GMT"
},
{
"version": "v13",
"created": "Mon, 26 Jan 2009 06:32:26 GMT"
},
{
"version": "v14",
"created": "Fri, 30 Jan 2009 00:54:13 GMT"
},
{
"version": "v15",
"created": "Tue, 3 Feb 2009 19:59:22 GMT"
},
{
"version": "v16",
"created": "Fri, 6 Feb 2009 17:58:09 GMT"
},
{
"version": "v17",
"created": "Tue, 10 Feb 2009 23:22:46 GMT"
},
{
"version": "v18",
"created": "Wed, 22 Apr 2009 06:08:47 GMT"
},
{
"version": "v19",
"created": "Sun, 24 Jan 2010 20:37:40 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Dec 2008 17:02:51 GMT"
},
{
"version": "v20",
"created": "Fri, 17 Jul 2015 12:25:25 GMT"
},
{
"version": "v21",
"created": "Fri, 4 Dec 2015 21:25:16 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Dec 2008 02:35:21 GMT"
},
{
"version": "v4",
"created": "Sat, 27 Dec 2008 23:48:21 GMT"
},
{
"version": "v5",
"created": "Fri, 2 Jan 2009 15:26:09 GMT"
},
{
"version": "v6",
"created": "Mon, 5 Jan 2009 13:00:13 GMT"
},
{
"version": "v7",
"created": "Tue, 6 Jan 2009 04:02:23 GMT"
},
{
"version": "v8",
"created": "Wed, 7 Jan 2009 06:42:44 GMT"
},
{
"version": "v9",
"created": "Thu, 8 Jan 2009 15:56:42 GMT"
}
]
| 2015-12-08T00:00:00 | [
[
"Herman",
"Joshua",
""
],
[
"Pedersen",
"Keith David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0812.4012 | Abbas Alhakim | Abbas Alhakim and Mufutau Akinwande | De Bruijn Graph Homomorphisms and Recursive De Bruijn Sequences | 15 pages, 1 figure, 2 tables, submitted | null | null | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a method to find new De Bruijn cycles based on ones of
lesser order. This is done by mapping a De Bruijn cycle to several vertex
disjoint cycles in a De Bruijn digraph of higher order and connecting these
cycles into one full cycle. We characterize homomorphisms between De Bruijn
digraphs of different orders that allow this construction. These maps
generalize the well-known D-morphism of Lempel between De Bruijn digraphs of
consecutive orders. Also, an efficient recursive algorithm that yields an
exponential number of nonbinary De Bruijn cycles is implemented.
| [
{
"version": "v1",
"created": "Sun, 21 Dec 2008 03:58:22 GMT"
}
]
| 2008-12-23T00:00:00 | [
[
"Alhakim",
"Abbas",
""
],
[
"Akinwande",
"Mufutau",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4044 | John Langford | Alina Beygelzimer and John Langford | The Offset Tree for Learning with Partial Labels | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | We present an algorithm, called the Offset Tree, for learning to make
decisions in situations where the payoff of only one choice is observed, rather
than all choices. The algorithm reduces this setting to binary classification,
allowing one to reuse of any existing, fully supervised binary classification
algorithm in this partial information setting. We show that the Offset Tree is
an optimal reduction to binary classification. In particular, it has regret at
most $(k-1)$ times the regret of the binary classifier it uses (where $k$ is
the number of choices), and no reduction to binary classification can do
better. This reduction is also computationally optimal, both at training and
test time, requiring just $O(\log_2 k)$ work to train on an example or make a
prediction.
Experiments with the Offset Tree show that it generally performs better than
several alternative approaches.
| [
{
"version": "v1",
"created": "Sun, 21 Dec 2008 17:45:27 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Feb 2009 01:48:33 GMT"
},
{
"version": "v3",
"created": "Sun, 3 Apr 2016 21:41:38 GMT"
}
]
| 2016-04-05T00:00:00 | [
[
"Beygelzimer",
"Alina",
""
],
[
"Langford",
"John",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.4073 | Andreas Noack | Andreas Noack, Randolf Rotta | Multi-level algorithms for modularity clustering | 12 pages, 10 figures, see
http://www.informatik.tu-cottbus.de/~rrotta/ for downloading the graph
clustering software | Proceedings of the 8th International Symposium on Experimental
Algorithms (SEA 2009). Lecture Notes in Computer Science 5526, Springer
(2009) 257-268 | null | null | cs.DS cond-mat.stat-mech cs.DM physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modularity is one of the most widely used quality measures for graph
clusterings. Maximizing modularity is NP-hard, and the runtime of exact
algorithms is prohibitive for large graphs. A simple and effective class of
heuristics coarsens the graph by iteratively merging clusters (starting from
singletons), and optionally refines the resulting clustering by iteratively
moving individual vertices between clusters. Several heuristics of this type
have been proposed in the literature, but little is known about their relative
performance.
This paper experimentally compares existing and new coarsening- and
refinement-based heuristics with respect to their effectiveness (achieved
modularity) and efficiency (runtime). Concerning coarsening, it turns out that
the most widely used criterion for merging clusters (modularity increase) is
outperformed by other simple criteria, and that a recent algorithm by Schuetz
and Caflisch is no improvement over simple greedy coarsening for these
criteria. Concerning refinement, a new multi-level algorithm is shown to
produce significantly better clusterings than conventional single-level
algorithms. A comparison with published benchmark results and algorithm
implementations shows that combinations of coarsening and multi-level
refinement are competitive with the best algorithms in the literature.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2008 15:32:10 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Dec 2008 21:56:37 GMT"
}
]
| 2009-09-22T00:00:00 | [
[
"Noack",
"Andreas",
""
],
[
"Rotta",
"Randolf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0812.4170 | Jose Gallardo | Jose E. Gallardo, Carlos Cotta, Antonio J. Fernandez | Finding Still Lifes with Memetic/Exact Hybrid Algorithms | null | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The maximum density still life problem (MDSLP) is a hard constraint
optimization problem based on Conway's game of life. It is a prime example of
weighted constrained optimization problem that has been recently tackled in the
constraint-programming community. Bucket elimination (BE) is a complete
technique commonly used to solve this kind of constraint satisfaction problem.
When the memory required to apply BE is too high, a heuristic method based on
it (denominated mini-buckets) can be used to calculate bounds for the optimal
solution. Nevertheless, the curse of dimensionality makes these techniques
unpractical for large size problems. In response to this situation, we present
a memetic algorithm for the MDSLP in which BE is used as a mechanism for
recombining solutions, providing the best possible child from the parental set.
Subsequently, a multi-level model in which this exact/metaheuristic hybrid is
further hybridized with branch-and-bound techniques and mini-buckets is
studied. Extensive experimental results analyze the performance of these models
and multi-parent recombination. The resulting algorithm consistently finds
optimal patterns for up to date solved instances in less time than current
approaches. Moreover, it is shown that this proposal provides new best known
solutions for very large instances.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2008 13:09:11 GMT"
}
]
| 2008-12-23T00:00:00 | [
[
"Gallardo",
"Jose E.",
""
],
[
"Cotta",
"Carlos",
""
],
[
"Fernandez",
"Antonio J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.4171 | Martin Dyer | Andrei Bulatov, Martin Dyer, Leslie Ann Goldberg, Markus Jalsenius and
David Richerby | The Complexity of Weighted Boolean #CSP with Mixed Signs | 24 pages | null | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a complexity dichotomy for the problem of computing the partition
function of a weighted Boolean constraint satisfaction problem. Such a problem
is parameterized by a set of rational-valued functions, which generalize
constraints. Each function assigns a weight to every assignment to a set of
Boolean variables. Our dichotomy extends previous work in which the weight
functions were restricted to being non-negative. We represent a weight function
as a product of the form (-1)^s g, where the polynomial s determines the sign
of the weight and the non-negative function g determines its magnitude. We show
that the problem of computing the partition function (the sum of the weights of
all possible variable assignments) is in polynomial time if either every weight
function can be defined by a "pure affine" magnitude with a quadratic sign
polynomial or every function can be defined by a magnitude of "product type"
with a linear sign polynomial. In all other cases, computing the partition
function is FP^#P-complete.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2008 12:56:42 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jun 2009 15:30:25 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Bulatov",
"Andrei",
""
],
[
"Dyer",
"Martin",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Jalsenius",
"Markus",
""
],
[
"Richerby",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.4181 | Azzedine Benameur | Azzedine Benameur, Faisal Abdul Kadir, Serge Fenet | XML Rewriting Attacks: Existing Solutions and their Limitations | null | IADIS Applied Computing 2008 | null | null | cs.CR cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Web Services are web-based applications made available for web users or
remote Web-based programs. In order to promote interoperability, they publish
their interfaces in the so-called WSDL file and allow remote call over the
network. Although Web Services can be used in different ways, the industry
standard is the Service Oriented Architecture Web Services that doesn't rely on
the implementation details. In this architecture, communication is performed
through XML-based messages called SOAP messages. However, those messages are
prone to attacks that can lead to code injection, unauthorized accesses,
identity theft, etc. This type of attacks, called XML Rewriting Attacks, are
all based on unauthorized, yet possible, modifications of SOAP messages. We
present in this paper an explanation of this kind of attack, review the
existing solutions, and show their limitations. We also propose some ideas to
secure SOAP messages, as well as implementation ideas.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2008 13:40:54 GMT"
}
]
| 2008-12-23T00:00:00 | [
[
"Benameur",
"Azzedine",
""
],
[
"Kadir",
"Faisal Abdul",
""
],
[
"Fenet",
"Serge",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0812.4206 | Vicky Papadopoulou | Marios Mavronicolas, Burkhard Monien and Vicky Papadopoulou | How Many Attackers Can Selfish Defenders Catch? | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a distributed system with {\it attacks} and {\it defenses,} both {\it
attackers} and {\it defenders} are self-interested entities. We assume a {\it
reward-sharing} scheme among {\it interdependent} defenders; each defender
wishes to (locally) maximize her own total {\it fair share} to the attackers
extinguished due to her involvement (and possibly due to those of others). What
is the {\em maximum} amount of protection achievable by a number of such
defenders against a number of attackers while the system is in a {\it Nash
equilibrium}? As a measure of system protection, we adopt the {\it
Defense-Ratio} \cite{MPPS05a}, which provides the expected (inverse) proportion
of attackers caught by the defenders. In a {\it Defense-Optimal} Nash
equilibrium, the Defense-Ratio is optimized.
We discover that the possibility of optimizing the Defense-Ratio (in a Nash
equilibrium) depends in a subtle way on how the number of defenders compares to
two natural graph-theoretic thresholds we identify. In this vein, we obtain,
through a combinatorial analysis of Nash equilibria, a collection of trade-off
results:
- When the number of defenders is either sufficiently small or sufficiently
large, there are cases where the Defense-Ratio can be optimized. The
optimization problem is computationally tractable for a large number of
defenders; the problem becomes ${\cal NP}$-complete for a small number of
defenders and the intractability is inherited from a previously unconsidered
combinatorial problem in {\em Fractional Graph Theory}.
- Perhaps paradoxically, there is a middle range of values for the number of
defenders where optimizing the Defense-Ratio is never possible.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2008 14:48:24 GMT"
}
]
| 2008-12-23T00:00:00 | [
[
"Mavronicolas",
"Marios",
""
],
[
"Monien",
"Burkhard",
""
],
[
"Papadopoulou",
"Vicky",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.4235 | Francesco Dinuzzo | Francesco Dinuzzo, Gianluigi Pillonetto, Giuseppe De Nicolao | Client-server multi-task learning from distributed datasets | null | null | 10.1109/TNN.2010.2095882 | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A client-server architecture to simultaneously solve multiple learning tasks
from distributed datasets is described. In such architecture, each client is
associated with an individual learning task and the associated dataset of
examples. The goal of the architecture is to perform information fusion from
multiple datasets while preserving privacy of individual data. The role of the
server is to collect data in real-time from the clients and codify the
information in a common database. The information coded in this database can be
used by all the clients to solve their individual learning task, so that each
client can exploit the informative content of all the datasets without actually
having access to private data of others. The proposed algorithmic framework,
based on regularization theory and kernel methods, uses a suitable class of
mixed effect kernels. The new method is illustrated through a simulated music
recommendation system.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2008 16:34:39 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jan 2010 15:37:43 GMT"
}
]
| 2013-07-02T00:00:00 | [
[
"Dinuzzo",
"Francesco",
""
],
[
"Pillonetto",
"Gianluigi",
""
],
[
"De Nicolao",
"Giuseppe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0812.4279 | Noah Stein | Noah D. Stein, Pablo A. Parrilo, Asuman Ozdaglar | Correlated Equilibria in Continuous Games: Characterization and
Computation | Games and Economic Behavior, In Press, Accepted Manuscript, Available
online 16 April 2010 | Games and Economic Behavior, Vol. 71, No. 2, March 2011, Pages
436-455 | 10.1016/j.geb.2010.04.004 | LIDS Technical Report 2805 | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present several new characterizations of correlated equilibria in games
with continuous utility functions. These have the advantage of being more
computationally and analytically tractable than the standard definition in
terms of departure functions. We use these characterizations to construct
effective algorithms for approximating a single correlated equilibrium or the
entire set of correlated equilibria of a game with polynomial utility
functions.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2008 20:28:01 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Apr 2010 02:46:48 GMT"
}
]
| 2011-06-06T00:00:00 | [
[
"Stein",
"Noah D.",
""
],
[
"Parrilo",
"Pablo A.",
""
],
[
"Ozdaglar",
"Asuman",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.4293 | Michael Mahoney | Christos Boutsidis, Michael W. Mahoney, and Petros Drineas | An Improved Approximation Algorithm for the Column Subset Selection
Problem | 17 pages; corrected a bug in the spectral norm bound of the previous
version | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of selecting the best subset of exactly $k$ columns
from an $m \times n$ matrix $A$. We present and analyze a novel two-stage
algorithm that runs in $O(\min\{mn^2,m^2n\})$ time and returns as output an $m
\times k$ matrix $C$ consisting of exactly $k$ columns of $A$. In the first
(randomized) stage, the algorithm randomly selects $\Theta(k \log k)$ columns
according to a judiciously-chosen probability distribution that depends on
information in the top-$k$ right singular subspace of $A$. In the second
(deterministic) stage, the algorithm applies a deterministic column-selection
procedure to select and return exactly $k$ columns from the set of columns
selected in the first stage. Let $C$ be the $m \times k$ matrix containing
those $k$ columns, let $P_C$ denote the projection matrix onto the span of
those columns, and let $A_k$ denote the best rank-$k$ approximation to the
matrix $A$. Then, we prove that, with probability at least 0.8, $$ \FNorm{A -
P_CA} \leq \Theta(k \log^{1/2} k) \FNorm{A-A_k}. $$ This Frobenius norm bound
is only a factor of $\sqrt{k \log k}$ worse than the best previously existing
existential result and is roughly $O(\sqrt{k!})$ better than the best previous
algorithmic result for the Frobenius norm version of this Column Subset
Selection Problem (CSSP). We also prove that, with probability at least 0.8, $$
\TNorm{A - P_CA} \leq \Theta(k \log^{1/2} k)\TNorm{A-A_k} +
\Theta(k^{3/4}\log^{1/4}k)\FNorm{A-A_k}. $$ This spectral norm bound is not
directly comparable to the best previously existing bounds for the spectral
norm version of this CSSP. Our bound depends on $\FNorm{A-A_k}$, whereas
previous results depend on $\sqrt{n-k}\TNorm{A-A_k}$; if these two quantities
are comparable, then our bound is asymptotically worse by a $(k \log k)^{1/4}$
factor.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2008 21:16:55 GMT"
},
{
"version": "v2",
"created": "Wed, 12 May 2010 02:44:25 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Boutsidis",
"Christos",
""
],
[
"Mahoney",
"Michael W.",
""
],
[
"Drineas",
"Petros",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.4296 | Marcio Portes de Albuquerque | A.D. Anastasiadis, Marcelo P. de Albuquerque, Marcio P. de Albuquerque
and Diogo B. Mussi | Tsallis $q$-exponential describes the distribution of scientific
citations - A new characterization of the impact | 13 pages including 5 figures | null | null | null | cs.DL physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we have studied the research activity for countries of Europe,
Latin America and Africa for all sciences between 1945 and November 2008. All
the data are captured from the Web of Science database during this period. The
analysis of the experimental data shows that, within a nonextensive
thermostatistical formalism, the Tsallis \emph{q}-exponential distribution
$N(c)$ satisfactorily describes Institute of Scientific Information citations.
The data which are examined in the present survey can be fitted successfully as
a first approach by applying a {\it single} curve (namely, $N(c) \propto
1/[1+(q-1) c/T]^{\frac{1}{q-1}}$ with $q\simeq 4/3$ for {\it all} the available
citations $c$, $T$ being an "effective temperature". The present analysis
ultimately suggests that the phenomenon might essentially be {\it one and the
same} along the {\it entire} range of the citation number. Finally, this
manuscript provides a new ranking index, via the "effective temperature" $T$,
for the impact level of the research activity in these countries, taking into
account the number of the publications and their citations.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2008 21:34:10 GMT"
}
]
| 2008-12-30T00:00:00 | [
[
"Anastasiadis",
"A. D.",
""
],
[
"de Albuquerque",
"Marcelo P.",
""
],
[
"de Albuquerque",
"Marcio P.",
""
],
[
"Mussi",
"Diogo B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0812.4322 | Josef Cibulka | Josef Cibulka, Jan Kyn\v{c}l, Viola M\'esz\'aros, Rudolf Stola\v{r}
and Pavel Valtr | Solution of Peter Winkler's Pizza Problem | 29 pages, 14 figures | In: Fete of Combinatorics and Computer Science, Bolyai Society
Mathematical Studies, vol. 20, pp. 63-93, Springer, 2010 | 10.1007/978-3-642-13580-4_4 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bob cuts a pizza into slices of not necessarily equal size and shares it with
Alice by alternately taking turns. One slice is taken in each turn. The first
turn is Alice's. She may choose any of the slices. In all other turns only
those slices can be chosen that have a neighbor slice already eaten. We prove a
conjecture of Peter Winkler by showing that Alice has a strategy for obtaining
4/9 of the pizza. This is best possible, that is, there is a cutting and a
strategy for Bob to get 5/9 of the pizza. We also give a characterization of
Alice's best possible gain depending on the number of slices. For a given
cutting of the pizza, we describe a linear time algorithm that computes Alice's
strategy gaining at least 4/9 of the pizza and another algorithm that computes
the optimal strategy for both players in any possible position of the game in
quadratic time. We distinguish two types of turns, shifts and jumps. We prove
that Alice can gain 4/9, 7/16 and 1/3 of the pizza if she is allowed to make at
most two jumps, at most one jump and no jump, respectively, and the three
constants are the best possible.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2008 01:18:01 GMT"
}
]
| 2011-04-29T00:00:00 | [
[
"Cibulka",
"Josef",
""
],
[
"Kynčl",
"Jan",
""
],
[
"Mészáros",
"Viola",
""
],
[
"Stolař",
"Rudolf",
""
],
[
"Valtr",
"Pavel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.4329 | Guohun Zhu | Guohun Zhu | Some sufficient conditions on Hamiltonian digraph | 7 pages, the main result did during 2007 | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Z-mapping graph is a balanced bipartite graph $G$ of a digraph $D$ by split
each vertex of $D$ into a pair of vertices of $G$. Based on the property of the
$G$, it is proved that if $D$ is strong connected and $G$ is Hamiltonian, then
$D$ is Hamiltonian. It is also proved if $D$ is Hamiltonian, then $G$ contains
at least a perfect matching. Thus some existence sufficient conditions for
Hamiltonian digraph and Hamiltonian graph are proved to be equivalent, and two
sufficient conditions of disjoint Hamiltonian digraph are given in this paper.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2008 03:12:00 GMT"
}
]
| 2008-12-24T00:00:00 | [
[
"Zhu",
"Guohun",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.4332 | Ismael Rafols | Ismael Rafols and Loet Leydesdorff | Content-based and Algorithmic Classifications of Journals: Perspectives
on the Dynamics of Scientific Communication and Indexer Effects | null | null | null | null | physics.data-an cs.DL cs.IR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aggregated journal-journal citation matrix -based on the Journal Citation
Reports (JCR) of the Science Citation Index- can be decomposed by indexers
and/or algorithmically. In this study, we test the results of two recently
available algorithms for the decomposition of large matrices against two
content-based classifications of journals: the ISI Subject Categories and the
field/subfield classification of Glaenzel & Schubert (2003). The content-based
schemes allow for the attribution of more than a single category to a journal,
whereas the algorithms maximize the ratio of within-category citations over
between-category citations in the aggregated category-category citation matrix.
By adding categories, indexers generate between-category citations, which may
enrich the database, for example, in the case of inter-disciplinary
developments. The consequent indexer effects are significant in sparse areas of
the matrix more than in denser ones. Algorithmic decompositions, on the other
hand, are more heavily skewed towards a relatively small number of categories,
while this is deliberately counter-acted upon in the case of content-based
classifications. Because of the indexer effects, science policy studies and the
sociology of science should be careful when using content-based
classifications, which are made for bibliographic disclosure, and not for the
purpose of analyzing latent structures in scientific communications. Despite
the large differences among them, the four classification schemes enable us to
generate surprisingly similar maps of science at the global level. Erroneous
classifications are cancelled as noise at the aggregate level, but may disturb
the evaluation locally.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2008 03:45:51 GMT"
}
]
| 2009-01-09T00:00:00 | [
[
"Rafols",
"Ismael",
""
],
[
"Leydesdorff",
"Loet",
""
]
]
| [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0812.4334 | Wee Seng Chua | Wee Seng Chua, Chau Yuen, Yong Liang Guan, Francois Chin | Multi-User SISO Precoding based on Generalized Multi-Unitary
Decomposition for Single-carrier Transmission in Frequency Selective Channel | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose to exploit the richly scattered multi-path nature
of a frequency selective channel to provide additional degrees of freedom for
desigining effective precoding schemes for multi-user communications. We design
the precoding matrix for multi-user communications based on the Generalized
Multi-Unitary Decomposition (GMUD), where the channel matrix H is transformed
into P_i*R_r*Q_i^H. An advantage of GMUD is that multiple pairs of unitary
matrices P_i and Q_i can be obtained with one single R_r. Since the column of
Q_i can be used as the transmission beam of a particular user, multiple
solutions of Q_i provide a large selection of transmission beams, which can be
exploited to achieve high degrees of orthogonality between the multipaths, as
well as between the interfering users. Hence the proposed precoding technique
based on GMUD achieves better performance than precoding based on singular
value decomposition.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2008 04:39:55 GMT"
}
]
| 2008-12-24T00:00:00 | [
[
"Chua",
"Wee Seng",
""
],
[
"Yuen",
"Chau",
""
],
[
"Guan",
"Yong Liang",
""
],
[
"Chin",
"Francois",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4346 | Marcin Kami\'nski | Marcin Kaminski, Paul Medvedev, Martin Milanic | The Plane-Width of Graphs | null | Journal of Graph Theory 68 (2011) 229-245 | 10.1002/jgt.20554 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Map vertices of a graph to (not necessarily distinct) points of the plane so
that two adjacent vertices are mapped at least a unit distance apart. The
plane-width of a graph is the minimum diameter of the image of the vertex set
over all such mappings. We establish a relation between the plane-width of a
graph and its chromatic number, and connect it to other well-known areas,
including the circular chromatic number and the problem of packing unit discs
in the plane. We also investigate how plane-width behaves under various
operations, such as homomorphism, disjoint union, complement, and the Cartesian
product.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2008 07:49:12 GMT"
}
]
| 2013-01-08T00:00:00 | [
[
"Kaminski",
"Marcin",
""
],
[
"Medvedev",
"Paul",
""
],
[
"Milanic",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.4360 | Juergen Schmidhuber | Juergen Schmidhuber | Driven by Compression Progress: A Simple Principle Explains Essential
Aspects of Subjective Beauty, Novelty, Surprise, Interestingness, Attention,
Curiosity, Creativity, Art, Science, Music, Jokes | 35 pages, 3 figures, based on KES 2008 keynote and ALT 2007 / DS 2007
joint invited lecture | Short version: J. Schmidhuber. Simple Algorithmic Theory of
Subjective Beauty, Novelty, Surprise, Interestingness, Attention, Curiosity,
Creativity, Art, Science, Music, Jokes. Journal of SICE 48(1), 21-32, 2009 | null | null | cs.AI cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | I argue that data becomes temporarily interesting by itself to some
self-improving, but computationally limited, subjective observer once he learns
to predict or compress the data in a better way, thus making it subjectively
simpler and more beautiful. Curiosity is the desire to create or discover more
non-random, non-arbitrary, regular data that is novel and surprising not in the
traditional sense of Boltzmann and Shannon but in the sense that it allows for
compression progress because its regularity was not yet known. This drive
maximizes interestingness, the first derivative of subjective beauty or
compressibility, that is, the steepness of the learning curve. It motivates
exploring infants, pure mathematicians, composers, artists, dancers, comedians,
yourself, and (since 1990) artificial systems.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2008 10:14:18 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Apr 2009 17:35:06 GMT"
}
]
| 2009-04-15T00:00:00 | [
[
"Schmidhuber",
"Juergen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0812.4367 | Dimiter Kovachev | Dimiter Stoichkov Kovachev | On Some Classes of Functions and Hypercubes | 8 pages, 3 tables | null | null | null | cs.DM cs.CC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper, some classes of discrete functions of $k$-valued logic are
considered, that depend on sets of their variables in a particular way.
Obtained results allow to "construct" these functions and to present them in
their tabular, analytical or matrix form, that is, as hypercubes, and in
particular Latin hypercubes. Results connected with identifying of variables of
some classes of functions are obtained.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2008 11:00:10 GMT"
}
]
| 2008-12-24T00:00:00 | [
[
"Kovachev",
"Dimiter Stoichkov",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0812.4442 | Sanjeev Khanna | Julia Chuzhoy and Sanjeev Khanna | An $O(k^{3} log n)$-Approximation Algorithm for Vertex-Connectivity
Survivable Network Design | 8 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the Survivable Network Design problem (SNDP), we are given an undirected
graph $G(V,E)$ with costs on edges, along with a connectivity requirement
$r(u,v)$ for each pair $u,v$ of vertices. The goal is to find a minimum-cost
subset $E^*$ of edges, that satisfies the given set of pairwise connectivity
requirements. In the edge-connectivity version we need to ensure that there are
$r(u,v)$ edge-disjoint paths for every pair $u, v$ of vertices, while in the
vertex-connectivity version the paths are required to be vertex-disjoint. The
edge-connectivity version of SNDP is known to have a 2-approximation. However,
no non-trivial approximation algorithm has been known so far for the vertex
version of SNDP, except for special cases of the problem. We present an
extremely simple algorithm to achieve an $O(k^3 \log n)$-approximation for this
problem, where $k$ denotes the maximum connectivity requirement, and $n$
denotes the number of vertices. We also give a simple proof of the recently
discovered $O(k^2 \log n)$-approximation result for the single-source version
of vertex-connectivity SNDP. We note that in both cases, our analysis in fact
yields slightly better guarantees in that the $\log n$ term in the
approximation guarantee can be replaced with a $\log \tau$ term where $\tau$
denotes the number of distinct vertices that participate in one or more pairs
with a positive connectivity requirement.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2008 19:04:25 GMT"
}
]
| 2008-12-24T00:00:00 | [
[
"Chuzhoy",
"Julia",
""
],
[
"Khanna",
"Sanjeev",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.4446 | Peter Turney | Peter D. Turney (National Research Council of Canada) | The Latent Relation Mapping Engine: Algorithm and Experiments | related work available at http://purl.org/peter.turney/ | Journal of Artificial Intelligence Research, (2008), 33, 615-655 | 10.1613/jair.2693 | NRC-50738 | cs.CL cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many AI researchers and cognitive scientists have argued that analogy is the
core of cognition. The most influential work on computational modeling of
analogy-making is Structure Mapping Theory (SMT) and its implementation in the
Structure Mapping Engine (SME). A limitation of SME is the requirement for
complex hand-coded representations. We introduce the Latent Relation Mapping
Engine (LRME), which combines ideas from SME and Latent Relational Analysis
(LRA) in order to remove the requirement for hand-coded representations. LRME
builds analogical mappings between lists of words, using a large corpus of raw
text to automatically discover the semantic relations among the words. We
evaluate LRME on a set of twenty analogical mapping problems, ten based on
scientific analogies and ten based on common metaphors. LRME achieves
human-level performance on the twenty problems. We compare LRME with a variety
of alternative approaches and find that they are not able to reach the same
level of performance.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2008 20:08:53 GMT"
}
]
| 2020-08-20T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.4460 | Ernesto Diaz-Aviles | Ernesto Diaz-Aviles, Lars Schmidt-Thieme and Cai-Nicolas Ziegler | Emergence of Spontaneous Order Through Neighborhood Formation in
Peer-to-Peer Recommender Systems | WWW '05 International Workshop on Innovations in Web Infrastructure
(IWI '05) May 10, 2005, Chiba, Japan | WWW '05 International Workshop on Innovations in Web
Infrastructure (IWI '05) May 10, 2005, Chiba, Japan | null | null | cs.AI cs.IR cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The advent of the Semantic Web necessitates paradigm shifts away from
centralized client/server architectures towards decentralization and
peer-to-peer computation, making the existence of central authorities
superfluous and even impossible. At the same time, recommender systems are
gaining considerable impact in e-commerce, providing people with
recommendations that are personalized and tailored to their very needs. These
recommender systems have traditionally been deployed with stark centralized
scenarios in mind, operating in closed communities detached from their host
network's outer perimeter. We aim at marrying these two worlds, i.e.,
decentralized peer-to-peer computing and recommender systems, in one
agent-based framework. Our architecture features an epidemic-style protocol
maintaining neighborhoods of like-minded peers in a robust, selforganizing
fashion. In order to demonstrate our architecture's ability to retain
scalability, robustness and to allow for convergence towards high-quality
recommendations, we conduct offline experiments on top of the popular MovieLens
dataset.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2008 23:26:27 GMT"
}
]
| 2008-12-25T00:00:00 | [
[
"Diaz-Aviles",
"Ernesto",
""
],
[
"Schmidt-Thieme",
"Lars",
""
],
[
"Ziegler",
"Cai-Nicolas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0812.4461 | Ernesto Diaz-Aviles | Avare Stewart, Ernesto Diaz-Aviles, and Wolfgang Nejdl | Mining User Profiles to Support Structure and Explanation in Open Social
Networking | International Workshop on Interacting with Multimedia Content in the
Social Semantic Web (IMC-SSW 2008). Collocated with the 3rd International
Conference on Semantic and Digital Media Technologies (SAMT 2008), Koblenz,
Germany, Dec. 03 2008 | In Proceedings of the International Workshop on Interacting with
Multimedia Content in the Social Semantic Web (IMC-SSW'08), pages 21-30.
Koblenz, Germany, Dec. 3, 2008 | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The proliferation of media sharing and social networking websites has brought
with it vast collections of site-specific user generated content. The result is
a Social Networking Divide in which the concepts and structure common across
different sites are hidden. The knowledge and structures from one social site
are not adequately exploited to provide new information and resources to the
same or different users in comparable social sites. For music bloggers, this
latent structure, forces bloggers to select sub-optimal blogrolls. However, by
integrating the social activities of music bloggers and listeners, we are able
to overcome this limitation: improving the quality of the blogroll
neighborhoods, in terms of similarity, by 85 percent when using tracks and by
120 percent when integrating tags from another site.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2008 23:20:44 GMT"
}
]
| 2008-12-25T00:00:00 | [
[
"Stewart",
"Avare",
""
],
[
"Diaz-Aviles",
"Ernesto",
""
],
[
"Nejdl",
"Wolfgang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0812.4470 | Narad Rampersad | James Currie and Narad Rampersad | There are k-uniform cubefree binary morphisms for all k >= 0 | 5 pages | null | null | null | math.CO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A word is cubefree if it contains no non-empty subword of the form xxx. A
morphism h : Sigma^* -> Sigma^* is k-uniform if h(a) has length k for all a in
Sigma. A morphism is cubefree if it maps cubefree words to cubefree words. We
show that for all k >= 0 there exists a k-uniform cubefree binary morphism.
| [
{
"version": "v1",
"created": "Wed, 24 Dec 2008 01:48:55 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Currie",
"James",
""
],
[
"Rampersad",
"Narad",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0812.4471 | Chun-Hung Liu | Chun-Hung Liu and Jeffery G. Andrews | Diversity-Multiplexing Tradeoff of Network Coding with Bidirectional
Random Relaying | 7 pages, 4 figures, to appear in the Proceedings of Allerton
Conference on Communication, Control and Computing, September 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper develops a diversity-multiplexing tradeoff (DMT) over a
bidirectional random relay set in a wireless network where the distribution of
all nodes is a stationary Poisson point process. This is a nontrivial extension
of the DMT because it requires consideration of the cooperation (or lack
thereof) of relay nodes, the traffic pattern and the time allocation between
the forward and reverse traffic directions. We then use this tradeoff to
compare the DMTs of traditional time-division multihop (TDMH) and network
coding (NC). Our main results are the derivations of the DMT for both TDMH and
NC. This shows, surprisingly, that if relay nodes collaborate NC does not
always have a better DMT than TDMH since it is difficult to simultaneously
achieve bidirectional transmit diversity for both source nodes. In fact, for
certain traffic patterns NC can have a worse DMT due to suboptimal time
allocation between the forward and reverse transmission directions.
| [
{
"version": "v1",
"created": "Wed, 24 Dec 2008 02:06:58 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Dec 2008 18:14:51 GMT"
},
{
"version": "v3",
"created": "Tue, 11 Aug 2009 23:43:34 GMT"
},
{
"version": "v4",
"created": "Fri, 25 Sep 2009 16:16:14 GMT"
}
]
| 2009-09-25T00:00:00 | [
[
"Liu",
"Chun-Hung",
""
],
[
"Andrews",
"Jeffery G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4485 | Abedelaziz Mohaisen | Abedelaziz Mohaisen | A computationally-efficient construction for the matrix-based key
distribution in sensor network | 4 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a variant for the symmetric matrix-based key
distribution in sensor network introduced by Du et al. Our slight modification
shows that the usage of specific structures for the public matrix instead of
fully random matrix with elements in $\mathbb{Z}_q$ can reduce the computation
overhead for generating the public key information and the key itself. An
intensive analysis followed by modified scheme demonstrates the value of our
contribution in relation with the current work and show the equivalence of the
security
| [
{
"version": "v1",
"created": "Wed, 24 Dec 2008 05:20:15 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Mohaisen",
"Abedelaziz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0812.4487 | Zilong Wang | Zilong Wang and Guang Gong | New Sequences Design from Weil Representation with Low Two-Dimensional
Correlation in Both Time and Phase Shifts | 23 pages, accepted by IEEE Transactions on Information Theory | null | null | null | cs.IT cs.DM math.IT math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a given prime $p$, a new construction of families of the complex valued
sequences of period $p$ with efficient implementation is given by applying both
multiplicative characters and additive characters of finite field
$\mathbb{F}_p$. Such a signal set consists of $p^2(p-2)$ time-shift distinct
sequences, the magnitude of the two-dimensional autocorrelation function (i.e.,
the ambiguity function) in both time and phase of each sequence is upper
bounded by $2\sqrt{p}$ at any shift not equal to $(0, 0)$, and the magnitude of
the ambiguity function of any pair of phase-shift distinct sequences is upper
bounded by $4\sqrt{p}$. Furthermore, the magnitude of their Fourier transform
spectrum is less than or equal to 2. A proof is given through finding a simple
elementary construction for the sequences constructed from the Weil
representation by Gurevich, Hadani and Sochen. An open problem for directly
establishing these assertions without involving the Weil representation is
addressed.
| [
{
"version": "v1",
"created": "Wed, 24 Dec 2008 15:58:29 GMT"
},
{
"version": "v2",
"created": "Fri, 13 May 2011 17:17:05 GMT"
}
]
| 2011-05-16T00:00:00 | [
[
"Wang",
"Zilong",
""
],
[
"Gong",
"Guang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
]
|
0812.4514 | Zhuo Li | Zhuo Li, Li-Juan Xing, and Xin-Mei Wang | Quantum generalized Reed-Solomon codes: Unified framework for quantum
MDS codes | 9 pages, no figures | Phys. Rev. A, 2008, 77, 012308 | 10.1103/PhysRevA.77.012308 | null | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We construct a new family of quantum MDS codes from classical generalized
Reed-Solomon codes and derive the necessary and sufficient condition under
which these quantum codes exist. We also give code bounds and show how to
construct them analytically. We find that existing quantum MDS codes can be
unified under these codes in the sense that when a quantum MDS code exists,
then a quantum code of this type with the same parameters also exists. Thus as
far as is known at present, they are the most important family of quantum MDS
codes.
| [
{
"version": "v1",
"created": "Wed, 24 Dec 2008 10:09:26 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Li",
"Zhuo",
""
],
[
"Xing",
"Li-Juan",
""
],
[
"Wang",
"Xin-Mei",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4523 | Armen Bagdasaryan | Armen Bagdasaryan | System Theoretic Viewpoint on Modeling of Complex Systems: Design,
Synthesis, Simulation, and Control | 10 pages; Contribution to the Proceedings of the 7th WSEAS
International Conference on Computational Intelligence, Man-Machine Systems,
and Cybernetics, Cairo, Egypt, December 29-31, 2008 | null | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the basic features of complex dynamic and control systems,
including systems having hierarchical structure. Special attention is paid to
the problems of design and synthesis of complex systems and control models, and
to the development of simulation techniques and systems. A model of complex
system is proposed and briefly analyzed.
| [
{
"version": "v1",
"created": "Wed, 24 Dec 2008 12:07:48 GMT"
}
]
| 2008-12-25T00:00:00 | [
[
"Bagdasaryan",
"Armen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
]
|
0812.4542 | John Panaretos | John Panaretos, Chrisovaladis Malesios | Assessing scientific research performance and impact with single indices | null | null | null | null | cs.IR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a comprehensive and critical review of the h-index and its most
important modifications proposed in the literature, as well as of other similar
indicators measuring research output and impact. Extensions of some of these
indices are presented and illustrated.
| [
{
"version": "v1",
"created": "Wed, 24 Dec 2008 15:41:48 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Jan 2009 18:46:14 GMT"
},
{
"version": "v3",
"created": "Tue, 15 Sep 2009 14:52:52 GMT"
}
]
| 2009-09-15T00:00:00 | [
[
"Panaretos",
"John",
""
],
[
"Malesios",
"Chrisovaladis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0812.4547 | Christos Boutsidis | Christos Boutsidis, Petros Drineas | Random Projections for the Nonnegative Least-Squares Problem | to appear in Linear Algebra and its Applications | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constrained least-squares regression problems, such as the Nonnegative Least
Squares (NNLS) problem, where the variables are restricted to take only
nonnegative values, often arise in applications. Motivated by the recent
development of the fast Johnson-Lindestrauss transform, we present a fast
random projection type approximation algorithm for the NNLS problem. Our
algorithm employs a randomized Hadamard transform to construct a much smaller
NNLS problem and solves this smaller problem using a standard NNLS solver. We
prove that our approach finds a nonnegative solution vector that, with high
probability, is close to the optimum nonnegative solution in a relative error
approximation sense. We experimentally evaluate our approach on a large
collection of term-document data and verify that it does offer considerable
speedups without a significant loss in accuracy. Our analysis is based on a
novel random projection type result that might be of independent interest. In
particular, given a tall and thin matrix $\Phi \in \mathbb{R}^{n \times d}$ ($n
\gg d$) and a vector $y \in \mathbb{R}^d$, we prove that the Euclidean length
of $\Phi y$ can be estimated very accurately by the Euclidean length of
$\tilde{\Phi}y$, where $\tilde{\Phi}$ consists of a small subset of
(appropriately rescaled) rows of $\Phi$.
| [
{
"version": "v1",
"created": "Wed, 24 Dec 2008 16:43:22 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Mar 2009 20:17:36 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Boutsidis",
"Christos",
""
],
[
"Drineas",
"Petros",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.4580 | Marcus Hutter | Marcus Hutter | Feature Markov Decision Processes | 7 pages | Proc. 2nd Conf. on Artificial General Intelligence (AGI 2009)
pages 61-66 | null | null | cs.AI cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | General purpose intelligent learning agents cycle through (complex,non-MDP)
sequences of observations, actions, and rewards. On the other hand,
reinforcement learning is well-developed for small finite state Markov Decision
Processes (MDPs). So far it is an art performed by human designers to extract
the right state representation out of the bare observations, i.e. to reduce the
agent setup to the MDP framework. Before we can think of mechanizing this
search for suitable MDPs, we need a formal objective criterion. The main
contribution of this article is to develop such a criterion. I also integrate
the various parts into one learning algorithm. Extensions to more realistic
dynamic Bayesian networks are developed in a companion article.
| [
{
"version": "v1",
"created": "Thu, 25 Dec 2008 00:27:22 GMT"
}
]
| 2009-12-30T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4581 | Marcus Hutter | Marcus Hutter | Feature Dynamic Bayesian Networks | 7 pages | Proc. 2nd Conf. on Artificial General Intelligence (AGI 2009)
pages 67-73 | null | null | cs.AI cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Feature Markov Decision Processes (PhiMDPs) are well-suited for learning
agents in general environments. Nevertheless, unstructured (Phi)MDPs are
limited to relatively simple environments. Structured MDPs like Dynamic
Bayesian Networks (DBNs) are used for large-scale real-world problems. In this
article I extend PhiMDP to PhiDBN. The primary contribution is to derive a cost
criterion that allows to automatically extract the most relevant features from
the environment, leading to the "best" DBN representation. I discuss all
building blocks required for a complete general learning algorithm.
| [
{
"version": "v1",
"created": "Thu, 25 Dec 2008 00:32:45 GMT"
}
]
| 2009-12-30T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4614 | Paola Zizzi | Paola Zizzi | I, Quantum Robot: Quantum Mind control on a Quantum Computer | 13 pages; revised version for publication, references added | null | null | null | quant-ph cs.AI cs.LO cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The logic which describes quantum robots is not orthodox quantum logic, but a
deductive calculus which reproduces the quantum tasks (computational processes,
and actions) taking into account quantum superposition and quantum
entanglement. A way toward the realization of intelligent quantum robots is to
adopt a quantum metalanguage to control quantum robots. A physical
implementation of a quantum metalanguage might be the use of coherent states in
brain signals.
| [
{
"version": "v1",
"created": "Thu, 25 Dec 2008 16:31:05 GMT"
},
{
"version": "v2",
"created": "Thu, 28 May 2009 05:39:23 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Zizzi",
"Paola",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0812.4627 | Dror Baron | Dror Baron (Technion - Israel Institute of Technology), Shriram
Sarvotham (Halliburton), and Richard G. Baraniuk (Rice University) | Bayesian Compressive Sensing via Belief Propagation | 25 pages with 8 figures; to appear in IEEE Transactions on Signal
Processing | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressive sensing (CS) is an emerging field based on the revelation that a
small collection of linear projections of a sparse signal contains enough
information for stable, sub-Nyquist signal acquisition. When a statistical
characterization of the signal is available, Bayesian inference can complement
conventional CS methods based on linear programming or greedy algorithms. We
perform approximate Bayesian inference using belief propagation (BP) decoding,
which represents the CS encoding matrix as a graphical model. Fast computation
is obtained by reducing the size of the graphical model with sparse encoding
matrices. To decode a length-N signal containing K large coefficients, our
CS-BP decoding algorithm uses O(Klog(N)) measurements and O(Nlog^2(N))
computation. Finally, although we focus on a two-state mixture Gaussian model,
CS-BP is easily adapted to other signal models.
| [
{
"version": "v1",
"created": "Thu, 25 Dec 2008 21:00:28 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Jun 2009 21:31:38 GMT"
}
]
| 2009-06-25T00:00:00 | [
[
"Baron",
"Dror",
"",
"Technion - Israel Institute of Technology"
],
[
"Sarvotham",
"Shriram",
"",
"Halliburton"
],
[
"Baraniuk",
"Richard G.",
"",
"Rice University"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4642 | Masato Tajima | M. Tajima, K. Okino, and T. Miyagoshi | Error-Trellis State Complexity of LDPC Convolutional Codes Based on
Circulant Matrices | 5 pages, 5 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let H(D) be the parity-check matrix of an LDPC convolutional code
corresponding to the parity-check matrix H of a QC code obtained using the
method of Tanner et al. We see that the entries in H(D) are all monomials and
several rows (columns) have monomial factors. Let us cyclically shift the rows
of H. Then the parity-check matrix H'(D) corresponding to the modified matrix
H' defines another convolutional code. However, its free distance is
lower-bounded by the minimum distance of the original QC code. Also, each row
(column) of H'(D) has a factor different from the one in H(D). We show that the
state-space complexity of the error-trellis associated with H'(D) can be
significantly reduced by controlling the row shifts applied to H with the
error-correction capability being preserved.
| [
{
"version": "v1",
"created": "Fri, 26 Dec 2008 05:28:47 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Jan 2009 06:08:39 GMT"
}
]
| 2009-01-08T00:00:00 | [
[
"Tajima",
"M.",
""
],
[
"Okino",
"K.",
""
],
[
"Miyagoshi",
"T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4646 | Ke Xu | Lian-dong Liu and Ke Xu | Time series of Internet AS-level topology graphs: four patterns and one
model | 9 pages, 4 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Researchers have proposed a variety of Internet topology models. However
almost all of them focus on generating one graph based on one single static
source graph. On the other hand, Internet topology is evolving over time
continuously with the addition and deletion of nodes and edges. If a model is
based on all the topologies in the past, instead of one of them, it will be
more accurate and closer to the real world topology. In this paper, we study
the Internet As-level topology time-series from two different sources and find
that both of them obey four same dynamic graph patterns. Then we propose a mode
that can infer the topology in the future based on all the topologies in the
past. Through theoretical and experimental analysis, we prove the topology that
our model generates can match both the static and dynamic graph patterns. In
addition, the parameters in the model are meaningful. Finally, we theoretically
and experimentally prove that these parameters are directly related to some
important graph characteristics.
| [
{
"version": "v1",
"created": "Fri, 26 Dec 2008 06:32:59 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Liu",
"Lian-dong",
""
],
[
"Xu",
"Ke",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.4706 | Laurent Buse | Laurent Bus\'e (INRIA Sophia Antipolis), Guillaume Ch\`eze (IMT) | On the total order of reducibility of a pencil of algebraic plane curves | null | Journal of Algebra 341, 1 (2011) 256-278 | 10.1016/j.jalgebra.2011.06.006 | null | math.AC cs.SC math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the problem of bounding the number of reducible curves in a
pencil of algebraic plane curves is addressed. Unlike most of the previous
related works, each reducible curve of the pencil is here counted with its
appropriate multiplicity. It is proved that this number of reducible curves,
counted with multiplicity, is bounded by d^2-1 where d is the degree of the
pencil. Then, a sharper bound is given by taking into account the Newton's
polygon of the pencil.
| [
{
"version": "v1",
"created": "Fri, 26 Dec 2008 20:56:46 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Aug 2011 11:54:19 GMT"
}
]
| 2011-08-18T00:00:00 | [
[
"Busé",
"Laurent",
"",
"INRIA Sophia Antipolis"
],
[
"Chèze",
"Guillaume",
"",
"IMT"
]
]
| [
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
]
|
0812.4710 | Lahatra Rakotondrainibe | Lahatra Rakotondrainibe (IETR), Gheorghe Zaharia (IETR), Gha\"is El
Zein (IETR), Yves Lostanlen (IETR) | Indoor Channel Measurements and Communications System Design at 60 GHz | 2 pages | XXIX URSI General Assembly, Chicago : \'Etats-Unis (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a brief overview of several studies concerning the indoor
wireless communications at 60 GHz performed by the IETR. The characterization
and the modeling of the radio propagation channel are based on several
measurement campaigns realized with the channel sounder developed at IETR. Some
typical residential environments were also simulated by ray tracing and
Gaussian Beam Tracking. The obtained results show a good agreement with the
similar experimental results. Currently, the IETR is developing a high data
rate wireless communication system operating at 60 GHz. The single-carrier
architecture of this system is also presented.
| [
{
"version": "v1",
"created": "Fri, 26 Dec 2008 21:04:15 GMT"
}
]
| 2010-11-10T00:00:00 | [
[
"Rakotondrainibe",
"Lahatra",
"",
"IETR"
],
[
"Zaharia",
"Gheorghe",
"",
"IETR"
],
[
"Zein",
"Ghaïs El",
"",
"IETR"
],
[
"Lostanlen",
"Yves",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.4727 | Alwen Tiu | Alwen Tiu and Alberto Momigliano | Induction and Co-induction in Sequent Calculus | This is an extended and revised version of an extended abstract which
appeared in the proceedings of TYPES 2003 | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Proof search has been used to specify a wide range of computation systems. In
order to build a framework for reasoning about such specifications, we make use
of a sequent calculus involving induction and co-induction. These proof
principles are based on a proof theoretic (rather than set-theoretic) notion of
definition. Definitions are akin to (stratified) logic programs, where the left
and right rules for defined atoms allow one to view theories as "closed" or
defining fixed points. The use of definitions makes it possible to reason
intensionally about syntax, in particular enforcing free equality via
unification. We add in a consistent way rules for pre and post fixed points,
thus allowing the user to reason inductively and co-inductively about
properties of computational system making full use of higher-order abstract
syntax. Consistency is guaranteed via cut-elimination, where we give the first,
to our knowledge, cut-elimination procedure in the presence of general
inductive and co-inductive definitions.
| [
{
"version": "v1",
"created": "Sat, 27 Dec 2008 09:29:16 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jan 2009 06:01:25 GMT"
},
{
"version": "v3",
"created": "Wed, 30 Sep 2009 05:03:56 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Tiu",
"Alwen",
""
],
[
"Momigliano",
"Alberto",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0812.4744 | Ashutosh Gore | Ashutosh Deepak Gore | On Wireless Link Scheduling and Flow Control | Author's Ph.D. Thesis, 213 pages, 64 figures | null | null | EE-PHD-08-007 | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This thesis focuses on link scheduling in wireless mesh networks by taking
into account physical layer characteristics. The assumption made throughout is
that a packet is received successfully only if the Signal to Interference and
Noise Ratio (SINR) at the receiver exceeds the communication threshold. The
thesis also discusses the complementary problem of flow control. (1) We
consider various problems on centralized link scheduling in Spatial Time
Division Multiple Access (STDMA) wireless mesh networks. We motivate the use of
spatial reuse as performance metric and provide an explicit characterization of
spatial reuse. We propose link scheduling algorithms based on certain graph
models (communication graph, SINR graph) of the network. Our algorithms achieve
higher spatial reuse than that of existing algorithms, with only a slight
increase in computational complexity. (2) We investigate random access
algorithms in wireless networks. We assume that the receiver is capable of
power-based capture and propose a splitting algorithm that varies transmission
powers of users on the basis of quaternary channel feedback. We model the
algorithm dynamics by a Discrete Time Markov Chain and consequently show that
its maximum stable throughput is 0.5518. Our algorithm achieves higher maximum
stable throughput and significantly lower delay than the First Come First Serve
(FCFS) splitting algorithm with uniform transmission power. (3) We consider the
problem of flow control in packet networks from an information-theoretic
perspective. We derive the maximum entropy of a flow which conforms to traffic
constraints imposed by a generalized token bucket regulator (GTBR), by taking
into account the covert information present in randomness of packet lengths.
| [
{
"version": "v1",
"created": "Sat, 27 Dec 2008 13:37:53 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Gore",
"Ashutosh Deepak",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0812.4792 | Sujit Gujar Mr | Sujit Gujar, Yadati Narahari | On Optimal Linear Redistribution of VCG Payments in Assignment of
Heterogeneous Objects | 12 pages | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There are p heterogeneous objects to be assigned to n competing agents (n >
p) each with unit demand. It is required to design a Groves mechanism for this
assignment problem satisfying weak budget balance, individual rationality, and
minimizing the budget imbalance. This calls for designing an appropriate rebate
function. Our main result is an impossibility theorem which rules out linear
rebate functions with non-zero efficiency in heterogeneous object assignment.
Motivated by this theorem, we explore two approaches to get around this
impossibility. In the first approach, we show that linear rebate functions with
non-zero are possible when the valuations for the objects are correlated. In
the second approach, we show that rebate functions with non-zero efficiency are
possible if linearity is relaxed.
| [
{
"version": "v1",
"created": "Sun, 28 Dec 2008 05:08:08 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Gujar",
"Sujit",
""
],
[
"Narahari",
"Yadati",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0812.4798 | Avraham Trahtman N | A. N. Trahtman | The Road Coloring for Mapping on k States(withdrawn) | withdrawn, the result was known | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $\Gamma$ be directed strongly connected finite graph of uniform outdegree
(constant outdegree of any vertex) and let some coloring of edges of $\Gamma$
turn the graph into deterministic complete automaton. Let the word $s$ be a
word in the alphabet of colors (considered also as letters) on the edges of
$\Gamma$ and let $\Gamma s$ be a mapping of vertices $\Gamma$.
| [
{
"version": "v1",
"created": "Sun, 28 Dec 2008 07:11:39 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jan 2009 22:23:27 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Trahtman",
"A. N.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0812.4803 | Tal Philosof | Tal Philosof, Ram Zamir and Uri Erez | Technical Report: Achievable Rates for the MAC with Correlated
Channel-State Information | 7 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we provide an achievable rate region for the discrete
memoryless multiple access channel with correlated state information known
non-causally at the encoders using a random binning technique. This result is a
generalization of the random binning technique used by Gel'fand and Pinsker for
the problem with non-causal channel state information at the encoder in point
to point communication.
| [
{
"version": "v1",
"created": "Sun, 28 Dec 2008 09:33:13 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Philosof",
"Tal",
""
],
[
"Zamir",
"Ram",
""
],
[
"Erez",
"Uri",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4814 | Joergen Villadsen | J{\o}rgen Villadsen | Nominalistic Logic (Extended Abstract) | 3 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nominalistic Logic (NL) is a new presentation of Paul Gilmore's Intensional
Type Theory (ITT) as a sequent calculus together with a succinct nominalization
axiom (N) that permits names of predicates as individuals in certain cases. The
logic has a flexible comprehension axiom, but no extensionality axiom and no
infinity axiom, although axiom N is the key to the derivation of Peano's
postulates for the natural numbers.
| [
{
"version": "v1",
"created": "Sun, 28 Dec 2008 12:45:05 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Villadsen",
"Jørgen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0812.4826 | Long Gao | Long Gao, Rui Zhang, Changchuan Yin, Shuguang Cui | Delay-Throughput Tradeoff for Supportive Two-Tier Networks | 5 pages, 1 figure, submitted to ISIT 2009 | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a static wireless network that has two tiers with different
priorities: a primary tier vs. a secondary tier. The primary tier consists of
randomly distributed legacy nodes of density $n$, which have an absolute
priority to access the spectrum. The secondary tier consists of randomly
distributed cognitive nodes of density $m=n^\beta$ with $\beta\geq 2$, which
can only access the spectrum opportunistically to limit the interference to the
primary tier. By allowing the secondary tier to route the packets for the
primary tier, we show that the primary tier can achieve a throughput scaling of
$\lambda_p(n)=\Theta(1/\log n)$ per node and a delay-throughput tradeoff of
$D_p(n)=\Theta(\sqrt{n^\beta\log n}\lambda_p(n))$ for $\lambda_p(n)=O(1/\log
n)$, while the secondary tier still achieves the same optimal delay-throughput
tradeoff as a stand-alone network.
| [
{
"version": "v1",
"created": "Sun, 28 Dec 2008 16:18:02 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Gao",
"Long",
""
],
[
"Zhang",
"Rui",
""
],
[
"Yin",
"Changchuan",
""
],
[
"Cui",
"Shuguang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4835 | Ran Gelles | Michel Boyer, Ran Gelles, Dan Kenigsberg, Tal Mor | Semi-Quantum Key Distribution | 13 pages, 2 figures | null | 10.1103/PhysRevA.79.032341 | null | quant-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Secure key distribution among two remote parties is impossible when both are
classical, unless some unproven (and arguably unrealistic)
computation-complexity assumptions are made, such as the difficulty of
factorizing large numbers. On the other hand, a secure key distribution is
possible when both parties are quantum. What is possible when only one party
(Alice) is quantum, yet the other (Bob) has only classical capabilities?
Recently, a semi-quantum key distribution protocol was presented (Boyer,
Kenigsberg and Mor, Physical Review Letters, 2007), in which one of the parties
(Bob) is classical, and yet, the protocol is proven to be completely robust
against an eavesdropping attempt.
Here we extend that result much further. We present two protocols with this
constraint, and prove their robustness against attacks: we prove that any
attempt of an adversary to obtain information (and even a tiny amount of
information) necessarily induces some errors that the legitimate parties could
notice. One protocol presented here is identical to the one referred to above,
however, its robustness is proven here in a much more general scenario. The
other protocol is very different as it is based on randomization.
| [
{
"version": "v1",
"created": "Sun, 28 Dec 2008 18:15:05 GMT"
}
]
| 2011-11-01T00:00:00 | [
[
"Boyer",
"Michel",
""
],
[
"Gelles",
"Ran",
""
],
[
"Kenigsberg",
"Dan",
""
],
[
"Mor",
"Tal",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0812.4848 | Thomas Schneider | Michael Bauland, Thomas Schneider, Henning Schnoor, Ilka Schnoor,
Heribert Vollmer | The Complexity of Generalized Satisfiability for Linear Temporal Logic | null | Logical Methods in Computer Science, Volume 5, Issue 1 (January
26, 2009) lmcs:1158 | 10.2168/LMCS-5(1:1)2009 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a seminal paper from 1985, Sistla and Clarke showed that satisfiability
for Linear Temporal Logic (LTL) is either NP-complete or PSPACE-complete,
depending on the set of temporal operators used. If, in contrast, the set of
propositional operators is restricted, the complexity may decrease. This paper
undertakes a systematic study of satisfiability for LTL formulae over
restricted sets of propositional and temporal operators. Since every
propositional operator corresponds to a Boolean function, there exist
infinitely many propositional operators. In order to systematically cover all
possible sets of them, we use Post's lattice. With its help, we determine the
computational complexity of LTL satisfiability for all combinations of temporal
operators and all but two classes of propositional functions. Each of these
infinitely many problems is shown to be either PSPACE-complete, NP-complete, or
in P.
| [
{
"version": "v1",
"created": "Sun, 28 Dec 2008 21:10:06 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jan 2009 13:14:33 GMT"
},
{
"version": "v3",
"created": "Mon, 23 Mar 2009 11:56:18 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Bauland",
"Michael",
""
],
[
"Schneider",
"Thomas",
""
],
[
"Schnoor",
"Henning",
""
],
[
"Schnoor",
"Ilka",
""
],
[
"Vollmer",
"Heribert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0812.4852 | Carl Hewitt | Carl Hewitt | Formalizing common sense for scalable inconsistency-robust information
integration using Direct Logic(TM) reasoning and the Actor Model | Corrected: all types are strict | null | null | null | cs.LO cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Because contemporary large software systems are pervasively inconsistent, it
is not safe to reason about them using classical logic. The goal of Direct
Logic is to be a minimal fix to classical mathematical logic that meets the
requirements of large-scale Internet applications (including sense making for
natural language) by addressing the following issues: inconsistency robustness,
contrapositive inference bug, and direct argumentation.
Direct Logic makes the following contributions over previous work:
* Direct Inference (no contrapositive bug for inference)
* Direct Argumentation (inference directly expressed)
* Inconsistency-robust deduction without artifices such as indices (labels)
on propositions or restrictions on reiteration
* Intuitive inferences hold including the following:
* Boolean Equivalences
* Reasoning by splitting for disjunctive cases
* Soundness
* Inconsistency-robust Proof by Contradiction
Since the global state model of computation (first formalized by Turing) is
inadequate to the needs of modern large-scale Internet applications the Actor
Model was developed to meet this need. Using, the Actor Model, this paper
proves that Logic Programming is not computationally universal in that there
are computations that cannot be implemented using logical inference.
Consequently the Logic Programming paradigm is strictly less general than the
Procedural Embedding of Knowledge paradigm.
| [
{
"version": "v1",
"created": "Sun, 28 Dec 2008 21:37:23 GMT"
},
{
"version": "v10",
"created": "Fri, 12 Jun 2009 21:10:35 GMT"
},
{
"version": "v100",
"created": "Wed, 5 Nov 2014 14:09:33 GMT"
},
{
"version": "v101",
"created": "Sun, 23 Nov 2014 22:59:31 GMT"
},
{
"version": "v102",
"created": "Mon, 29 Dec 2014 16:47:29 GMT"
},
{
"version": "v103",
"created": "Mon, 2 Mar 2015 06:39:17 GMT"
},
{
"version": "v11",
"created": "Tue, 14 Jul 2009 00:08:22 GMT"
},
{
"version": "v12",
"created": "Fri, 17 Jul 2009 05:28:44 GMT"
},
{
"version": "v13",
"created": "Fri, 14 Aug 2009 07:48:39 GMT"
},
{
"version": "v14",
"created": "Thu, 20 Aug 2009 18:19:06 GMT"
},
{
"version": "v15",
"created": "Sat, 26 Sep 2009 18:10:14 GMT"
},
{
"version": "v16",
"created": "Sun, 8 Nov 2009 07:43:45 GMT"
},
{
"version": "v17",
"created": "Fri, 20 Nov 2009 16:05:14 GMT"
},
{
"version": "v18",
"created": "Tue, 24 Nov 2009 05:50:49 GMT"
},
{
"version": "v19",
"created": "Thu, 3 Dec 2009 15:42:13 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Dec 2008 23:30:05 GMT"
},
{
"version": "v20",
"created": "Thu, 3 Dec 2009 23:03:29 GMT"
},
{
"version": "v21",
"created": "Thu, 10 Dec 2009 07:12:22 GMT"
},
{
"version": "v22",
"created": "Tue, 29 Dec 2009 23:00:04 GMT"
},
{
"version": "v23",
"created": "Thu, 31 Dec 2009 20:06:59 GMT"
},
{
"version": "v24",
"created": "Sat, 9 Jan 2010 18:28:38 GMT"
},
{
"version": "v25",
"created": "Wed, 13 Jan 2010 22:53:30 GMT"
},
{
"version": "v26",
"created": "Sat, 16 Jan 2010 21:02:44 GMT"
},
{
"version": "v27",
"created": "Sun, 31 Jan 2010 11:51:22 GMT"
},
{
"version": "v28",
"created": "Sun, 7 Feb 2010 22:47:16 GMT"
},
{
"version": "v29",
"created": "Thu, 11 Feb 2010 22:23:44 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Jan 2009 18:10:14 GMT"
},
{
"version": "v30",
"created": "Wed, 17 Feb 2010 17:54:03 GMT"
},
{
"version": "v31",
"created": "Wed, 24 Feb 2010 01:49:48 GMT"
},
{
"version": "v32",
"created": "Sat, 27 Feb 2010 14:08:25 GMT"
},
{
"version": "v33",
"created": "Sat, 6 Mar 2010 17:44:48 GMT"
},
{
"version": "v34",
"created": "Thu, 11 Mar 2010 15:34:10 GMT"
},
{
"version": "v35",
"created": "Mon, 22 Mar 2010 01:39:19 GMT"
},
{
"version": "v36",
"created": "Sun, 4 Apr 2010 10:13:36 GMT"
},
{
"version": "v37",
"created": "Tue, 13 Apr 2010 16:37:09 GMT"
},
{
"version": "v38",
"created": "Mon, 19 Apr 2010 16:28:14 GMT"
},
{
"version": "v39",
"created": "Thu, 22 Apr 2010 19:20:04 GMT"
},
{
"version": "v4",
"created": "Fri, 20 Mar 2009 17:32:25 GMT"
},
{
"version": "v40",
"created": "Mon, 26 Apr 2010 16:52:49 GMT"
},
{
"version": "v41",
"created": "Tue, 27 Apr 2010 16:17:39 GMT"
},
{
"version": "v42",
"created": "Tue, 25 May 2010 14:53:37 GMT"
},
{
"version": "v43",
"created": "Thu, 1 Jul 2010 14:48:06 GMT"
},
{
"version": "v44",
"created": "Mon, 12 Jul 2010 15:46:06 GMT"
},
{
"version": "v45",
"created": "Mon, 2 Aug 2010 10:51:53 GMT"
},
{
"version": "v46",
"created": "Mon, 9 Aug 2010 11:11:23 GMT"
},
{
"version": "v47",
"created": "Mon, 30 Aug 2010 17:19:34 GMT"
},
{
"version": "v48",
"created": "Mon, 13 Sep 2010 19:00:50 GMT"
},
{
"version": "v49",
"created": "Thu, 23 Sep 2010 17:42:38 GMT"
},
{
"version": "v5",
"created": "Mon, 30 Mar 2009 14:24:19 GMT"
},
{
"version": "v50",
"created": "Sun, 3 Oct 2010 02:36:47 GMT"
},
{
"version": "v51",
"created": "Sun, 17 Oct 2010 00:29:19 GMT"
},
{
"version": "v52",
"created": "Mon, 15 Nov 2010 23:37:16 GMT"
},
{
"version": "v53",
"created": "Tue, 23 Nov 2010 19:19:16 GMT"
},
{
"version": "v54",
"created": "Thu, 9 Dec 2010 13:25:55 GMT"
},
{
"version": "v55",
"created": "Wed, 29 Dec 2010 13:27:45 GMT"
},
{
"version": "v56",
"created": "Thu, 20 Jan 2011 07:46:17 GMT"
},
{
"version": "v57",
"created": "Wed, 26 Jan 2011 08:31:46 GMT"
},
{
"version": "v58",
"created": "Mon, 31 Jan 2011 00:17:50 GMT"
},
{
"version": "v59",
"created": "Thu, 10 Feb 2011 08:28:00 GMT"
},
{
"version": "v6",
"created": "Mon, 30 Mar 2009 23:44:01 GMT"
},
{
"version": "v60",
"created": "Tue, 15 Mar 2011 16:15:16 GMT"
},
{
"version": "v61",
"created": "Wed, 23 Mar 2011 13:25:55 GMT"
},
{
"version": "v62",
"created": "Wed, 30 Mar 2011 06:55:12 GMT"
},
{
"version": "v63",
"created": "Mon, 11 Apr 2011 16:45:02 GMT"
},
{
"version": "v64",
"created": "Sun, 17 Apr 2011 23:39:33 GMT"
},
{
"version": "v65",
"created": "Wed, 27 Apr 2011 08:28:01 GMT"
},
{
"version": "v66",
"created": "Mon, 2 May 2011 14:13:51 GMT"
},
{
"version": "v67",
"created": "Mon, 9 May 2011 16:14:00 GMT"
},
{
"version": "v68",
"created": "Mon, 16 May 2011 03:13:50 GMT"
},
{
"version": "v69",
"created": "Tue, 31 May 2011 10:21:32 GMT"
},
{
"version": "v7",
"created": "Mon, 27 Apr 2009 08:17:17 GMT"
},
{
"version": "v70",
"created": "Mon, 6 Jun 2011 17:00:09 GMT"
},
{
"version": "v71",
"created": "Thu, 16 Jun 2011 18:37:21 GMT"
},
{
"version": "v72",
"created": "Mon, 27 Jun 2011 19:40:09 GMT"
},
{
"version": "v73",
"created": "Thu, 7 Jul 2011 00:36:10 GMT"
},
{
"version": "v74",
"created": "Mon, 1 Aug 2011 19:25:13 GMT"
},
{
"version": "v75",
"created": "Mon, 22 Aug 2011 06:42:33 GMT"
},
{
"version": "v76",
"created": "Thu, 25 Aug 2011 14:51:09 GMT"
},
{
"version": "v77",
"created": "Sun, 18 Sep 2011 14:44:39 GMT"
},
{
"version": "v78",
"created": "Mon, 26 Sep 2011 20:45:24 GMT"
},
{
"version": "v79",
"created": "Tue, 15 Nov 2011 15:31:31 GMT"
},
{
"version": "v8",
"created": "Sat, 30 May 2009 23:38:27 GMT"
},
{
"version": "v80",
"created": "Mon, 21 Nov 2011 20:08:06 GMT"
},
{
"version": "v81",
"created": "Sun, 1 Jan 2012 00:46:32 GMT"
},
{
"version": "v82",
"created": "Tue, 31 Jan 2012 03:10:35 GMT"
},
{
"version": "v83",
"created": "Mon, 13 Feb 2012 07:17:46 GMT"
},
{
"version": "v84",
"created": "Mon, 27 Feb 2012 23:02:35 GMT"
},
{
"version": "v85",
"created": "Mon, 2 Apr 2012 14:16:11 GMT"
},
{
"version": "v86",
"created": "Tue, 4 Dec 2012 18:26:14 GMT"
},
{
"version": "v87",
"created": "Mon, 11 Mar 2013 19:40:08 GMT"
},
{
"version": "v88",
"created": "Fri, 2 Aug 2013 21:41:29 GMT"
},
{
"version": "v89",
"created": "Tue, 27 Aug 2013 13:27:49 GMT"
},
{
"version": "v9",
"created": "Wed, 10 Jun 2009 14:59:46 GMT"
},
{
"version": "v90",
"created": "Tue, 24 Sep 2013 19:05:21 GMT"
},
{
"version": "v91",
"created": "Sat, 2 Nov 2013 04:51:44 GMT"
},
{
"version": "v92",
"created": "Tue, 18 Feb 2014 19:43:19 GMT"
},
{
"version": "v93",
"created": "Mon, 3 Mar 2014 07:52:01 GMT"
},
{
"version": "v94",
"created": "Thu, 19 Jun 2014 22:03:58 GMT"
},
{
"version": "v95",
"created": "Sat, 5 Jul 2014 22:04:00 GMT"
},
{
"version": "v96",
"created": "Mon, 21 Jul 2014 12:48:15 GMT"
},
{
"version": "v97",
"created": "Mon, 28 Jul 2014 14:54:56 GMT"
},
{
"version": "v98",
"created": "Mon, 4 Aug 2014 16:55:37 GMT"
},
{
"version": "v99",
"created": "Mon, 18 Aug 2014 14:28:05 GMT"
}
]
| 2015-03-03T00:00:00 | [
[
"Hewitt",
"Carl",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0812.4889 | Neri Merhav | Neri Merhav, Dongning Guo, and Shlomo Shamai (Shitz) | Statistical Physics of Signal Estimation in Gaussian Noise: Theory and
Examples of Phase Transitions | Submitted to the IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2039047 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of signal estimation (denoising) from a statistical
mechanical perspective, using a relationship between the minimum mean square
error (MMSE), of estimating a signal, and the mutual information between this
signal and its noisy version. The paper consists of essentially two parts. In
the first, we derive several statistical-mechanical relationships between a few
important quantities in this problem area, such as the MMSE, the differential
entropy, the Fisher information, the free energy, and a generalized notion of
temperature. We also draw analogies and differences between certain relations
pertaining to the estimation problem and the parallel relations in
thermodynamics and statistical physics. In the second part of the paper, we
provide several application examples, where we demonstrate how certain analysis
tools that are customary in statistical physics, prove useful in the analysis
of the MMSE. In most of these examples, the corresponding
statistical-mechanical systems turn out to consist of strong interactions that
cause phase transitions, which in turn are reflected as irregularities and
discontinuities (similar to threshold effects) in the behavior of the MMSE.
| [
{
"version": "v1",
"created": "Mon, 29 Dec 2008 10:26:18 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Merhav",
"Neri",
"",
"Shitz"
],
[
"Guo",
"Dongning",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4893 | Jukka Suomela | Patrik Flor\'een, Petteri Kaski, Valentin Polishchuk, Jukka Suomela | Almost stable matchings in constant time | 20 pages | Algorithmica 58 (2010) 102-118 | 10.1007/s00453-009-9353-9 | null | cs.DS cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that the ratio of matched individuals to blocking pairs grows
linearly with the number of propose--accept rounds executed by the
Gale--Shapley algorithm for the stable marriage problem. Consequently, the
participants can arrive at an almost stable matching even without full
information about the problem instance; for each participant, knowing only its
local neighbourhood is enough. In distributed-systems parlance, this means that
if each person has only a constant number of acceptable partners, an almost
stable matching emerges after a constant number of synchronous communication
rounds. This holds even if ties are present in the preference lists.
We apply our results to give a distributed $(2+\epsilon)$-approximation
algorithm for maximum-weight matching in bicoloured graphs and a centralised
randomised constant-time approximation scheme for estimating the size of a
stable matching.
| [
{
"version": "v1",
"created": "Mon, 29 Dec 2008 11:04:46 GMT"
}
]
| 2012-05-15T00:00:00 | [
[
"Floréen",
"Patrik",
""
],
[
"Kaski",
"Petteri",
""
],
[
"Polishchuk",
"Valentin",
""
],
[
"Suomela",
"Jukka",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0812.4905 | Jure Leskovec | Jure Leskovec, Deepayan Chakrabarti, Jon Kleinberg, Christos Faloutsos
and Zoubin Ghahramani | Kronecker Graphs: An Approach to Modeling Networks | null | null | null | null | stat.ML cs.DS physics.data-an physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | How can we model networks with a mathematically tractable model that allows
for rigorous analysis of network properties? Networks exhibit a long list of
surprising properties: heavy tails for the degree distribution; small
diameters; and densification and shrinking diameters over time. Most present
network models either fail to match several of the above properties, are
complicated to analyze mathematically, or both. In this paper we propose a
generative model for networks that is both mathematically tractable and can
generate networks that have the above mentioned properties. Our main idea is to
use the Kronecker product to generate graphs that we refer to as "Kronecker
graphs".
First, we prove that Kronecker graphs naturally obey common network
properties. We also provide empirical evidence showing that Kronecker graphs
can effectively model the structure of real networks.
We then present KronFit, a fast and scalable algorithm for fitting the
Kronecker graph generation model to large real networks. A naive approach to
fitting would take super- exponential time. In contrast, KronFit takes linear
time, by exploiting the structure of Kronecker matrix multiplication and by
using statistical simulation techniques.
Experiments on large real and synthetic networks show that KronFit finds
accurate parameters that indeed very well mimic the properties of target
networks. Once fitted, the model parameters can be used to gain insights about
the network structure, and the resulting synthetic graphs can be used for null-
models, anonymization, extrapolations, and graph summarization.
| [
{
"version": "v1",
"created": "Mon, 29 Dec 2008 13:22:23 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Aug 2009 21:52:11 GMT"
}
]
| 2009-08-22T00:00:00 | [
[
"Leskovec",
"Jure",
""
],
[
"Chakrabarti",
"Deepayan",
""
],
[
"Kleinberg",
"Jon",
""
],
[
"Faloutsos",
"Christos",
""
],
[
"Ghahramani",
"Zoubin",
""
]
]
| [
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0812.4919 | Ildik\'o Schlotter | D\'aniel Marx, Ildik\'o Schlotter | Obtaining a Planar Graph by Vertex Deletion | 16 pages, 4 figures. A preliminary version of this paper appeared in
the proceedings of WG 2007 (33rd International Workshop on Graph-Theoretic
Concepts in Computer Science). The paper has been submitted to Algorithmica | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the k-Apex problem the task is to find at most k vertices whose deletion
makes the given graph planar. The graphs for which there exists a solution form
a minor closed class of graphs, hence by the deep results of Robertson and
Seymour, there is an O(n^3) time algorithm for every fixed value of k. However,
the proof is extremely complicated and the constants hidden by the big-O
notation are huge. Here we give a much simpler algorithm for this problem with
quadratic running time, by iteratively reducing the input graph and then
applying techniques for graphs of bounded treewidth.
| [
{
"version": "v1",
"created": "Mon, 29 Dec 2008 14:57:14 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Marx",
"Dániel",
""
],
[
"Schlotter",
"Ildikó",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.4937 | Peter Trifonov | Peter Trifonov | Efficient Interpolation in the Guruswami-Sudan Algorithm | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2010.2053901 | null | cs.IT cs.DM math.AC math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A novel algorithm is proposed for the interpolation step of the
Guruswami-Sudan list decoding algorithm. The proposed method is based on the
binary exponentiation algorithm, and can be considered as an extension of the
Lee-O'Sullivan algorithm. The algorithm is shown to achieve both asymptotical
and practical performance gain compared to the case of iterative interpolation
algorithm. Further complexity reduction is achieved by integrating the proposed
method with re-encoding. The key contribution of the paper, which enables the
complexity reduction, is a novel randomized ideal multiplication algorithm.
| [
{
"version": "v1",
"created": "Mon, 29 Dec 2008 16:52:28 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jun 2009 17:03:44 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Apr 2010 06:35:05 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Trifonov",
"Peter",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4952 | John Langford | Alina Beygelzimer, Sanjoy Dasgupta, and John Langford | Importance Weighted Active Learning | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a practical and statistically consistent scheme for actively
learning binary classifiers under general loss functions. Our algorithm uses
importance weighting to correct sampling bias, and by controlling the variance,
we are able to give rigorous label complexity bounds for the learning process.
Experiments on passively labeled data show that this approach reduces the label
complexity required to achieve good predictive performance on many learning
problems.
| [
{
"version": "v1",
"created": "Mon, 29 Dec 2008 18:29:08 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Feb 2009 20:56:24 GMT"
},
{
"version": "v3",
"created": "Thu, 7 May 2009 13:14:45 GMT"
},
{
"version": "v4",
"created": "Wed, 20 May 2009 17:40:23 GMT"
}
]
| 2009-05-20T00:00:00 | [
[
"Beygelzimer",
"Alina",
""
],
[
"Dasgupta",
"Sanjoy",
""
],
[
"Langford",
"John",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0812.4973 | Neil Dickson | Neil G. Dickson | A Simple, Linear-Time Algorithm for x86 Jump Encoding | 5 pages | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of space-optimal jump encoding in the x86 instruction set, also
known as branch displacement optimization, is described, and a linear-time
algorithm is given that uses no complicated data structures, no recursion, and
no randomization. The only assumption is that there are no array declarations
whose size depends on the negative of the size of a section of code (Hyde
2006), which is reasonable for real code.
| [
{
"version": "v1",
"created": "Mon, 29 Dec 2008 21:07:52 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Dickson",
"Neil G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0812.4974 | Charles Fulton | Cecilia Knoll, Charles Fulton | Using a computer algebra system to simplify expressions for
Titchmarsh-Weyl m-functions associated with the Hydrogen Atom on the half
line | 10 pages | null | null | null | math.SP cs.SC math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we give simplified formulas for certain polynomials which arise
in some new Titchmarsh-Weyl m-functions for the radial part of the separated
Hydrogen atom on the half line and two independent programs for generating them
using the symbolic manipulator Mathematica.
| [
{
"version": "v1",
"created": "Mon, 29 Dec 2008 21:10:17 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Knoll",
"Cecilia",
""
],
[
"Fulton",
"Charles",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.SP",
"description": "Schrodinger operators, operators on manifolds, general differential operators, numerical studies, integral operators, discrete models, resonances, non-self-adjoint operators, random operators/matrices",
"span": "(Spectral Theory)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0812.4983 | Md. Borhan Uddin | Nitesh Saxena and Md. Borhan Uddin | Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly
Initialization of Sensor Nodes | 10 Pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To establish secure (point-to-point and/or broadcast) communication channels
among the nodes of a wireless sensor network is a fundamental task. To this
end, a plethora of (socalled) key pre-distribution schemes have been proposed
in the past. All these schemes, however, rely on shared secret(s), which are
assumed to be somehow pre-loaded onto the sensor nodes. In this paper, we
propose a novel method for secure initialization of sensor nodes based on a
visual out-of-band channel. Using the proposed method, the administrator of a
sensor network can distribute keys onto the sensor nodes, necessary to
bootstrap key pre-distribution. Our secure initialization method requires only
a little extra cost, is efficient and scalable with respect to the number of
sensor nodes. Moreover, based on a usability study that we conducted, the
method turns out to be quite user-friendly and easy to use by naive human
users.
| [
{
"version": "v1",
"created": "Tue, 30 Dec 2008 01:34:29 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Saxena",
"Nitesh",
""
],
[
"Uddin",
"Md. Borhan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0812.4985 | Goochul Chung | G. Chung, S. Sridharan, S. Vishwanath, C. S. Hwang | On the Capacity of Partially Cognitive Radios | 7 pages,2 figures | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by/3.0/ | This paper considers the problem of cognitive radios with partial-message
information. Here, an interference channel setting is considered where one
transmitter (the "cognitive" one) knows the message of the other ("legitimate"
user) partially. An outer bound on the capacity region of this channel is found
for the "weak" interference case (where the interference from the cognitive
transmitter to the legitimate receiver is weak). This outer bound is shown for
both the discrete-memoryless and the Gaussian channel cases. An achievable
region is subsequently determined for a mixed interference Gaussian cognitive
radio channel, where the interference from the legitimate transmitter to the
cognitive receiver is "strong". It is shown that, for a class of mixed Gaussian
cognitive radio channels, portions of the outer bound are achievable thus
resulting in a characterization of a part of this channel's capacity region.
| [
{
"version": "v1",
"created": "Mon, 29 Dec 2008 23:04:08 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Chung",
"G.",
""
],
[
"Sridharan",
"S.",
""
],
[
"Vishwanath",
"S.",
""
],
[
"Hwang",
"C. S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0812.4986 | Albrecht Schmidt | Albrecht Schmidt | An Array Algebra | Five pages, no figures | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is a proposal of an algebra which aims at distributed array processing.
The focus lies on re-arranging and distributing array data, which may be
multi-dimensional. The context of the work is scientific processing; thus, the
core science operations are assumed to be taken care of in external libraries
or languages. A main design driver is the desire to carry over some of the
strategies of the relational algebra into the array domain.
| [
{
"version": "v1",
"created": "Mon, 29 Dec 2008 23:14:00 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Schmidt",
"Albrecht",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0812.5026 | Shamgar Gurevich | Shamgar Gurevich (UC Berkeley), Ronny Hadani (University of Chicago),
Nir Sochen (Tel Aviv University) | Group representation design of digital signals and sequences | Appeared in the proceedings of the international conference on
Sequences and Their Applications (SETA) 2008. Key words: Weil representation,
commutative subgroups, eigenfunctions, good correlations, low supremum,
Fourier invariance, explicit algorithm | null | null | null | cs.IT cs.DM math.IT math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this survey a novel system, called the oscillator system, consisting of
order of p^3 functions (signals) on the finite field F_{p}, is described and
studied. The new functions are proved to satisfy good auto-correlation,
cross-correlation and low peak-to-average power ratio properties. Moreover, the
oscillator system is closed under the operation of discrete Fourier transform.
Applications of the oscillator system for discrete radar and digital
communication theory are explained. Finally, an explicit algorithm to construct
the oscillator system is presented.
| [
{
"version": "v1",
"created": "Tue, 30 Dec 2008 08:03:43 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Gurevich",
"Shamgar",
"",
"UC Berkeley"
],
[
"Hadani",
"Ronny",
"",
"University of Chicago"
],
[
"Sochen",
"Nir",
"",
"Tel Aviv University"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
]
|
0812.5030 | Gregory Price | Daniel Kane, Gregory N. Price, and Erik D. Demaine | A Pseudopolynomial Algorithm for Alexandrov's Theorem | 25 pages; new Delaunay triangulation algorithm, minor other changes;
an abbreviated v2 was at WADS 2009 | null | null | null | cs.CG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Alexandrov's Theorem states that every metric with the global topology and
local geometry required of a convex polyhedron is in fact the intrinsic metric
of a unique convex polyhedron. Recent work by Bobenko and Izmestiev describes a
differential equation whose solution leads to the polyhedron corresponding to a
given metric. We describe an algorithm based on this differential equation to
compute the polyhedron to arbitrary precision given the metric, and prove a
pseudopolynomial bound on its running time. Along the way, we develop
pseudopolynomial algorithms for computing shortest paths and weighted Delaunay
triangulations on a polyhedral surface, even when the surface edges are not
shortest paths.
| [
{
"version": "v1",
"created": "Tue, 30 Dec 2008 08:41:29 GMT"
},
{
"version": "v2",
"created": "Wed, 27 May 2009 03:04:09 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Jan 2010 02:43:09 GMT"
}
]
| 2010-01-04T00:00:00 | [
[
"Kane",
"Daniel",
""
],
[
"Price",
"Gregory N.",
""
],
[
"Demaine",
"Erik D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0812.5032 | Qiang Li | Qiang Li, Yan He, Jing-ping Jiang | A New Clustering Algorithm Based Upon Flocking On Complex Network | 18 pages, 4 figures, 3 tables | null | null | null | cs.LG cs.AI cs.CV physics.soc-ph | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We have proposed a model based upon flocking on a complex network, and then
developed two clustering algorithms on the basis of it. In the algorithms,
firstly a \textit{k}-nearest neighbor (knn) graph as a weighted and directed
graph is produced among all data points in a dataset each of which is regarded
as an agent who can move in space, and then a time-varying complex network is
created by adding long-range links for each data point. Furthermore, each data
point is not only acted by its \textit{k} nearest neighbors but also \textit{r}
long-range neighbors through fields established in space by them together, so
it will take a step along the direction of the vector sum of all fields. It is
more important that these long-range links provides some hidden information for
each data point when it moves and at the same time accelerate its speed
converging to a center. As they move in space according to the proposed model,
data points that belong to the same class are located at a same position
gradually, whereas those that belong to different classes are away from one
another. Consequently, the experimental results have demonstrated that data
points in datasets are clustered reasonably and efficiently, and the rates of
convergence of clustering algorithms are fast enough. Moreover, the comparison
with other algorithms also provides an indication of the effectiveness of the
proposed approach.
| [
{
"version": "v1",
"created": "Tue, 30 Dec 2008 08:30:27 GMT"
}
]
| 2008-12-31T00:00:00 | [
[
"Li",
"Qiang",
""
],
[
"He",
"Yan",
""
],
[
"Jiang",
"Jing-ping",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0812.5039 | Gabriel Nivasch | Boris Bukh, Ji\v{r}\'i Matou\v{s}ek, Gabriel Nivasch | Lower bounds for weak epsilon-nets and stair-convexity | To appear in Israel J. Math. 21 pages, 4 figures | Israel Journal of Mathematics, 182:199-228, 2011 | 10.1007/s11856-011-0029-1 | null | math.CO cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A set N is called a "weak epsilon-net" (with respect to convex sets) for a
finite set X in R^d if N intersects every convex set that contains at least
epsilon*|X| points of X. For every fixed d>=2 and every r>=1 we construct sets
X in R^d for which every weak (1/r)-net has at least Omega(r log^{d-1} r)
points; this is the first superlinear lower bound for weak epsilon-nets in a
fixed dimension.
The construction is a "stretched grid", i.e., the Cartesian product of d
suitable fast-growing finite sequences, and convexity in this grid can be
analyzed using "stair-convexity", a new variant of the usual notion of
convexity.
We also consider weak epsilon-nets for the diagonal of our stretched grid in
R^d, d>=3, which is an "intrinsically 1-dimensional" point set. In this case we
exhibit slightly superlinear lower bounds (involving the inverse Ackermann
function), showing that upper bounds by Alon, Kaplan, Nivasch, Sharir, and
Smorodinsky (2008) are not far from the truth in the worst case.
Using the stretched grid we also improve the known upper bound for the
so-called "second selection lemma" in the plane by a logarithmic factor: We
obtain a set T of t triangles with vertices in an n-point set in the plane such
that no point is contained in more than O(t^2 / (n^3 log (n^3/t))) triangles of
T.
| [
{
"version": "v1",
"created": "Tue, 30 Dec 2008 09:21:04 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Oct 2009 14:22:55 GMT"
}
]
| 2013-03-25T00:00:00 | [
[
"Bukh",
"Boris",
""
],
[
"Matoušek",
"Jiří",
""
],
[
"Nivasch",
"Gabriel",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0812.5064 | Qiang Li | Qiang Li, Zhuo Chen, Yan He, Jing-ping Jiang | A Novel Clustering Algorithm Based Upon Games on Evolving Network | 17 pages, 5 figures, 3 tables | Expert Systems with Applications, 2010 | 10.1016/j.eswa.2010.02.050 | null | cs.LG cs.CV cs.GT nlin.AO | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper introduces a model based upon games on an evolving network, and
develops three clustering algorithms according to it. In the clustering
algorithms, data points for clustering are regarded as players who can make
decisions in games. On the network describing relationships among data points,
an edge-removing-and-rewiring (ERR) function is employed to explore in a
neighborhood of a data point, which removes edges connecting to neighbors with
small payoffs, and creates new edges to neighbors with larger payoffs. As such,
the connections among data points vary over time. During the evolution of
network, some strategies are spread in the network. As a consequence, clusters
are formed automatically, in which data points with the same evolutionarily
stable strategy are collected as a cluster, so the number of evolutionarily
stable strategies indicates the number of clusters. Moreover, the experimental
results have demonstrated that data points in datasets are clustered reasonably
and efficiently, and the comparison with other algorithms also provides an
indication of the effectiveness of the proposed algorithms.
| [
{
"version": "v1",
"created": "Tue, 30 Dec 2008 13:22:31 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Mar 2010 13:30:08 GMT"
}
]
| 2010-03-22T00:00:00 | [
[
"Li",
"Qiang",
""
],
[
"Chen",
"Zhuo",
""
],
[
"He",
"Yan",
""
],
[
"Jiang",
"Jing-ping",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
]
|
0812.5101 | Katarzyna Paluch | Katarzyna Paluch, Marcin Mucha, Aleksander Madry | A 7/9 - Approximation Algorithm for the Maximum Traveling Salesman
Problem | 6 figures | null | 10.1007/978-3-642-03685-9_23 | null | cs.GT cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a 7/9 - Approximation Algorithm for the Maximum Traveling Salesman
Problem.
| [
{
"version": "v1",
"created": "Tue, 30 Dec 2008 19:11:48 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Paluch",
"Katarzyna",
""
],
[
"Mucha",
"Marcin",
""
],
[
"Madry",
"Aleksander",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0812.5104 | Salah A. Aly | Salah A. Aly | On Quantum and Classical Error Control Codes: Constructions and
Applications | Parts of PhD dissertation, Texas A&M University | null | null | null | cs.IT math.IT quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is conjectured that quantum computers are able to solve certain problems
more quickly than any deterministic or probabilistic computer. A quantum
computer exploits the rules of quantum mechanics to speed up computations.
However, it is a formidable task to build a quantum computer, since the quantum
mechanical systems storing the information unavoidably interact with their
environment. Therefore, one has to mitigate the resulting noise and decoherence
effects to avoid computational errors.
In this work, I study various aspects of quantum error control codes -- the
key component of fault-tolerant quantum information processing. I present the
fundamental theory and necessary background of quantum codes and construct many
families of quantum block and convolutional codes over finite fields, in
addition to families of subsystem codes over symmetric and asymmetric channels.
Particularly, many families of quantum BCH, RS, duadic, and convolutional
codes are constructed over finite fields. Families of subsystem codes and a
class of optimal MDS subsystem codes are derived over asymmetric and symmetric
quantum channels. In addition, propagation rules and tables of upper bounds on
subsystem code parameters are established. Classes of quantum and classical
LDPC codes based on finite geometries and Latin squares are constructed.
| [
{
"version": "v1",
"created": "Tue, 30 Dec 2008 20:09:07 GMT"
}
]
| 2009-08-15T00:00:00 | [
[
"Aly",
"Salah A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0901.0015 | Peter Harremo\"es | Peter Harremoes | Maximum Entropy on Compact Groups | null | Entropy 2009, 11(2), 222-237 | 10.3390/e11020222 | null | cs.IT math.IT math.PR | http://creativecommons.org/licenses/by/3.0/ | On a compact group the Haar probability measure plays the role of uniform
distribution. The entropy and rate distortion theory for this uniform
distribution is studied. New results and simplified proofs on convergence of
convolutions on compact groups are presented and they can be formulated as
entropy increases to its maximum. Information theoretic techniques and Markov
chains play a crucial role. The convergence results are also formulated via
rate distortion functions. The rate of convergence is shown to be exponential.
| [
{
"version": "v1",
"created": "Tue, 30 Dec 2008 21:09:28 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Mar 2009 22:19:38 GMT"
}
]
| 2010-05-27T00:00:00 | [
[
"Harremoes",
"Peter",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0901.0029 | John J. Rehr | J. J. Rehr, J. P. Gardner, M. Prange, L. Svec and F. Vila | Scientific Computing in the Cloud | null | null | null | null | cond-mat.mtrl-sci cs.DC physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the feasibility of high performance scientific computation
using cloud computers as an alternative to traditional computational tools. The
availability of these large, virtualized pools of compute resources raises the
possibility of a new compute paradigm for scientific research with many
advantages. For research groups, cloud computing provides convenient access to
reliable, high performance clusters and storage, without the need to purchase
and maintain sophisticated hardware. For developers, virtualization allows
scientific codes to be optimized and pre-installed on machine images,
facilitating control over the computational environment. Preliminary tests are
presented for serial and parallelized versions of the widely used x-ray
spectroscopy and electronic structure code FEFF on the Amazon Elastic Compute
Cloud, including CPU and network performance.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 20:35:40 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"Rehr",
"J. J.",
""
],
[
"Gardner",
"J. P.",
""
],
[
"Prange",
"M.",
""
],
[
"Svec",
"L.",
""
],
[
"Vila",
"F.",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.mtrl-sci",
"description": "Techniques, synthesis, characterization, structure. Structural phase transitions, mechanical properties, phonons. Defects, adsorbates, interfaces",
"span": "(Materials Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
]
|
0901.0042 | Zhuo Li | Zhuo Li, Li-Juan Xing, and Xin-Mei Wang | A family of asymptotically good quantum codes based on code
concatenation | 10 pages | null | null | null | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We explicitly construct an infinite family of asymptotically good
concatenated quantum stabilizer codes where the outer code uses CSS-type
quantum Reed-Solomon code and the inner code uses a set of special quantum
codes. In the field of quantum error-correcting codes, this is the first time
that a family of asymptotically good quantum codes is derived from bad codes.
Its occurrence supplies a gap in quantum coding theory.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 02:57:22 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Li",
"Zhuo",
""
],
[
"Xing",
"Li-Juan",
""
],
[
"Wang",
"Xin-Mei",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0043 | Rob van Glabbeek | Rob van Glabbeek, Ursula Goltz, Jens-Wolfhard Schicke | Symmetric and Asymmetric Asynchronous Interaction | 27 pages. An extended abstract of this paper was presented at the
first Interaction and Concurrency Experience (ICE'08) on Synchronous and
Asynchronous Interactions in Concurrent Distributed Systems, and will appear
in Electronic Notes in Theoretical Computer Science, Elsevier | null | null | Technical Report 2008-03, Technical University of Braunschweig | cs.LO cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate classes of systems based on different interaction patterns
with the aim of achieving distributability. As our system model we use Petri
nets. In Petri nets, an inherent concept of simultaneity is built in, since
when a transition has more than one preplace, it can be crucial that tokens are
removed instantaneously. When modelling a system which is intended to be
implemented in a distributed way by a Petri net, this built-in concept of
synchronous interaction may be problematic. To investigate this we consider
asynchronous implementations of nets, in which removing tokens from places can
no longer be considered as instantaneous. We model this by inserting silent
(unobservable) transitions between transitions and some of their preplaces. We
investigate three such implementations, differing in the selection of preplaces
of a transition from which the removal of a token is considered time consuming,
and the possibility of collecting the tokens in a given order.
We investigate the effect of these different transformations of instantaneous
interaction into asynchronous interaction patterns by comparing the behaviours
of nets before and after insertion of the silent transitions. We exhibit for
which classes of Petri nets we obtain equivalent behaviour with respect to
failures equivalence.
It turns out that the resulting hierarchy of Petri net classes can be
described by semi-structural properties. For two of the classes we obtain
precise characterisations; for the remaining class we obtain lower and upper
bounds.
We briefly comment on possible applications of our results to Message
Sequence Charts.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 03:43:25 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"van Glabbeek",
"Rob",
""
],
[
"Goltz",
"Ursula",
""
],
[
"Schicke",
"Jens-Wolfhard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0901.0044 | Mokshay Madiman | Mokshay Madiman and Prasad Tetali | Information Inequalities for Joint Distributions, with Interpretations
and Applications | 15 pages, 1 figure. Originally submitted to the IEEE Transactions on
Information Theory in May 2007, the current version incorporates reviewer
comments including elimination of an error | IEEE Transactions on Information Theory, Vol. 56(6), pp.
2699-2713, June 2010 | null | null | cs.IT math.CO math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Upper and lower bounds are obtained for the joint entropy of a collection of
random variables in terms of an arbitrary collection of subset joint entropies.
These inequalities generalize Shannon's chain rule for entropy as well as
inequalities of Han, Fujishige and Shearer. A duality between the upper and
lower bounds for joint entropy is developed. All of these results are shown to
be special cases of general, new results for submodular functions-- thus, the
inequalities presented constitute a richly structured class of Shannon-type
inequalities. The new inequalities are applied to obtain new results in
combinatorics, such as bounds on the number of independent sets in an arbitrary
graph and the number of zero-error source-channel codes, as well as new
determinantal inequalities in matrix theory. A new inequality for relative
entropies is also developed, along with interpretations in terms of hypothesis
testing. Finally, revealing connections of the results to literature in
economics, computer science, and physics are explored.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 03:13:13 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Aug 2009 07:04:16 GMT"
}
]
| 2010-06-17T00:00:00 | [
[
"Madiman",
"Mokshay",
""
],
[
"Tetali",
"Prasad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0901.0048 | Rob van Glabbeek | Rob van Glabbeek, Ursula Goltz and Jens-Wolfhard Schicke | On Synchronous and Asynchronous Interaction in Distributed Systems | 26 pages. An extended abstract of this paper appeared in Proceedings
33rd International Symposium on Mathematical Foundations of Computer Science
(MFCS 2008), Torun, Poland, August 2008 (E. Ochmanski & J. Tyszkiewicz,
eds.), LNCS 5162, Springer, 2008, pp. 16-35 | null | null | Technical Report 2008-04, Technical University of Braunschweig | cs.LO cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When considering distributed systems, it is a central issue how to deal with
interactions between components. In this paper, we investigate the paradigms of
synchronous and asynchronous interaction in the context of distributed systems.
We investigate to what extent or under which conditions synchronous interaction
is a valid concept for specification and implementation of such systems. We
choose Petri nets as our system model and consider different notions of
distribution by associating locations to elements of nets. First, we
investigate the concept of simultaneity which is inherent in the semantics of
Petri nets when transitions have multiple input places. We assume that tokens
may only be taken instantaneously by transitions on the same location. We
exhibit a hierarchy of `asynchronous' Petri net classes by different
assumptions on possible distributions. Alternatively, we assume that the
synchronisations specified in a Petri net are crucial system properties. Hence
transitions and their preplaces may no longer placed on separate locations. We
then answer the question which systems may be implemented in a distributed way
without restricting concurrency, assuming that locations are inherently
sequential. It turns out that in both settings we find semi-structural
properties of Petri nets describing exactly the problematic situations for
interactions in distributed systems.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 04:13:35 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"van Glabbeek",
"Rob",
""
],
[
"Goltz",
"Ursula",
""
],
[
"Schicke",
"Jens-Wolfhard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0901.0055 | Mokshay Madiman | Mokshay Madiman, Adam Marcus, Prasad Tetali | Entropy and set cardinality inequalities for partition-determined
functions | 26 pages. v2: Revised version incorporating referee feedback plus
inclusion of some additional corollaries and discussion. v3: Final version
with minor corrections. To appear in Random Structures and Algorithms | Random Structures and Algorithms, Vol. 40, pp. 399-424, 2012 | 10.1002/rsa.20385 | null | cs.IT math.CO math.IT math.NT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new notion of partition-determined functions is introduced, and several
basic inequalities are developed for the entropy of such functions of
independent random variables, as well as for cardinalities of compound sets
obtained using these functions. Here a compound set means a set obtained by
varying each argument of a function of several variables over a set associated
with that argument, where all the sets are subsets of an appropriate algebraic
structure so that the function is well defined. On the one hand, the entropy
inequalities developed for partition-determined functions imply entropic
analogues of general inequalities of Pl\"unnecke-Ruzsa type. On the other hand,
the cardinality inequalities developed for compound sets imply several
inequalities for sumsets, including for instance a generalization of
inequalities proved by Gyarmati, Matolcsi and Ruzsa (2010). We also provide
partial progress towards a conjecture of Ruzsa (2007) for sumsets in nonabelian
groups. All proofs are elementary and rely on properly developing certain
information-theoretic inequalities.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 04:30:15 GMT"
},
{
"version": "v2",
"created": "Sun, 12 Jun 2011 00:51:32 GMT"
},
{
"version": "v3",
"created": "Wed, 10 Aug 2011 03:55:13 GMT"
}
]
| 2012-06-05T00:00:00 | [
[
"Madiman",
"Mokshay",
""
],
[
"Marcus",
"Adam",
""
],
[
"Tetali",
"Prasad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0901.0062 | Mokshay Madiman | Mokshay Madiman | Cores of Cooperative Games in Information Theory | 12 pages, published at
http://www.hindawi.com/GetArticle.aspx?doi=10.1155/2008/318704 in EURASIP
Journal on Wireless Communications and Networking, Special Issue on "Theory
and Applications in Multiuser/Multiterminal Communications", April 2008 | EURASIP Journal on Wireless Communications and Networking, Volume
2008, Article ID 318704 | 10.1155/2008/318704 | null | cs.IT cs.GT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cores of cooperative games are ubiquitous in information theory, and arise
most frequently in the characterization of fundamental limits in various
scenarios involving multiple users. Examples include classical settings in
network information theory such as Slepian-Wolf source coding and multiple
access channels, classical settings in statistics such as robust hypothesis
testing, and new settings at the intersection of networking and statistics such
as distributed estimation problems for sensor networks. Cooperative game theory
allows one to understand aspects of all of these problems from a fresh and
unifying perspective that treats users as players in a game, sometimes leading
to new insights. At the heart of these analyses are fundamental dualities that
have been long studied in the context of cooperative games; for information
theoretic purposes, these are dualities between information inequalities on the
one hand and properties of rate, capacity or other resource allocation regions
on the other.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 05:26:59 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"Madiman",
"Mokshay",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0065 | Alireza Avanaki | Alireza Avanaki | Exact Histogram Specification Optimized for Structural Similarity | null | null | 10.1007/s10043-009-0119-z | null | cs.CV cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An exact histogram specification (EHS) method modifies its input image to
have a specified histogram. Applications of EHS include image (contrast)
enhancement (e.g., by histogram equalization) and histogram watermarking.
Performing EHS on an image, however, reduces its visual quality. Starting from
the output of a generic EHS method, we maximize the structural similarity index
(SSIM) between the original image (before EHS) and the result of EHS
iteratively. Essential in this process is the computationally simple and
accurate formula we derive for SSIM gradient. As it is based on gradient
ascent, the proposed EHS always converges. Experimental results confirm that
while obtaining the histogram exactly as specified, the proposed method
invariably outperforms the existing methods in terms of visual quality of the
result. The computational complexity of the proposed method is shown to be of
the same order as that of the existing methods.
Index terms: histogram modification, histogram equalization, optimization for
perceptual visual quality, structural similarity gradient ascent, histogram
watermarking, contrast enhancement.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 06:13:39 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Avanaki",
"Alireza",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0901.0118 | Jubin Jose | Jubin Jose, Lei Ying, Sriram Vishwanath | On the Stability Region of Amplify-and-Forward Cooperative Relay
Networks | accepted for presentation at ITW 2009, Taormina, Sicily | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers an amplify-and-forward relay network with fading states.
Amplify-and-forward scheme (along with its variations) is the core mechanism
for enabling cooperative communication in wireless networks, and hence
understanding the network stability region under amplify-and-forward scheme is
very important. However, in a relay network employing amplify-and-forward, the
interaction between nodes is described in terms of real-valued ``packets''
(signals) instead of discrete packets (bits). This restrains the relay nodes
from re-encoding the packets at desired rates. Hence, the stability analysis
for relay networks employing amplify-and-forward scheme is by no means a
straightforward extension of that in packet-based networks. In this paper, the
stability region of a four-node relay network is characterized, and a simple
throughput optimal algorithm with joint scheduling and rate allocation is
proposed.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 17:00:12 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Aug 2009 06:02:12 GMT"
}
]
| 2009-08-06T00:00:00 | [
[
"Jose",
"Jubin",
""
],
[
"Ying",
"Lei",
""
],
[
"Vishwanath",
"Sriram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0121 | Vahan Mkrtchyan | Artur Khojabaghyan, Vahan V. Mkrtchyan | On upper bounds for parameters related to construction of special
maximum matchings | 11 pages, no figures | Discrete Mathematics 312/2 (2012), pp. 213--220 | 10.1016/j.disc.2011.08.026 | null | cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a graph $G$ let $L(G)$ and $l(G)$ denote the size of the largest and
smallest maximum matching of a graph obtained from $G$ by removing a maximum
matching of $G$. We show that $L(G)\leq 2l(G),$ and $L(G)\leq (3/2)l(G)$
provided that $G$ contains a perfect matching. We also characterize the class
of graphs for which $L(G)=2l(G)$. Our characterization implies the existence of
a polynomial algorithm for testing the property $L(G)=2l(G)$. Finally we show
that it is $NP$-complete to test whether a graph $G$ containing a perfect
matching satisfies $L(G)=(3/2)l(G)$.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 17:23:00 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Jun 2010 08:13:18 GMT"
},
{
"version": "v3",
"created": "Mon, 25 Jul 2011 09:38:59 GMT"
}
]
| 2011-11-17T00:00:00 | [
[
"Khojabaghyan",
"Artur",
""
],
[
"Mkrtchyan",
"Vahan V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0901.0131 | Ioan Raicu | Ian Foster, Yong Zhao, Ioan Raicu, Shiyong Lu | Cloud Computing and Grid Computing 360-Degree Compared | IEEE Grid Computing Environments (GCE08) 2008 | null | 10.1109/GCE.2008.4738445 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cloud Computing has become another buzzword after Web 2.0. However, there are
dozens of different definitions for Cloud Computing and there seems to be no
consensus on what a Cloud is. On the other hand, Cloud Computing is not a
completely new concept; it has intricate connection to the relatively new but
thirteen-year established Grid Computing paradigm, and other relevant
technologies such as utility computing, cluster computing, and distributed
systems in general. This paper strives to compare and contrast Cloud Computing
with Grid Computing from various angles and give insights into the essential
characteristics of both.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 19:13:05 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Foster",
"Ian",
""
],
[
"Zhao",
"Yong",
""
],
[
"Raicu",
"Ioan",
""
],
[
"Lu",
"Shiyong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0901.0134 | Ioan Raicu | Zhao Zhang, Allan Espinosa, Kamil Iskra, Ioan Raicu, Ian Foster,
Michael Wilde | Design and Evaluation of a Collective IO Model for Loosely Coupled
Petascale Programming | IEEE Many-Task Computing on Grids and Supercomputers (MTAGS08) 2008 | null | 10.1109/MTAGS.2008.4777908 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Loosely coupled programming is a powerful paradigm for rapidly creating
higher-level applications from scientific programs on petascale systems,
typically using scripting languages. This paradigm is a form of many-task
computing (MTC) which focuses on the passing of data between programs as
ordinary files rather than messages. While it has the significant benefits of
decoupling producer and consumer and allowing existing application programs to
be executed in parallel with no recoding, its typical implementation using
shared file systems places a high performance burden on the overall system and
on the user who will analyze and consume the downstream data. Previous efforts
have achieved great speedups with loosely coupled programs, but have done so
with careful manual tuning of all shared file system access. In this work, we
evaluate a prototype collective IO model for file-based MTC. The model enables
efficient and easy distribution of input data files to computing nodes and
gathering of output results from them. It eliminates the need for such manual
tuning and makes the programming of large-scale clusters using a loosely
coupled model easier. Our approach, inspired by in-memory approaches to
collective operations for parallel programming, builds on fast local file
systems to provide high-speed local file caches for parallel scripts, uses a
broadcast approach to handle distribution of common input data, and uses
efficient scatter/gather and caching techniques for input and output. We
describe the design of the prototype model, its implementation on the Blue
Gene/P supercomputer, and present preliminary measurements of its performance
on synthetic benchmarks and on a large-scale molecular dynamics application.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 19:35:07 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Zhang",
"Zhao",
""
],
[
"Espinosa",
"Allan",
""
],
[
"Iskra",
"Kamil",
""
],
[
"Raicu",
"Ioan",
""
],
[
"Foster",
"Ian",
""
],
[
"Wilde",
"Michael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0901.0148 | Michal Zerola | Michal Zerola, Jerome Lauret, Roman Bartak and Michal Sumbera | Using constraint programming to resolve the multi-source/multi-site data
movement paradigm on the Grid | 10 pages; ACAT 2008 workshop | null | null | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to achieve both fast and coordinated data transfer to collaborative
sites as well as to create a distribution of data over multiple sites,
efficient data movement is one of the most essential aspects in distributed
environment. With such capabilities at hand, truly distributed task scheduling
with minimal latencies would be reachable by internationally distributed
collaborations (such as ones in HENP) seeking for scavenging or maximizing on
geographically spread computational resources. But it is often not all clear
(a) how to move data when available from multiple sources or (b) how to move
data to multiple compute resources to achieve an optimal usage of available
resources. We present a method of creating a Constraint Programming (CP) model
consisting of sites, links and their attributes such as bandwidth for grid
network data transfer also considering user tasks as part of the objective
function for an optimal solution. We will explore and explain trade-off between
schedule generation time and divergence from the optimal solution and show how
to improve and render viable the solution's finding time by using search tree
time limit, approximations, restrictions such as symmetry breaking or grouping
similar tasks together, or generating sequence of optimal schedules by
splitting the input problem. Results of data transfer simulation for each case
will also include a well known Peer-2-Peer model, and time taken to generate a
schedule as well as time needed for a schedule execution will be compared to a
CP optimal solution. We will additionally present a possible implementation
aimed to bring a distributed datasets (multiple sources) to a given site in a
minimal time.
| [
{
"version": "v1",
"created": "Wed, 31 Dec 2008 21:25:32 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Zerola",
"Michal",
""
],
[
"Lauret",
"Jerome",
""
],
[
"Bartak",
"Roman",
""
],
[
"Sumbera",
"Michal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0901.0163 | Manish Agarwal | Manish Agarwal, Dongning Guo, Michael Honig | Limited-Rate Channel State Feedback for Multicarrier Block Fading
Channels | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2010.2080970 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The capacity of a fading channel can be substantially increased by feeding
back channel state information from the receiver to the transmitter. With
limited-rate feedback what state information to feed back and how to encode it
are important open questions. This paper studies power loading in a
multicarrier system using no more than one bit of feedback per sub-channel. The
sub-channels can be correlated and full channel state information is assumed at
the receiver.
| [
{
"version": "v1",
"created": "Thu, 1 Jan 2009 05:35:05 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Agarwal",
"Manish",
""
],
[
"Guo",
"Dongning",
""
],
[
"Honig",
"Michael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0168 | Harshan Jagadeesh | J. Harshan, B. Sundar Rajan | Coding for Two-User SISO and MIMO Multiple Access Channels | 18 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constellation Constrained (CC) capacity regions of a two-user SISO Gaussian
Multiple Access Channel (GMAC) with finite complex input alphabets and
continuous output are computed in this paper. When both the users employ the
same code alphabet, it is well known that an appropriate rotation between the
alphabets provides unique decodability to the receiver. For such a set-up, a
metric is proposed to compute the angle(s) of rotation between the alphabets
such that the CC capacity region is maximally enlarged. Subsequently, code
pairs based on Trellis Coded Modulation (TCM) are designed for the two-user
GMAC with $M$-PSK and $M$-PAM alphabet pairs for arbitrary values of $M$ and it
is proved that, for certain angles of rotation, Ungerboeck labelling on the
trellis of each user maximizes the guaranteed squared Euclidean distance of the
\textit{sum trellis}. Hence, such a labelling scheme can be used systematically
to construct trellis code pairs for a two-user GMAC to achieve sum rates close
to the sum capacity of the channel. More importantly, it is shown for the first
time that ML decoding complexity at the destination is significantly reduced
when $M$-PAM alphabet pairs are employed with \textit{almost} no loss in the
sum capacity. \indent A two-user Multiple Input Multiple Output (MIMO) fading
MAC with $N_{t}$ antennas at both the users and a single antenna at the
destination has also been considered with the assumption that the destination
has the perfect knowledge of channel state information and the two users have
the perfect knowledge of only the phase components of their channels. For such
a set-up, two distinct classes of Space Time Block Code (STBC) pairs derived
from the well known class of real orthogonal designs are proposed such that the
STBC pairs are information lossless and have low ML decoding complexity.
| [
{
"version": "v1",
"created": "Thu, 1 Jan 2009 18:05:39 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Jan 2009 06:52:00 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Feb 2009 16:11:13 GMT"
}
]
| 2009-02-09T00:00:00 | [
[
"Harshan",
"J.",
""
],
[
"Rajan",
"B. Sundar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0170 | Tobias Kretz | Tobias Kretz | Pedestrian Traffic: on the Quickest Path | null | J. Stat. Mech. (2009) | 10.1088/1742-5468/2009/03/P03012 | P03012 | physics.soc-ph cs.MA physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When a large group of pedestrians moves around a corner, most pedestrians do
not follow the shortest path, which is to stay as close as possible to the
inner wall, but try to minimize the travel time. For this they accept to move
on a longer path with some distance to the corner, to avoid large densities and
by this succeed in maintaining a comparatively high speed. In many models of
pedestrian dynamics the basic rule of motion is often either "move as far as
possible toward the destination" or - reformulated - "of all coordinates
accessible in this time step move to the one with the smallest distance to the
destination". Atop of this rule modifications are placed to make the motion
more realistic. These modifications usually focus on local behavior and neglect
long-ranged effects. Compared to real pedestrians this leads to agents in a
simulation valuing the shortest path a lot better than the quickest. So, in a
situation as the movement of a large crowd around a corner, one needs an
additional element in a model of pedestrian dynamics that makes the agents
deviate from the rule of the shortest path. In this work it is shown, how this
can be achieved by using a flood fill dynamic potential field method, where
during the filling process the value of a field cell is not increased by 1, but
by a larger value, if it is occupied by an agent. This idea may be an obvious
one, however, the tricky part - and therefore in a strict sense the
contribution of this work - is a) to minimize unrealistic artifacts, as naive
flood fill metrics deviate considerably from the Euclidean metric and in this
respect yield large errors, b) do this with limited computational effort, and
c) keep agents' movement at very low densities unaltered.
| [
{
"version": "v1",
"created": "Thu, 1 Jan 2009 09:29:38 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Kretz",
"Tobias",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.