id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0812.3648
Mehdi Bahrami
Mehdi Bahrami
A New Method for Knowledge Representation in Expert System's (XMLKR)
IEEE Procceding 2008
Emerging Trends in Engineering and Technology, 2008. ICETET '08. First International Conference, IEEE
10.1109/ICETET.2008.194
null
cs.DC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Knowledge representation it is an essential section of a Expert Systems, Because in this section we have a framework to establish an expert system then we can modeling and use by this to design an expert system. Many method it is exist for knowledge representation but each method have problems, in this paper we introduce a new method of object oriented by XML language as XMLKR to knowledge representation, and we want to discuss advantage and disadvantage of this method.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 20:39:48 GMT" } ]
2016-11-17T00:00:00
[ [ "Bahrami", "Mehdi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.3677
Sam Payne
Sam Payne and Elina Robeva
Artificial intelligence for Bidding Hex
7 pages, 2 figures
Games of No Chance 4, MSRI Publications 63 (2015), 207-214
null
null
math.CO cs.GT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a Monte Carlo algorithm for efficiently finding near optimal moves and bids in the game of Bidding Hex. The algorithm is based on the recent solution of Random-Turn Hex by Peres, Schramm, Sheffield, and Wilson together with Richman's work connecting random-turn games to bidding games.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 23:04:10 GMT" } ]
2016-04-19T00:00:00
[ [ "Payne", "Sam", "" ], [ "Robeva", "Elina", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0812.3702
Michael Mahoney
Michael W. Mahoney, Lek-Heng Lim, and Gunnar E. Carlsson
Algorithmic and Statistical Challenges in Modern Large-Scale Data Analysis are the Focus of MMDS 2008
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The 2008 Workshop on Algorithms for Modern Massive Data Sets (MMDS 2008), sponsored by the NSF, DARPA, LinkedIn, and Yahoo!, was held at Stanford University, June 25--28. The goals of MMDS 2008 were (1) to explore novel techniques for modeling and analyzing massive, high-dimensional, and nonlinearly-structured scientific and internet data sets; and (2) to bring together computer scientists, statisticians, mathematicians, and data analysis practitioners to promote cross-fertilization of ideas.
[ { "version": "v1", "created": "Fri, 19 Dec 2008 03:53:03 GMT" } ]
2008-12-22T00:00:00
[ [ "Mahoney", "Michael W.", "" ], [ "Lim", "Lek-Heng", "" ], [ "Carlsson", "Gunnar E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.3709
Chris Ng
Chris T. K. Ng, Chao Tian, Andrea J. Goldsmith, Shlomo Shamai (Shitz)
Minimum Expected Distortion in Gaussian Source Coding with Fading Side Information
24 pages, 10 figures
IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5725-5739, Sep. 2012
10.1109/TIT.2012.2204476
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An encoder, subject to a rate constraint, wishes to describe a Gaussian source under squared error distortion. The decoder, besides receiving the encoder's description, also observes side information consisting of uncompressed source symbol subject to slow fading and noise. The decoder knows the fading realization but the encoder knows only its distribution. The rate-distortion function that simultaneously satisfies the distortion constraints for all fading states was derived by Heegard and Berger. A layered encoding strategy is considered in which each codeword layer targets a given fading state. When the side-information channel has two discrete fading states, the expected distortion is minimized by optimally allocating the encoding rate between the two codeword layers. For multiple fading states, the minimum expected distortion is formulated as the solution of a convex optimization problem with linearly many variables and constraints. Through a limiting process on the primal and dual solutions, it is shown that single-layer rate allocation is optimal when the fading probability density function is continuous and quasiconcave (e.g., Rayleigh, Rician, Nakagami, and log-normal). In particular, under Rayleigh fading, the optimal single codeword layer targets the least favorable state as if the side information was absent.
[ { "version": "v1", "created": "Fri, 19 Dec 2008 06:41:19 GMT" }, { "version": "v2", "created": "Fri, 23 Apr 2010 22:55:00 GMT" }, { "version": "v3", "created": "Mon, 7 Nov 2011 04:11:30 GMT" }, { "version": "v4", "created": "Tue, 22 May 2012 15:48:36 GMT" } ]
2013-05-10T00:00:00
[ [ "Ng", "Chris T. K.", "", "Shitz" ], [ "Tian", "Chao", "", "Shitz" ], [ "Goldsmith", "Andrea J.", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.3715
Aurelie Bissay
Aur\'elie Bissay (LIESP), Philippe Pernelle (LIESP), Arnaud Lefebvre (LIESP), Abdelaziz Bouras (LIESP)
Business processes integration and performance indicators in a PLM
null
APMS'08, Espoo : Finlande (2008)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an economic environment more and more competitive, the effective management of information and knowledge is a strategic issue for industrial enterprises. In the global marketplace, companies must use reactive strategies and reduce their products development cycle. In this context, the PLM (Product Lifecycle Management) is considered as a key component of the information system. The aim of this paper is to present an approach to integrate Business Processes in a PLM system. This approach is implemented in automotive sector with second-tier subcontractor
[ { "version": "v1", "created": "Fri, 19 Dec 2008 07:52:46 GMT" } ]
2008-12-22T00:00:00
[ [ "Bissay", "Aurélie", "", "LIESP" ], [ "Pernelle", "Philippe", "", "LIESP" ], [ "Lefebvre", "Arnaud", "", "LIESP" ], [ "Bouras", "Abdelaziz", "", "LIESP" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0812.3716
Ismael Bouassida Rodriguez
Ismael Bouassida Rodriguez (LAAS), Khalil DRIRA (LAAS), Christophe Chassot (LAAS), Mohamed Jmaiel (ReDCAD)
Context-aware adaptation for group communication support applications with dynamic architecture
null
System and Information Sciences Notes 2, 1 (2007) 88
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a refinement-based adaptation approach for the architecture of distributed group communication support applications. Unlike most of previous works, our approach reaches implementable, context-aware and dynamically adaptable architectures. To model the context, we manage simultaneously four parameters that influence Qos provided by the application. These parameters are: the available bandwidth, the exchanged data communication priority, the energy level and the available memory for processing. These parameters make it possible to refine the choice between the various architectural configurations when passing from a given abstraction level to the lower level which implements it. Our approach allows the importance degree associated with each parameter to be adapted dynamically. To implement adaptation, we switch between the various configurations of the same level, and we modify the state of the entities of a given configuration when necessary. We adopt the direct and mediated Producer- Consumer architectural styles and graphs for architecture modelling. In order to validate our approach we elaborate a simulation model.
[ { "version": "v1", "created": "Fri, 19 Dec 2008 07:53:12 GMT" } ]
2008-12-22T00:00:00
[ [ "Rodriguez", "Ismael Bouassida", "", "LAAS" ], [ "DRIRA", "Khalil", "", "LAAS" ], [ "Chassot", "Christophe", "", "LAAS" ], [ "Jmaiel", "Mohamed", "", "ReDCAD" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0812.3719
Philippe Roose
Christine Louberry (LIUPPA), Marc Dalmau (LIUPPA), Philippe Roose (LIUPPA)
Architecture Logicielles pour des Applications h\'et\'erog\`enes, distribu\'ees et reconfigurables
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recent apparition of mobile wireless sensor aware to their physical environment and able to process information must allow proposing applications able to take into account their physical context and to react according to the changes of the environment. It suppose to design applications integrating both software and hardware components able to communicate. Applications must use context information from components to measure the quality of the proposed services in order to adapt them in real time. This work is interested in the integration of sensors in distributed applications. It present a service oriented software architecture allowing to manage and to reconfigure applications in heterogeneous environment where entities of different nature collaborate: software components and wireless sensors.
[ { "version": "v1", "created": "Fri, 19 Dec 2008 08:03:21 GMT" } ]
2008-12-22T00:00:00
[ [ "Louberry", "Christine", "", "LIUPPA" ], [ "Dalmau", "Marc", "", "LIUPPA" ], [ "Roose", "Philippe", "", "LIUPPA" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0812.3742
Vasanthan Raghavan
Vasanthan Raghavan, Venugopal V. Veeravalli
Quickest Change Detection of a Markov Process Across a Sensor Array
40 pages, 5 figures, Submitted to IEEE Trans. Inform. Theory
null
10.1109/TIT.2010.2040869
null
cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent attention in quickest change detection in the multi-sensor setting has been on the case where the densities of the observations change at the same instant at all the sensors due to the disruption. In this work, a more general scenario is considered where the change propagates across the sensors, and its propagation can be modeled as a Markov process. A centralized, Bayesian version of this problem, with a fusion center that has perfect information about the observations and a priori knowledge of the statistics of the change process, is considered. The problem of minimizing the average detection delay subject to false alarm constraints is formulated as a partially observable Markov decision process (POMDP). Insights into the structure of the optimal stopping rule are presented. In the limiting case of rare disruptions, we show that the structure of the optimal test reduces to thresholding the a posteriori probability of the hypothesis that no change has happened. We establish the asymptotic optimality (in the vanishing false alarm probability regime) of this threshold test under a certain condition on the Kullback-Leibler (K-L) divergence between the post- and the pre-change densities. In the special case of near-instantaneous change propagation across the sensors, this condition reduces to the mild condition that the K-L divergence be positive. Numerical studies show that this low complexity threshold test results in a substantial improvement in performance over naive tests such as a single-sensor test or a test that wrongly assumes that the change propagates instantaneously.
[ { "version": "v1", "created": "Fri, 19 Dec 2008 10:08:48 GMT" } ]
2016-11-18T00:00:00
[ [ "Raghavan", "Vasanthan", "" ], [ "Veeravalli", "Venugopal V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0812.3788
Michael Schmidt
Michael Schmidt, Michael Meier, Georg Lausen
Foundations of SPARQL Query Optimization
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The SPARQL query language is a recent W3C standard for processing RDF data, a format that has been developed to encode information in a machine-readable way. We investigate the foundations of SPARQL query optimization and (a) provide novel complexity results for the SPARQL evaluation problem, showing that the main source of complexity is operator OPTIONAL alone; (b) propose a comprehensive set of algebraic query rewriting rules; (c) present a framework for constraint-based SPARQL optimization based upon the well-known chase procedure for Conjunctive Query minimization. In this line, we develop two novel termination conditions for the chase. They subsume the strongest conditions known so far and do not increase the complexity of the recognition problem, thus making a larger class of both Conjunctive and SPARQL queries amenable to constraint-based optimization. Our results are of immediate practical interest and might empower any SPARQL query optimizer.
[ { "version": "v1", "created": "Fri, 19 Dec 2008 13:51:57 GMT" }, { "version": "v2", "created": "Mon, 26 Jan 2009 12:52:36 GMT" } ]
2009-01-26T00:00:00
[ [ "Schmidt", "Michael", "" ], [ "Meier", "Michael", "" ], [ "Lausen", "Georg", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0812.3836
Lutz Schr\"oder
Lutz Schr\"oder
Bootstrapping Inductive and Coinductive Types in HasCASL
null
Logical Methods in Computer Science, Volume 4, Issue 4 (December 25, 2008) lmcs:1166
10.2168/LMCS-4(4:17)2008
null
cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss the treatment of initial datatypes and final process types in the wide-spectrum language HasCASL. In particular, we present specifications that illustrate how datatypes and process types arise as bootstrapped concepts using HasCASL's type class mechanism, and we describe constructions of types of finite and infinite trees that establish the conservativity of datatype and process type declarations adhering to certain reasonable formats. The latter amounts to modifying known constructions from HOL to avoid unique choice; in categorical terminology, this means that we establish that quasitoposes with an internal natural numbers object support initial algebras and final coalgebras for a range of polynomial functors, thereby partially generalising corresponding results from topos theory. Moreover, we present similar constructions in categories of internal complete partial orders in quasitoposes.
[ { "version": "v1", "created": "Fri, 19 Dec 2008 16:22:15 GMT" }, { "version": "v2", "created": "Thu, 25 Dec 2008 18:36:36 GMT" } ]
2015-07-01T00:00:00
[ [ "Schröder", "Lutz", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0812.3871
Nuno Alves
Nuno Alves
Decting Errors in Reversible Circuits With Invariant Relationships
null
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reversible logic is experience renewed interest as we are approach the limits of CMOS technologies. While physical implementations of reversible gates have yet to materialize, it is safe to assume that they will rely on faulty individual components. In this work we present a present a method to provide fault tolerance to a reversible circuit based on invariant relationships.
[ { "version": "v1", "created": "Fri, 19 Dec 2008 18:14:54 GMT" } ]
2008-12-22T00:00:00
[ [ "Alves", "Nuno", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0812.3873
Li Chia Choo
Li-Chia Choo, Kai-Kit Wong
The K-Receiver Broadcast Channel with Confidential Messages
19 pages, 1 figure, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The secrecy capacity region for the K-receiver degraded broadcast channel (BC) is given for confidential messages sent to the receivers and to be kept secret from an external wiretapper. Superposition coding and Wyner's random code partitioning are used to show the achievable rate tuples. Error probability analysis and equivocation calculation are also provided. In the converse proof, a new definition for the auxiliary random variables is used, which is different from either the case of the 2-receiver BC without common message or the K-receiver BC with common message, both with an external wiretapper; or the K-receiver BC without a wiretapper.
[ { "version": "v1", "created": "Fri, 19 Dec 2008 18:15:52 GMT" } ]
2008-12-22T00:00:00
[ [ "Choo", "Li-Chia", "" ], [ "Wong", "Kai-Kit", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.3890
Raviraj Adve
Elzbieta Beres and Raviraj Adve
Optimal Relay-Subset Selection and Time-Allocation in Decode-and-Forward Cooperative Networks
Submitted to IEEE Trans. on Wirless Comm., Dec. 19th 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the optimal relay-subset selection and transmission-time for a decode-and-forward, half-duplex cooperative network of arbitrary size. The resource allocation is obtained by maximizing over the rates obtained for each possible subset of active relays, and the unique time allocation for each set can be obtained by solving a linear system of equations. We also present a simple recursive algorithm for the optimization problem which reduces the computational load of finding the required matrix inverses, and reduces the number of required iterations. Our results, in terms of outage rate, confirm the benefit of adding potential relays to a small network and the diminishing marginal returns for a larger network. We also show that optimizing over the channel resources ensures that more relays are active over a larger SNR range, and that linear network constellations significantly outperform grid constellations. Through simulations, the optimization is shown to be robust to node numbering.
[ { "version": "v1", "created": "Fri, 19 Dec 2008 20:39:10 GMT" } ]
2008-12-22T00:00:00
[ [ "Beres", "Elzbieta", "" ], [ "Adve", "Raviraj", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.3893
Darren Strash
Michael T. Goodrich and Darren Strash
Succinct Greedy Geometric Routing in the Euclidean Plane
19 pages, 5 figures. To appear at 20th International Symposium on Algorithms and Computation (ISAAC 2009)
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In greedy geometric routing, messages are passed in a network embedded in a metric space according to the greedy strategy of always forwarding messages to nodes that are closer to the destination. We show that greedy geometric routing schemes exist for the Euclidean metric in R^2, for 3-connected planar graphs, with coordinates that can be represented succinctly, that is, with O(log n) bits, where n is the number of vertices in the graph. Moreover, our embedding strategy introduces a coordinate system for R^2 that supports distance comparisons using our succinct coordinates. Thus, our scheme can be used to significantly reduce bandwidth, space, and header size over other recently discovered greedy geometric routing implementations for R^2.
[ { "version": "v1", "created": "Fri, 19 Dec 2008 20:42:33 GMT" }, { "version": "v2", "created": "Wed, 29 Apr 2009 21:57:33 GMT" }, { "version": "v3", "created": "Fri, 2 Oct 2009 19:05:10 GMT" } ]
2009-10-02T00:00:00
[ [ "Goodrich", "Michael T.", "" ], [ "Strash", "Darren", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0812.3933
Masud Hasan
Masud Hasan, Atif Rahman, M. Sohel Rahman, Mahfuza Sharmin, and Rukhsana Yeasmin
Pancake Flipping with Two Spatulas
10 pages, 3 figures
null
null
null
cs.DS cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study several variations of the \emph{pancake flipping problem}, which is also well known as the problem of \emph{sorting by prefix reversals}. We consider the variations in the sorting process by adding with prefix reversals other similar operations such as prefix transpositions and prefix transreversals. These type of sorting problems have applications in interconnection networks and computational biology. We first study the problem of sorting unsigned permutations by prefix reversals and prefix transpositions and present a 3-approximation algorithm for this problem. Then we give a 2-approximation algorithm for sorting by prefix reversals and prefix transreversals. We also provide a 3-approximation algorithm for sorting by prefix reversals and prefix transpositions where the operations are always applied at the unsorted suffix of the permutation. We further analyze the problem in more practical way and show quantitatively how approximation ratios of our algorithms improve with the increase of number of prefix reversals applied by optimal algorithms. Finally, we present experimental results to support our analysis.
[ { "version": "v1", "created": "Sat, 20 Dec 2008 03:10:11 GMT" }, { "version": "v2", "created": "Mon, 4 May 2009 12:06:02 GMT" } ]
2009-05-04T00:00:00
[ [ "Hasan", "Masud", "" ], [ "Rahman", "Atif", "" ], [ "Rahman", "M. Sohel", "" ], [ "Sharmin", "Mahfuza", "" ], [ "Yeasmin", "Rukhsana", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0812.3946
Stephane Vialette
Guillaume Blin (IGM), Sylvie Hamel (DIRO), St\'ephane Vialette (IGM)
Comparing RNA structures using a full set of biologically relevant edit operations is intractable
7 pages
null
null
null
cs.DS q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Arc-annotated sequences are useful for representing structural information of RNAs and have been extensively used for comparing RNA structures in both terms of sequence and structural similarities. Among the many paradigms referring to arc-annotated sequences and RNA structures comparison (see \cite{IGMA_BliDenDul08} for more details), the most important one is the general edit distance. The problem of computing an edit distance between two non-crossing arc-annotated sequences was introduced in \cite{Evans99}. The introduced model uses edit operations that involve either single letters or pairs of letters (never considered separately) and is solvable in polynomial-time \cite{ZhangShasha:1989}. To account for other possible RNA structural evolutionary events, new edit operations, allowing to consider either silmutaneously or separately letters of a pair were introduced in \cite{jiangli}; unfortunately at the cost of computational tractability. It has been proved that comparing two RNA secondary structures using a full set of biologically relevant edit operations is {\sf\bf NP}-complete. Nevertheless, in \cite{DBLP:conf/spire/GuignonCH05}, the authors have used a strong combinatorial restriction in order to compare two RNA stem-loops with a full set of biologically relevant edit operations; which have allowed them to design a polynomial-time and space algorithm for comparing general secondary RNA structures. In this paper we will prove theoretically that comparing two RNA structures using a full set of biologically relevant edit operations cannot be done without strong combinatorial restrictions.
[ { "version": "v1", "created": "Sat, 20 Dec 2008 08:04:25 GMT" } ]
2008-12-23T00:00:00
[ [ "Blin", "Guillaume", "", "IGM" ], [ "Hamel", "Sylvie", "", "DIRO" ], [ "Vialette", "Stéphane", "", "IGM" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0812.4009
Joshua Herman J
Joshua Herman, Keith David Pedersen
Graph Field Automata
totally wrong doesn't make any sense would like to widthdraw
null
null
null
cs.CC
http://creativecommons.org/licenses/by-nc-sa/3.0/
The Graph Automata have been the paradigm in the expression of utilizing Graphs as a language. Matrix Graph grammars \cite{Pedro} are an algebratization of graph rewriting systems. Here we present the dual of this formalizm which some extensions which we term Graph Field Automata The advantage to this approach is a framework for expressing machines that can use Matrix Graph Grammars.
[ { "version": "v1", "created": "Mon, 22 Dec 2008 00:26:29 GMT" }, { "version": "v10", "created": "Mon, 12 Jan 2009 08:00:08 GMT" }, { "version": "v11", "created": "Sun, 18 Jan 2009 19:06:52 GMT" }, { "version": "v12", "created": "Thu, 22 Jan 2009 05:51:57 GMT" }, { "version": "v13", "created": "Mon, 26 Jan 2009 06:32:26 GMT" }, { "version": "v14", "created": "Fri, 30 Jan 2009 00:54:13 GMT" }, { "version": "v15", "created": "Tue, 3 Feb 2009 19:59:22 GMT" }, { "version": "v16", "created": "Fri, 6 Feb 2009 17:58:09 GMT" }, { "version": "v17", "created": "Tue, 10 Feb 2009 23:22:46 GMT" }, { "version": "v18", "created": "Wed, 22 Apr 2009 06:08:47 GMT" }, { "version": "v19", "created": "Sun, 24 Jan 2010 20:37:40 GMT" }, { "version": "v2", "created": "Tue, 23 Dec 2008 17:02:51 GMT" }, { "version": "v20", "created": "Fri, 17 Jul 2015 12:25:25 GMT" }, { "version": "v21", "created": "Fri, 4 Dec 2015 21:25:16 GMT" }, { "version": "v3", "created": "Wed, 24 Dec 2008 02:35:21 GMT" }, { "version": "v4", "created": "Sat, 27 Dec 2008 23:48:21 GMT" }, { "version": "v5", "created": "Fri, 2 Jan 2009 15:26:09 GMT" }, { "version": "v6", "created": "Mon, 5 Jan 2009 13:00:13 GMT" }, { "version": "v7", "created": "Tue, 6 Jan 2009 04:02:23 GMT" }, { "version": "v8", "created": "Wed, 7 Jan 2009 06:42:44 GMT" }, { "version": "v9", "created": "Thu, 8 Jan 2009 15:56:42 GMT" } ]
2015-12-08T00:00:00
[ [ "Herman", "Joshua", "" ], [ "Pedersen", "Keith David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0812.4012
Abbas Alhakim
Abbas Alhakim and Mufutau Akinwande
De Bruijn Graph Homomorphisms and Recursive De Bruijn Sequences
15 pages, 1 figure, 2 tables, submitted
null
null
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a method to find new De Bruijn cycles based on ones of lesser order. This is done by mapping a De Bruijn cycle to several vertex disjoint cycles in a De Bruijn digraph of higher order and connecting these cycles into one full cycle. We characterize homomorphisms between De Bruijn digraphs of different orders that allow this construction. These maps generalize the well-known D-morphism of Lempel between De Bruijn digraphs of consecutive orders. Also, an efficient recursive algorithm that yields an exponential number of nonbinary De Bruijn cycles is implemented.
[ { "version": "v1", "created": "Sun, 21 Dec 2008 03:58:22 GMT" } ]
2008-12-23T00:00:00
[ [ "Alhakim", "Abbas", "" ], [ "Akinwande", "Mufutau", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4044
John Langford
Alina Beygelzimer and John Langford
The Offset Tree for Learning with Partial Labels
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
We present an algorithm, called the Offset Tree, for learning to make decisions in situations where the payoff of only one choice is observed, rather than all choices. The algorithm reduces this setting to binary classification, allowing one to reuse of any existing, fully supervised binary classification algorithm in this partial information setting. We show that the Offset Tree is an optimal reduction to binary classification. In particular, it has regret at most $(k-1)$ times the regret of the binary classifier it uses (where $k$ is the number of choices), and no reduction to binary classification can do better. This reduction is also computationally optimal, both at training and test time, requiring just $O(\log_2 k)$ work to train on an example or make a prediction. Experiments with the Offset Tree show that it generally performs better than several alternative approaches.
[ { "version": "v1", "created": "Sun, 21 Dec 2008 17:45:27 GMT" }, { "version": "v2", "created": "Sat, 7 Feb 2009 01:48:33 GMT" }, { "version": "v3", "created": "Sun, 3 Apr 2016 21:41:38 GMT" } ]
2016-04-05T00:00:00
[ [ "Beygelzimer", "Alina", "" ], [ "Langford", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.4073
Andreas Noack
Andreas Noack, Randolf Rotta
Multi-level algorithms for modularity clustering
12 pages, 10 figures, see http://www.informatik.tu-cottbus.de/~rrotta/ for downloading the graph clustering software
Proceedings of the 8th International Symposium on Experimental Algorithms (SEA 2009). Lecture Notes in Computer Science 5526, Springer (2009) 257-268
null
null
cs.DS cond-mat.stat-mech cs.DM physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modularity is one of the most widely used quality measures for graph clusterings. Maximizing modularity is NP-hard, and the runtime of exact algorithms is prohibitive for large graphs. A simple and effective class of heuristics coarsens the graph by iteratively merging clusters (starting from singletons), and optionally refines the resulting clustering by iteratively moving individual vertices between clusters. Several heuristics of this type have been proposed in the literature, but little is known about their relative performance. This paper experimentally compares existing and new coarsening- and refinement-based heuristics with respect to their effectiveness (achieved modularity) and efficiency (runtime). Concerning coarsening, it turns out that the most widely used criterion for merging clusters (modularity increase) is outperformed by other simple criteria, and that a recent algorithm by Schuetz and Caflisch is no improvement over simple greedy coarsening for these criteria. Concerning refinement, a new multi-level algorithm is shown to produce significantly better clusterings than conventional single-level algorithms. A comparison with published benchmark results and algorithm implementations shows that combinations of coarsening and multi-level refinement are competitive with the best algorithms in the literature.
[ { "version": "v1", "created": "Mon, 22 Dec 2008 15:32:10 GMT" }, { "version": "v2", "created": "Mon, 29 Dec 2008 21:56:37 GMT" } ]
2009-09-22T00:00:00
[ [ "Noack", "Andreas", "" ], [ "Rotta", "Randolf", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0812.4170
Jose Gallardo
Jose E. Gallardo, Carlos Cotta, Antonio J. Fernandez
Finding Still Lifes with Memetic/Exact Hybrid Algorithms
null
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The maximum density still life problem (MDSLP) is a hard constraint optimization problem based on Conway's game of life. It is a prime example of weighted constrained optimization problem that has been recently tackled in the constraint-programming community. Bucket elimination (BE) is a complete technique commonly used to solve this kind of constraint satisfaction problem. When the memory required to apply BE is too high, a heuristic method based on it (denominated mini-buckets) can be used to calculate bounds for the optimal solution. Nevertheless, the curse of dimensionality makes these techniques unpractical for large size problems. In response to this situation, we present a memetic algorithm for the MDSLP in which BE is used as a mechanism for recombining solutions, providing the best possible child from the parental set. Subsequently, a multi-level model in which this exact/metaheuristic hybrid is further hybridized with branch-and-bound techniques and mini-buckets is studied. Extensive experimental results analyze the performance of these models and multi-parent recombination. The resulting algorithm consistently finds optimal patterns for up to date solved instances in less time than current approaches. Moreover, it is shown that this proposal provides new best known solutions for very large instances.
[ { "version": "v1", "created": "Mon, 22 Dec 2008 13:09:11 GMT" } ]
2008-12-23T00:00:00
[ [ "Gallardo", "Jose E.", "" ], [ "Cotta", "Carlos", "" ], [ "Fernandez", "Antonio J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.4171
Martin Dyer
Andrei Bulatov, Martin Dyer, Leslie Ann Goldberg, Markus Jalsenius and David Richerby
The Complexity of Weighted Boolean #CSP with Mixed Signs
24 pages
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a complexity dichotomy for the problem of computing the partition function of a weighted Boolean constraint satisfaction problem. Such a problem is parameterized by a set of rational-valued functions, which generalize constraints. Each function assigns a weight to every assignment to a set of Boolean variables. Our dichotomy extends previous work in which the weight functions were restricted to being non-negative. We represent a weight function as a product of the form (-1)^s g, where the polynomial s determines the sign of the weight and the non-negative function g determines its magnitude. We show that the problem of computing the partition function (the sum of the weights of all possible variable assignments) is in polynomial time if either every weight function can be defined by a "pure affine" magnitude with a quadratic sign polynomial or every function can be defined by a magnitude of "product type" with a linear sign polynomial. In all other cases, computing the partition function is FP^#P-complete.
[ { "version": "v1", "created": "Mon, 22 Dec 2008 12:56:42 GMT" }, { "version": "v2", "created": "Wed, 3 Jun 2009 15:30:25 GMT" } ]
2009-06-03T00:00:00
[ [ "Bulatov", "Andrei", "" ], [ "Dyer", "Martin", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Jalsenius", "Markus", "" ], [ "Richerby", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.4181
Azzedine Benameur
Azzedine Benameur, Faisal Abdul Kadir, Serge Fenet
XML Rewriting Attacks: Existing Solutions and their Limitations
null
IADIS Applied Computing 2008
null
null
cs.CR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web Services are web-based applications made available for web users or remote Web-based programs. In order to promote interoperability, they publish their interfaces in the so-called WSDL file and allow remote call over the network. Although Web Services can be used in different ways, the industry standard is the Service Oriented Architecture Web Services that doesn't rely on the implementation details. In this architecture, communication is performed through XML-based messages called SOAP messages. However, those messages are prone to attacks that can lead to code injection, unauthorized accesses, identity theft, etc. This type of attacks, called XML Rewriting Attacks, are all based on unauthorized, yet possible, modifications of SOAP messages. We present in this paper an explanation of this kind of attack, review the existing solutions, and show their limitations. We also propose some ideas to secure SOAP messages, as well as implementation ideas.
[ { "version": "v1", "created": "Mon, 22 Dec 2008 13:40:54 GMT" } ]
2008-12-23T00:00:00
[ [ "Benameur", "Azzedine", "" ], [ "Kadir", "Faisal Abdul", "" ], [ "Fenet", "Serge", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0812.4206
Vicky Papadopoulou
Marios Mavronicolas, Burkhard Monien and Vicky Papadopoulou
How Many Attackers Can Selfish Defenders Catch?
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a distributed system with {\it attacks} and {\it defenses,} both {\it attackers} and {\it defenders} are self-interested entities. We assume a {\it reward-sharing} scheme among {\it interdependent} defenders; each defender wishes to (locally) maximize her own total {\it fair share} to the attackers extinguished due to her involvement (and possibly due to those of others). What is the {\em maximum} amount of protection achievable by a number of such defenders against a number of attackers while the system is in a {\it Nash equilibrium}? As a measure of system protection, we adopt the {\it Defense-Ratio} \cite{MPPS05a}, which provides the expected (inverse) proportion of attackers caught by the defenders. In a {\it Defense-Optimal} Nash equilibrium, the Defense-Ratio is optimized. We discover that the possibility of optimizing the Defense-Ratio (in a Nash equilibrium) depends in a subtle way on how the number of defenders compares to two natural graph-theoretic thresholds we identify. In this vein, we obtain, through a combinatorial analysis of Nash equilibria, a collection of trade-off results: - When the number of defenders is either sufficiently small or sufficiently large, there are cases where the Defense-Ratio can be optimized. The optimization problem is computationally tractable for a large number of defenders; the problem becomes ${\cal NP}$-complete for a small number of defenders and the intractability is inherited from a previously unconsidered combinatorial problem in {\em Fractional Graph Theory}. - Perhaps paradoxically, there is a middle range of values for the number of defenders where optimizing the Defense-Ratio is never possible.
[ { "version": "v1", "created": "Mon, 22 Dec 2008 14:48:24 GMT" } ]
2008-12-23T00:00:00
[ [ "Mavronicolas", "Marios", "" ], [ "Monien", "Burkhard", "" ], [ "Papadopoulou", "Vicky", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.4235
Francesco Dinuzzo
Francesco Dinuzzo, Gianluigi Pillonetto, Giuseppe De Nicolao
Client-server multi-task learning from distributed datasets
null
null
10.1109/TNN.2010.2095882
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A client-server architecture to simultaneously solve multiple learning tasks from distributed datasets is described. In such architecture, each client is associated with an individual learning task and the associated dataset of examples. The goal of the architecture is to perform information fusion from multiple datasets while preserving privacy of individual data. The role of the server is to collect data in real-time from the clients and codify the information in a common database. The information coded in this database can be used by all the clients to solve their individual learning task, so that each client can exploit the informative content of all the datasets without actually having access to private data of others. The proposed algorithmic framework, based on regularization theory and kernel methods, uses a suitable class of mixed effect kernels. The new method is illustrated through a simulated music recommendation system.
[ { "version": "v1", "created": "Mon, 22 Dec 2008 16:34:39 GMT" }, { "version": "v2", "created": "Mon, 11 Jan 2010 15:37:43 GMT" } ]
2013-07-02T00:00:00
[ [ "Dinuzzo", "Francesco", "" ], [ "Pillonetto", "Gianluigi", "" ], [ "De Nicolao", "Giuseppe", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0812.4279
Noah Stein
Noah D. Stein, Pablo A. Parrilo, Asuman Ozdaglar
Correlated Equilibria in Continuous Games: Characterization and Computation
Games and Economic Behavior, In Press, Accepted Manuscript, Available online 16 April 2010
Games and Economic Behavior, Vol. 71, No. 2, March 2011, Pages 436-455
10.1016/j.geb.2010.04.004
LIDS Technical Report 2805
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present several new characterizations of correlated equilibria in games with continuous utility functions. These have the advantage of being more computationally and analytically tractable than the standard definition in terms of departure functions. We use these characterizations to construct effective algorithms for approximating a single correlated equilibrium or the entire set of correlated equilibria of a game with polynomial utility functions.
[ { "version": "v1", "created": "Mon, 22 Dec 2008 20:28:01 GMT" }, { "version": "v2", "created": "Fri, 23 Apr 2010 02:46:48 GMT" } ]
2011-06-06T00:00:00
[ [ "Stein", "Noah D.", "" ], [ "Parrilo", "Pablo A.", "" ], [ "Ozdaglar", "Asuman", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.4293
Michael Mahoney
Christos Boutsidis, Michael W. Mahoney, and Petros Drineas
An Improved Approximation Algorithm for the Column Subset Selection Problem
17 pages; corrected a bug in the spectral norm bound of the previous version
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of selecting the best subset of exactly $k$ columns from an $m \times n$ matrix $A$. We present and analyze a novel two-stage algorithm that runs in $O(\min\{mn^2,m^2n\})$ time and returns as output an $m \times k$ matrix $C$ consisting of exactly $k$ columns of $A$. In the first (randomized) stage, the algorithm randomly selects $\Theta(k \log k)$ columns according to a judiciously-chosen probability distribution that depends on information in the top-$k$ right singular subspace of $A$. In the second (deterministic) stage, the algorithm applies a deterministic column-selection procedure to select and return exactly $k$ columns from the set of columns selected in the first stage. Let $C$ be the $m \times k$ matrix containing those $k$ columns, let $P_C$ denote the projection matrix onto the span of those columns, and let $A_k$ denote the best rank-$k$ approximation to the matrix $A$. Then, we prove that, with probability at least 0.8, $$ \FNorm{A - P_CA} \leq \Theta(k \log^{1/2} k) \FNorm{A-A_k}. $$ This Frobenius norm bound is only a factor of $\sqrt{k \log k}$ worse than the best previously existing existential result and is roughly $O(\sqrt{k!})$ better than the best previous algorithmic result for the Frobenius norm version of this Column Subset Selection Problem (CSSP). We also prove that, with probability at least 0.8, $$ \TNorm{A - P_CA} \leq \Theta(k \log^{1/2} k)\TNorm{A-A_k} + \Theta(k^{3/4}\log^{1/4}k)\FNorm{A-A_k}. $$ This spectral norm bound is not directly comparable to the best previously existing bounds for the spectral norm version of this CSSP. Our bound depends on $\FNorm{A-A_k}$, whereas previous results depend on $\sqrt{n-k}\TNorm{A-A_k}$; if these two quantities are comparable, then our bound is asymptotically worse by a $(k \log k)^{1/4}$ factor.
[ { "version": "v1", "created": "Mon, 22 Dec 2008 21:16:55 GMT" }, { "version": "v2", "created": "Wed, 12 May 2010 02:44:25 GMT" } ]
2015-03-13T00:00:00
[ [ "Boutsidis", "Christos", "" ], [ "Mahoney", "Michael W.", "" ], [ "Drineas", "Petros", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.4296
Marcio Portes de Albuquerque
A.D. Anastasiadis, Marcelo P. de Albuquerque, Marcio P. de Albuquerque and Diogo B. Mussi
Tsallis $q$-exponential describes the distribution of scientific citations - A new characterization of the impact
13 pages including 5 figures
null
null
null
cs.DL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we have studied the research activity for countries of Europe, Latin America and Africa for all sciences between 1945 and November 2008. All the data are captured from the Web of Science database during this period. The analysis of the experimental data shows that, within a nonextensive thermostatistical formalism, the Tsallis \emph{q}-exponential distribution $N(c)$ satisfactorily describes Institute of Scientific Information citations. The data which are examined in the present survey can be fitted successfully as a first approach by applying a {\it single} curve (namely, $N(c) \propto 1/[1+(q-1) c/T]^{\frac{1}{q-1}}$ with $q\simeq 4/3$ for {\it all} the available citations $c$, $T$ being an "effective temperature". The present analysis ultimately suggests that the phenomenon might essentially be {\it one and the same} along the {\it entire} range of the citation number. Finally, this manuscript provides a new ranking index, via the "effective temperature" $T$, for the impact level of the research activity in these countries, taking into account the number of the publications and their citations.
[ { "version": "v1", "created": "Mon, 22 Dec 2008 21:34:10 GMT" } ]
2008-12-30T00:00:00
[ [ "Anastasiadis", "A. D.", "" ], [ "de Albuquerque", "Marcelo P.", "" ], [ "de Albuquerque", "Marcio P.", "" ], [ "Mussi", "Diogo B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0812.4322
Josef Cibulka
Josef Cibulka, Jan Kyn\v{c}l, Viola M\'esz\'aros, Rudolf Stola\v{r} and Pavel Valtr
Solution of Peter Winkler's Pizza Problem
29 pages, 14 figures
In: Fete of Combinatorics and Computer Science, Bolyai Society Mathematical Studies, vol. 20, pp. 63-93, Springer, 2010
10.1007/978-3-642-13580-4_4
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bob cuts a pizza into slices of not necessarily equal size and shares it with Alice by alternately taking turns. One slice is taken in each turn. The first turn is Alice's. She may choose any of the slices. In all other turns only those slices can be chosen that have a neighbor slice already eaten. We prove a conjecture of Peter Winkler by showing that Alice has a strategy for obtaining 4/9 of the pizza. This is best possible, that is, there is a cutting and a strategy for Bob to get 5/9 of the pizza. We also give a characterization of Alice's best possible gain depending on the number of slices. For a given cutting of the pizza, we describe a linear time algorithm that computes Alice's strategy gaining at least 4/9 of the pizza and another algorithm that computes the optimal strategy for both players in any possible position of the game in quadratic time. We distinguish two types of turns, shifts and jumps. We prove that Alice can gain 4/9, 7/16 and 1/3 of the pizza if she is allowed to make at most two jumps, at most one jump and no jump, respectively, and the three constants are the best possible.
[ { "version": "v1", "created": "Tue, 23 Dec 2008 01:18:01 GMT" } ]
2011-04-29T00:00:00
[ [ "Cibulka", "Josef", "" ], [ "Kynčl", "Jan", "" ], [ "Mészáros", "Viola", "" ], [ "Stolař", "Rudolf", "" ], [ "Valtr", "Pavel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.4329
Guohun Zhu
Guohun Zhu
Some sufficient conditions on Hamiltonian digraph
7 pages, the main result did during 2007
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Z-mapping graph is a balanced bipartite graph $G$ of a digraph $D$ by split each vertex of $D$ into a pair of vertices of $G$. Based on the property of the $G$, it is proved that if $D$ is strong connected and $G$ is Hamiltonian, then $D$ is Hamiltonian. It is also proved if $D$ is Hamiltonian, then $G$ contains at least a perfect matching. Thus some existence sufficient conditions for Hamiltonian digraph and Hamiltonian graph are proved to be equivalent, and two sufficient conditions of disjoint Hamiltonian digraph are given in this paper.
[ { "version": "v1", "created": "Tue, 23 Dec 2008 03:12:00 GMT" } ]
2008-12-24T00:00:00
[ [ "Zhu", "Guohun", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.4332
Ismael Rafols
Ismael Rafols and Loet Leydesdorff
Content-based and Algorithmic Classifications of Journals: Perspectives on the Dynamics of Scientific Communication and Indexer Effects
null
null
null
null
physics.data-an cs.DL cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aggregated journal-journal citation matrix -based on the Journal Citation Reports (JCR) of the Science Citation Index- can be decomposed by indexers and/or algorithmically. In this study, we test the results of two recently available algorithms for the decomposition of large matrices against two content-based classifications of journals: the ISI Subject Categories and the field/subfield classification of Glaenzel & Schubert (2003). The content-based schemes allow for the attribution of more than a single category to a journal, whereas the algorithms maximize the ratio of within-category citations over between-category citations in the aggregated category-category citation matrix. By adding categories, indexers generate between-category citations, which may enrich the database, for example, in the case of inter-disciplinary developments. The consequent indexer effects are significant in sparse areas of the matrix more than in denser ones. Algorithmic decompositions, on the other hand, are more heavily skewed towards a relatively small number of categories, while this is deliberately counter-acted upon in the case of content-based classifications. Because of the indexer effects, science policy studies and the sociology of science should be careful when using content-based classifications, which are made for bibliographic disclosure, and not for the purpose of analyzing latent structures in scientific communications. Despite the large differences among them, the four classification schemes enable us to generate surprisingly similar maps of science at the global level. Erroneous classifications are cancelled as noise at the aggregate level, but may disturb the evaluation locally.
[ { "version": "v1", "created": "Tue, 23 Dec 2008 03:45:51 GMT" } ]
2009-01-09T00:00:00
[ [ "Rafols", "Ismael", "" ], [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0812.4334
Wee Seng Chua
Wee Seng Chua, Chau Yuen, Yong Liang Guan, Francois Chin
Multi-User SISO Precoding based on Generalized Multi-Unitary Decomposition for Single-carrier Transmission in Frequency Selective Channel
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose to exploit the richly scattered multi-path nature of a frequency selective channel to provide additional degrees of freedom for desigining effective precoding schemes for multi-user communications. We design the precoding matrix for multi-user communications based on the Generalized Multi-Unitary Decomposition (GMUD), where the channel matrix H is transformed into P_i*R_r*Q_i^H. An advantage of GMUD is that multiple pairs of unitary matrices P_i and Q_i can be obtained with one single R_r. Since the column of Q_i can be used as the transmission beam of a particular user, multiple solutions of Q_i provide a large selection of transmission beams, which can be exploited to achieve high degrees of orthogonality between the multipaths, as well as between the interfering users. Hence the proposed precoding technique based on GMUD achieves better performance than precoding based on singular value decomposition.
[ { "version": "v1", "created": "Tue, 23 Dec 2008 04:39:55 GMT" } ]
2008-12-24T00:00:00
[ [ "Chua", "Wee Seng", "" ], [ "Yuen", "Chau", "" ], [ "Guan", "Yong Liang", "" ], [ "Chin", "Francois", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4346
Marcin Kami\'nski
Marcin Kaminski, Paul Medvedev, Martin Milanic
The Plane-Width of Graphs
null
Journal of Graph Theory 68 (2011) 229-245
10.1002/jgt.20554
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Map vertices of a graph to (not necessarily distinct) points of the plane so that two adjacent vertices are mapped at least a unit distance apart. The plane-width of a graph is the minimum diameter of the image of the vertex set over all such mappings. We establish a relation between the plane-width of a graph and its chromatic number, and connect it to other well-known areas, including the circular chromatic number and the problem of packing unit discs in the plane. We also investigate how plane-width behaves under various operations, such as homomorphism, disjoint union, complement, and the Cartesian product.
[ { "version": "v1", "created": "Tue, 23 Dec 2008 07:49:12 GMT" } ]
2013-01-08T00:00:00
[ [ "Kaminski", "Marcin", "" ], [ "Medvedev", "Paul", "" ], [ "Milanic", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.4360
Juergen Schmidhuber
Juergen Schmidhuber
Driven by Compression Progress: A Simple Principle Explains Essential Aspects of Subjective Beauty, Novelty, Surprise, Interestingness, Attention, Curiosity, Creativity, Art, Science, Music, Jokes
35 pages, 3 figures, based on KES 2008 keynote and ALT 2007 / DS 2007 joint invited lecture
Short version: J. Schmidhuber. Simple Algorithmic Theory of Subjective Beauty, Novelty, Surprise, Interestingness, Attention, Curiosity, Creativity, Art, Science, Music, Jokes. Journal of SICE 48(1), 21-32, 2009
null
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I argue that data becomes temporarily interesting by itself to some self-improving, but computationally limited, subjective observer once he learns to predict or compress the data in a better way, thus making it subjectively simpler and more beautiful. Curiosity is the desire to create or discover more non-random, non-arbitrary, regular data that is novel and surprising not in the traditional sense of Boltzmann and Shannon but in the sense that it allows for compression progress because its regularity was not yet known. This drive maximizes interestingness, the first derivative of subjective beauty or compressibility, that is, the steepness of the learning curve. It motivates exploring infants, pure mathematicians, composers, artists, dancers, comedians, yourself, and (since 1990) artificial systems.
[ { "version": "v1", "created": "Tue, 23 Dec 2008 10:14:18 GMT" }, { "version": "v2", "created": "Wed, 15 Apr 2009 17:35:06 GMT" } ]
2009-04-15T00:00:00
[ [ "Schmidhuber", "Juergen", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0812.4367
Dimiter Kovachev
Dimiter Stoichkov Kovachev
On Some Classes of Functions and Hypercubes
8 pages, 3 tables
null
null
null
cs.DM cs.CC
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, some classes of discrete functions of $k$-valued logic are considered, that depend on sets of their variables in a particular way. Obtained results allow to "construct" these functions and to present them in their tabular, analytical or matrix form, that is, as hypercubes, and in particular Latin hypercubes. Results connected with identifying of variables of some classes of functions are obtained.
[ { "version": "v1", "created": "Tue, 23 Dec 2008 11:00:10 GMT" } ]
2008-12-24T00:00:00
[ [ "Kovachev", "Dimiter Stoichkov", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0812.4442
Sanjeev Khanna
Julia Chuzhoy and Sanjeev Khanna
An $O(k^{3} log n)$-Approximation Algorithm for Vertex-Connectivity Survivable Network Design
8 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the Survivable Network Design problem (SNDP), we are given an undirected graph $G(V,E)$ with costs on edges, along with a connectivity requirement $r(u,v)$ for each pair $u,v$ of vertices. The goal is to find a minimum-cost subset $E^*$ of edges, that satisfies the given set of pairwise connectivity requirements. In the edge-connectivity version we need to ensure that there are $r(u,v)$ edge-disjoint paths for every pair $u, v$ of vertices, while in the vertex-connectivity version the paths are required to be vertex-disjoint. The edge-connectivity version of SNDP is known to have a 2-approximation. However, no non-trivial approximation algorithm has been known so far for the vertex version of SNDP, except for special cases of the problem. We present an extremely simple algorithm to achieve an $O(k^3 \log n)$-approximation for this problem, where $k$ denotes the maximum connectivity requirement, and $n$ denotes the number of vertices. We also give a simple proof of the recently discovered $O(k^2 \log n)$-approximation result for the single-source version of vertex-connectivity SNDP. We note that in both cases, our analysis in fact yields slightly better guarantees in that the $\log n$ term in the approximation guarantee can be replaced with a $\log \tau$ term where $\tau$ denotes the number of distinct vertices that participate in one or more pairs with a positive connectivity requirement.
[ { "version": "v1", "created": "Tue, 23 Dec 2008 19:04:25 GMT" } ]
2008-12-24T00:00:00
[ [ "Chuzhoy", "Julia", "" ], [ "Khanna", "Sanjeev", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.4446
Peter Turney
Peter D. Turney (National Research Council of Canada)
The Latent Relation Mapping Engine: Algorithm and Experiments
related work available at http://purl.org/peter.turney/
Journal of Artificial Intelligence Research, (2008), 33, 615-655
10.1613/jair.2693
NRC-50738
cs.CL cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many AI researchers and cognitive scientists have argued that analogy is the core of cognition. The most influential work on computational modeling of analogy-making is Structure Mapping Theory (SMT) and its implementation in the Structure Mapping Engine (SME). A limitation of SME is the requirement for complex hand-coded representations. We introduce the Latent Relation Mapping Engine (LRME), which combines ideas from SME and Latent Relational Analysis (LRA) in order to remove the requirement for hand-coded representations. LRME builds analogical mappings between lists of words, using a large corpus of raw text to automatically discover the semantic relations among the words. We evaluate LRME on a set of twenty analogical mapping problems, ten based on scientific analogies and ten based on common metaphors. LRME achieves human-level performance on the twenty problems. We compare LRME with a variety of alternative approaches and find that they are not able to reach the same level of performance.
[ { "version": "v1", "created": "Tue, 23 Dec 2008 20:08:53 GMT" } ]
2020-08-20T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.4460
Ernesto Diaz-Aviles
Ernesto Diaz-Aviles, Lars Schmidt-Thieme and Cai-Nicolas Ziegler
Emergence of Spontaneous Order Through Neighborhood Formation in Peer-to-Peer Recommender Systems
WWW '05 International Workshop on Innovations in Web Infrastructure (IWI '05) May 10, 2005, Chiba, Japan
WWW '05 International Workshop on Innovations in Web Infrastructure (IWI '05) May 10, 2005, Chiba, Japan
null
null
cs.AI cs.IR cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The advent of the Semantic Web necessitates paradigm shifts away from centralized client/server architectures towards decentralization and peer-to-peer computation, making the existence of central authorities superfluous and even impossible. At the same time, recommender systems are gaining considerable impact in e-commerce, providing people with recommendations that are personalized and tailored to their very needs. These recommender systems have traditionally been deployed with stark centralized scenarios in mind, operating in closed communities detached from their host network's outer perimeter. We aim at marrying these two worlds, i.e., decentralized peer-to-peer computing and recommender systems, in one agent-based framework. Our architecture features an epidemic-style protocol maintaining neighborhoods of like-minded peers in a robust, selforganizing fashion. In order to demonstrate our architecture's ability to retain scalability, robustness and to allow for convergence towards high-quality recommendations, we conduct offline experiments on top of the popular MovieLens dataset.
[ { "version": "v1", "created": "Tue, 23 Dec 2008 23:26:27 GMT" } ]
2008-12-25T00:00:00
[ [ "Diaz-Aviles", "Ernesto", "" ], [ "Schmidt-Thieme", "Lars", "" ], [ "Ziegler", "Cai-Nicolas", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0812.4461
Ernesto Diaz-Aviles
Avare Stewart, Ernesto Diaz-Aviles, and Wolfgang Nejdl
Mining User Profiles to Support Structure and Explanation in Open Social Networking
International Workshop on Interacting with Multimedia Content in the Social Semantic Web (IMC-SSW 2008). Collocated with the 3rd International Conference on Semantic and Digital Media Technologies (SAMT 2008), Koblenz, Germany, Dec. 03 2008
In Proceedings of the International Workshop on Interacting with Multimedia Content in the Social Semantic Web (IMC-SSW'08), pages 21-30. Koblenz, Germany, Dec. 3, 2008
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The proliferation of media sharing and social networking websites has brought with it vast collections of site-specific user generated content. The result is a Social Networking Divide in which the concepts and structure common across different sites are hidden. The knowledge and structures from one social site are not adequately exploited to provide new information and resources to the same or different users in comparable social sites. For music bloggers, this latent structure, forces bloggers to select sub-optimal blogrolls. However, by integrating the social activities of music bloggers and listeners, we are able to overcome this limitation: improving the quality of the blogroll neighborhoods, in terms of similarity, by 85 percent when using tracks and by 120 percent when integrating tags from another site.
[ { "version": "v1", "created": "Tue, 23 Dec 2008 23:20:44 GMT" } ]
2008-12-25T00:00:00
[ [ "Stewart", "Avare", "" ], [ "Diaz-Aviles", "Ernesto", "" ], [ "Nejdl", "Wolfgang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0812.4470
Narad Rampersad
James Currie and Narad Rampersad
There are k-uniform cubefree binary morphisms for all k >= 0
5 pages
null
null
null
math.CO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A word is cubefree if it contains no non-empty subword of the form xxx. A morphism h : Sigma^* -> Sigma^* is k-uniform if h(a) has length k for all a in Sigma. A morphism is cubefree if it maps cubefree words to cubefree words. We show that for all k >= 0 there exists a k-uniform cubefree binary morphism.
[ { "version": "v1", "created": "Wed, 24 Dec 2008 01:48:55 GMT" } ]
2009-04-14T00:00:00
[ [ "Currie", "James", "" ], [ "Rampersad", "Narad", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0812.4471
Chun-Hung Liu
Chun-Hung Liu and Jeffery G. Andrews
Diversity-Multiplexing Tradeoff of Network Coding with Bidirectional Random Relaying
7 pages, 4 figures, to appear in the Proceedings of Allerton Conference on Communication, Control and Computing, September 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper develops a diversity-multiplexing tradeoff (DMT) over a bidirectional random relay set in a wireless network where the distribution of all nodes is a stationary Poisson point process. This is a nontrivial extension of the DMT because it requires consideration of the cooperation (or lack thereof) of relay nodes, the traffic pattern and the time allocation between the forward and reverse traffic directions. We then use this tradeoff to compare the DMTs of traditional time-division multihop (TDMH) and network coding (NC). Our main results are the derivations of the DMT for both TDMH and NC. This shows, surprisingly, that if relay nodes collaborate NC does not always have a better DMT than TDMH since it is difficult to simultaneously achieve bidirectional transmit diversity for both source nodes. In fact, for certain traffic patterns NC can have a worse DMT due to suboptimal time allocation between the forward and reverse transmission directions.
[ { "version": "v1", "created": "Wed, 24 Dec 2008 02:06:58 GMT" }, { "version": "v2", "created": "Tue, 30 Dec 2008 18:14:51 GMT" }, { "version": "v3", "created": "Tue, 11 Aug 2009 23:43:34 GMT" }, { "version": "v4", "created": "Fri, 25 Sep 2009 16:16:14 GMT" } ]
2009-09-25T00:00:00
[ [ "Liu", "Chun-Hung", "" ], [ "Andrews", "Jeffery G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4485
Abedelaziz Mohaisen
Abedelaziz Mohaisen
A computationally-efficient construction for the matrix-based key distribution in sensor network
4 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a variant for the symmetric matrix-based key distribution in sensor network introduced by Du et al. Our slight modification shows that the usage of specific structures for the public matrix instead of fully random matrix with elements in $\mathbb{Z}_q$ can reduce the computation overhead for generating the public key information and the key itself. An intensive analysis followed by modified scheme demonstrates the value of our contribution in relation with the current work and show the equivalence of the security
[ { "version": "v1", "created": "Wed, 24 Dec 2008 05:20:15 GMT" } ]
2009-09-29T00:00:00
[ [ "Mohaisen", "Abedelaziz", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0812.4487
Zilong Wang
Zilong Wang and Guang Gong
New Sequences Design from Weil Representation with Low Two-Dimensional Correlation in Both Time and Phase Shifts
23 pages, accepted by IEEE Transactions on Information Theory
null
null
null
cs.IT cs.DM math.IT math.RT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a given prime $p$, a new construction of families of the complex valued sequences of period $p$ with efficient implementation is given by applying both multiplicative characters and additive characters of finite field $\mathbb{F}_p$. Such a signal set consists of $p^2(p-2)$ time-shift distinct sequences, the magnitude of the two-dimensional autocorrelation function (i.e., the ambiguity function) in both time and phase of each sequence is upper bounded by $2\sqrt{p}$ at any shift not equal to $(0, 0)$, and the magnitude of the ambiguity function of any pair of phase-shift distinct sequences is upper bounded by $4\sqrt{p}$. Furthermore, the magnitude of their Fourier transform spectrum is less than or equal to 2. A proof is given through finding a simple elementary construction for the sequences constructed from the Weil representation by Gurevich, Hadani and Sochen. An open problem for directly establishing these assertions without involving the Weil representation is addressed.
[ { "version": "v1", "created": "Wed, 24 Dec 2008 15:58:29 GMT" }, { "version": "v2", "created": "Fri, 13 May 2011 17:17:05 GMT" } ]
2011-05-16T00:00:00
[ [ "Wang", "Zilong", "" ], [ "Gong", "Guang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.RT", "description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra", "span": "(Representation Theory)" } ]
0812.4514
Zhuo Li
Zhuo Li, Li-Juan Xing, and Xin-Mei Wang
Quantum generalized Reed-Solomon codes: Unified framework for quantum MDS codes
9 pages, no figures
Phys. Rev. A, 2008, 77, 012308
10.1103/PhysRevA.77.012308
null
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct a new family of quantum MDS codes from classical generalized Reed-Solomon codes and derive the necessary and sufficient condition under which these quantum codes exist. We also give code bounds and show how to construct them analytically. We find that existing quantum MDS codes can be unified under these codes in the sense that when a quantum MDS code exists, then a quantum code of this type with the same parameters also exists. Thus as far as is known at present, they are the most important family of quantum MDS codes.
[ { "version": "v1", "created": "Wed, 24 Dec 2008 10:09:26 GMT" } ]
2009-11-13T00:00:00
[ [ "Li", "Zhuo", "" ], [ "Xing", "Li-Juan", "" ], [ "Wang", "Xin-Mei", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4523
Armen Bagdasaryan
Armen Bagdasaryan
System Theoretic Viewpoint on Modeling of Complex Systems: Design, Synthesis, Simulation, and Control
10 pages; Contribution to the Proceedings of the 7th WSEAS International Conference on Computational Intelligence, Man-Machine Systems, and Cybernetics, Cairo, Egypt, December 29-31, 2008
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the basic features of complex dynamic and control systems, including systems having hierarchical structure. Special attention is paid to the problems of design and synthesis of complex systems and control models, and to the development of simulation techniques and systems. A model of complex system is proposed and briefly analyzed.
[ { "version": "v1", "created": "Wed, 24 Dec 2008 12:07:48 GMT" } ]
2008-12-25T00:00:00
[ [ "Bagdasaryan", "Armen", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0812.4542
John Panaretos
John Panaretos, Chrisovaladis Malesios
Assessing scientific research performance and impact with single indices
null
null
null
null
cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a comprehensive and critical review of the h-index and its most important modifications proposed in the literature, as well as of other similar indicators measuring research output and impact. Extensions of some of these indices are presented and illustrated.
[ { "version": "v1", "created": "Wed, 24 Dec 2008 15:41:48 GMT" }, { "version": "v2", "created": "Thu, 15 Jan 2009 18:46:14 GMT" }, { "version": "v3", "created": "Tue, 15 Sep 2009 14:52:52 GMT" } ]
2009-09-15T00:00:00
[ [ "Panaretos", "John", "" ], [ "Malesios", "Chrisovaladis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0812.4547
Christos Boutsidis
Christos Boutsidis, Petros Drineas
Random Projections for the Nonnegative Least-Squares Problem
to appear in Linear Algebra and its Applications
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constrained least-squares regression problems, such as the Nonnegative Least Squares (NNLS) problem, where the variables are restricted to take only nonnegative values, often arise in applications. Motivated by the recent development of the fast Johnson-Lindestrauss transform, we present a fast random projection type approximation algorithm for the NNLS problem. Our algorithm employs a randomized Hadamard transform to construct a much smaller NNLS problem and solves this smaller problem using a standard NNLS solver. We prove that our approach finds a nonnegative solution vector that, with high probability, is close to the optimum nonnegative solution in a relative error approximation sense. We experimentally evaluate our approach on a large collection of term-document data and verify that it does offer considerable speedups without a significant loss in accuracy. Our analysis is based on a novel random projection type result that might be of independent interest. In particular, given a tall and thin matrix $\Phi \in \mathbb{R}^{n \times d}$ ($n \gg d$) and a vector $y \in \mathbb{R}^d$, we prove that the Euclidean length of $\Phi y$ can be estimated very accurately by the Euclidean length of $\tilde{\Phi}y$, where $\tilde{\Phi}$ consists of a small subset of (appropriately rescaled) rows of $\Phi$.
[ { "version": "v1", "created": "Wed, 24 Dec 2008 16:43:22 GMT" }, { "version": "v2", "created": "Fri, 13 Mar 2009 20:17:36 GMT" } ]
2009-03-13T00:00:00
[ [ "Boutsidis", "Christos", "" ], [ "Drineas", "Petros", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.4580
Marcus Hutter
Marcus Hutter
Feature Markov Decision Processes
7 pages
Proc. 2nd Conf. on Artificial General Intelligence (AGI 2009) pages 61-66
null
null
cs.AI cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
General purpose intelligent learning agents cycle through (complex,non-MDP) sequences of observations, actions, and rewards. On the other hand, reinforcement learning is well-developed for small finite state Markov Decision Processes (MDPs). So far it is an art performed by human designers to extract the right state representation out of the bare observations, i.e. to reduce the agent setup to the MDP framework. Before we can think of mechanizing this search for suitable MDPs, we need a formal objective criterion. The main contribution of this article is to develop such a criterion. I also integrate the various parts into one learning algorithm. Extensions to more realistic dynamic Bayesian networks are developed in a companion article.
[ { "version": "v1", "created": "Thu, 25 Dec 2008 00:27:22 GMT" } ]
2009-12-30T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4581
Marcus Hutter
Marcus Hutter
Feature Dynamic Bayesian Networks
7 pages
Proc. 2nd Conf. on Artificial General Intelligence (AGI 2009) pages 67-73
null
null
cs.AI cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Feature Markov Decision Processes (PhiMDPs) are well-suited for learning agents in general environments. Nevertheless, unstructured (Phi)MDPs are limited to relatively simple environments. Structured MDPs like Dynamic Bayesian Networks (DBNs) are used for large-scale real-world problems. In this article I extend PhiMDP to PhiDBN. The primary contribution is to derive a cost criterion that allows to automatically extract the most relevant features from the environment, leading to the "best" DBN representation. I discuss all building blocks required for a complete general learning algorithm.
[ { "version": "v1", "created": "Thu, 25 Dec 2008 00:32:45 GMT" } ]
2009-12-30T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4614
Paola Zizzi
Paola Zizzi
I, Quantum Robot: Quantum Mind control on a Quantum Computer
13 pages; revised version for publication, references added
null
null
null
quant-ph cs.AI cs.LO cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The logic which describes quantum robots is not orthodox quantum logic, but a deductive calculus which reproduces the quantum tasks (computational processes, and actions) taking into account quantum superposition and quantum entanglement. A way toward the realization of intelligent quantum robots is to adopt a quantum metalanguage to control quantum robots. A physical implementation of a quantum metalanguage might be the use of coherent states in brain signals.
[ { "version": "v1", "created": "Thu, 25 Dec 2008 16:31:05 GMT" }, { "version": "v2", "created": "Thu, 28 May 2009 05:39:23 GMT" } ]
2009-05-28T00:00:00
[ [ "Zizzi", "Paola", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0812.4627
Dror Baron
Dror Baron (Technion - Israel Institute of Technology), Shriram Sarvotham (Halliburton), and Richard G. Baraniuk (Rice University)
Bayesian Compressive Sensing via Belief Propagation
25 pages with 8 figures; to appear in IEEE Transactions on Signal Processing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressive sensing (CS) is an emerging field based on the revelation that a small collection of linear projections of a sparse signal contains enough information for stable, sub-Nyquist signal acquisition. When a statistical characterization of the signal is available, Bayesian inference can complement conventional CS methods based on linear programming or greedy algorithms. We perform approximate Bayesian inference using belief propagation (BP) decoding, which represents the CS encoding matrix as a graphical model. Fast computation is obtained by reducing the size of the graphical model with sparse encoding matrices. To decode a length-N signal containing K large coefficients, our CS-BP decoding algorithm uses O(Klog(N)) measurements and O(Nlog^2(N)) computation. Finally, although we focus on a two-state mixture Gaussian model, CS-BP is easily adapted to other signal models.
[ { "version": "v1", "created": "Thu, 25 Dec 2008 21:00:28 GMT" }, { "version": "v2", "created": "Wed, 24 Jun 2009 21:31:38 GMT" } ]
2009-06-25T00:00:00
[ [ "Baron", "Dror", "", "Technion - Israel Institute of Technology" ], [ "Sarvotham", "Shriram", "", "Halliburton" ], [ "Baraniuk", "Richard G.", "", "Rice University" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4642
Masato Tajima
M. Tajima, K. Okino, and T. Miyagoshi
Error-Trellis State Complexity of LDPC Convolutional Codes Based on Circulant Matrices
5 pages, 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let H(D) be the parity-check matrix of an LDPC convolutional code corresponding to the parity-check matrix H of a QC code obtained using the method of Tanner et al. We see that the entries in H(D) are all monomials and several rows (columns) have monomial factors. Let us cyclically shift the rows of H. Then the parity-check matrix H'(D) corresponding to the modified matrix H' defines another convolutional code. However, its free distance is lower-bounded by the minimum distance of the original QC code. Also, each row (column) of H'(D) has a factor different from the one in H(D). We show that the state-space complexity of the error-trellis associated with H'(D) can be significantly reduced by controlling the row shifts applied to H with the error-correction capability being preserved.
[ { "version": "v1", "created": "Fri, 26 Dec 2008 05:28:47 GMT" }, { "version": "v2", "created": "Thu, 8 Jan 2009 06:08:39 GMT" } ]
2009-01-08T00:00:00
[ [ "Tajima", "M.", "" ], [ "Okino", "K.", "" ], [ "Miyagoshi", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4646
Ke Xu
Lian-dong Liu and Ke Xu
Time series of Internet AS-level topology graphs: four patterns and one model
9 pages, 4 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Researchers have proposed a variety of Internet topology models. However almost all of them focus on generating one graph based on one single static source graph. On the other hand, Internet topology is evolving over time continuously with the addition and deletion of nodes and edges. If a model is based on all the topologies in the past, instead of one of them, it will be more accurate and closer to the real world topology. In this paper, we study the Internet As-level topology time-series from two different sources and find that both of them obey four same dynamic graph patterns. Then we propose a mode that can infer the topology in the future based on all the topologies in the past. Through theoretical and experimental analysis, we prove the topology that our model generates can match both the static and dynamic graph patterns. In addition, the parameters in the model are meaningful. Finally, we theoretically and experimentally prove that these parameters are directly related to some important graph characteristics.
[ { "version": "v1", "created": "Fri, 26 Dec 2008 06:32:59 GMT" } ]
2008-12-31T00:00:00
[ [ "Liu", "Lian-dong", "" ], [ "Xu", "Ke", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.4706
Laurent Buse
Laurent Bus\'e (INRIA Sophia Antipolis), Guillaume Ch\`eze (IMT)
On the total order of reducibility of a pencil of algebraic plane curves
null
Journal of Algebra 341, 1 (2011) 256-278
10.1016/j.jalgebra.2011.06.006
null
math.AC cs.SC math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the problem of bounding the number of reducible curves in a pencil of algebraic plane curves is addressed. Unlike most of the previous related works, each reducible curve of the pencil is here counted with its appropriate multiplicity. It is proved that this number of reducible curves, counted with multiplicity, is bounded by d^2-1 where d is the degree of the pencil. Then, a sharper bound is given by taking into account the Newton's polygon of the pencil.
[ { "version": "v1", "created": "Fri, 26 Dec 2008 20:56:46 GMT" }, { "version": "v2", "created": "Wed, 17 Aug 2011 11:54:19 GMT" } ]
2011-08-18T00:00:00
[ [ "Busé", "Laurent", "", "INRIA Sophia Antipolis" ], [ "Chèze", "Guillaume", "", "IMT" ] ]
[ { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
0812.4710
Lahatra Rakotondrainibe
Lahatra Rakotondrainibe (IETR), Gheorghe Zaharia (IETR), Gha\"is El Zein (IETR), Yves Lostanlen (IETR)
Indoor Channel Measurements and Communications System Design at 60 GHz
2 pages
XXIX URSI General Assembly, Chicago : \'Etats-Unis (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a brief overview of several studies concerning the indoor wireless communications at 60 GHz performed by the IETR. The characterization and the modeling of the radio propagation channel are based on several measurement campaigns realized with the channel sounder developed at IETR. Some typical residential environments were also simulated by ray tracing and Gaussian Beam Tracking. The obtained results show a good agreement with the similar experimental results. Currently, the IETR is developing a high data rate wireless communication system operating at 60 GHz. The single-carrier architecture of this system is also presented.
[ { "version": "v1", "created": "Fri, 26 Dec 2008 21:04:15 GMT" } ]
2010-11-10T00:00:00
[ [ "Rakotondrainibe", "Lahatra", "", "IETR" ], [ "Zaharia", "Gheorghe", "", "IETR" ], [ "Zein", "Ghaïs El", "", "IETR" ], [ "Lostanlen", "Yves", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.4727
Alwen Tiu
Alwen Tiu and Alberto Momigliano
Induction and Co-induction in Sequent Calculus
This is an extended and revised version of an extended abstract which appeared in the proceedings of TYPES 2003
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Proof search has been used to specify a wide range of computation systems. In order to build a framework for reasoning about such specifications, we make use of a sequent calculus involving induction and co-induction. These proof principles are based on a proof theoretic (rather than set-theoretic) notion of definition. Definitions are akin to (stratified) logic programs, where the left and right rules for defined atoms allow one to view theories as "closed" or defining fixed points. The use of definitions makes it possible to reason intensionally about syntax, in particular enforcing free equality via unification. We add in a consistent way rules for pre and post fixed points, thus allowing the user to reason inductively and co-inductively about properties of computational system making full use of higher-order abstract syntax. Consistency is guaranteed via cut-elimination, where we give the first, to our knowledge, cut-elimination procedure in the presence of general inductive and co-inductive definitions.
[ { "version": "v1", "created": "Sat, 27 Dec 2008 09:29:16 GMT" }, { "version": "v2", "created": "Wed, 14 Jan 2009 06:01:25 GMT" }, { "version": "v3", "created": "Wed, 30 Sep 2009 05:03:56 GMT" } ]
2009-09-30T00:00:00
[ [ "Tiu", "Alwen", "" ], [ "Momigliano", "Alberto", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0812.4744
Ashutosh Gore
Ashutosh Deepak Gore
On Wireless Link Scheduling and Flow Control
Author's Ph.D. Thesis, 213 pages, 64 figures
null
null
EE-PHD-08-007
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This thesis focuses on link scheduling in wireless mesh networks by taking into account physical layer characteristics. The assumption made throughout is that a packet is received successfully only if the Signal to Interference and Noise Ratio (SINR) at the receiver exceeds the communication threshold. The thesis also discusses the complementary problem of flow control. (1) We consider various problems on centralized link scheduling in Spatial Time Division Multiple Access (STDMA) wireless mesh networks. We motivate the use of spatial reuse as performance metric and provide an explicit characterization of spatial reuse. We propose link scheduling algorithms based on certain graph models (communication graph, SINR graph) of the network. Our algorithms achieve higher spatial reuse than that of existing algorithms, with only a slight increase in computational complexity. (2) We investigate random access algorithms in wireless networks. We assume that the receiver is capable of power-based capture and propose a splitting algorithm that varies transmission powers of users on the basis of quaternary channel feedback. We model the algorithm dynamics by a Discrete Time Markov Chain and consequently show that its maximum stable throughput is 0.5518. Our algorithm achieves higher maximum stable throughput and significantly lower delay than the First Come First Serve (FCFS) splitting algorithm with uniform transmission power. (3) We consider the problem of flow control in packet networks from an information-theoretic perspective. We derive the maximum entropy of a flow which conforms to traffic constraints imposed by a generalized token bucket regulator (GTBR), by taking into account the covert information present in randomness of packet lengths.
[ { "version": "v1", "created": "Sat, 27 Dec 2008 13:37:53 GMT" } ]
2008-12-31T00:00:00
[ [ "Gore", "Ashutosh Deepak", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0812.4792
Sujit Gujar Mr
Sujit Gujar, Yadati Narahari
On Optimal Linear Redistribution of VCG Payments in Assignment of Heterogeneous Objects
12 pages
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are p heterogeneous objects to be assigned to n competing agents (n > p) each with unit demand. It is required to design a Groves mechanism for this assignment problem satisfying weak budget balance, individual rationality, and minimizing the budget imbalance. This calls for designing an appropriate rebate function. Our main result is an impossibility theorem which rules out linear rebate functions with non-zero efficiency in heterogeneous object assignment. Motivated by this theorem, we explore two approaches to get around this impossibility. In the first approach, we show that linear rebate functions with non-zero are possible when the valuations for the objects are correlated. In the second approach, we show that rebate functions with non-zero efficiency are possible if linearity is relaxed.
[ { "version": "v1", "created": "Sun, 28 Dec 2008 05:08:08 GMT" } ]
2008-12-31T00:00:00
[ [ "Gujar", "Sujit", "" ], [ "Narahari", "Yadati", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0812.4798
Avraham Trahtman N
A. N. Trahtman
The Road Coloring for Mapping on k States(withdrawn)
withdrawn, the result was known
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $\Gamma$ be directed strongly connected finite graph of uniform outdegree (constant outdegree of any vertex) and let some coloring of edges of $\Gamma$ turn the graph into deterministic complete automaton. Let the word $s$ be a word in the alphabet of colors (considered also as letters) on the edges of $\Gamma$ and let $\Gamma s$ be a mapping of vertices $\Gamma$.
[ { "version": "v1", "created": "Sun, 28 Dec 2008 07:11:39 GMT" }, { "version": "v2", "created": "Mon, 5 Jan 2009 22:23:27 GMT" } ]
2009-01-06T00:00:00
[ [ "Trahtman", "A. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0812.4803
Tal Philosof
Tal Philosof, Ram Zamir and Uri Erez
Technical Report: Achievable Rates for the MAC with Correlated Channel-State Information
7 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we provide an achievable rate region for the discrete memoryless multiple access channel with correlated state information known non-causally at the encoders using a random binning technique. This result is a generalization of the random binning technique used by Gel'fand and Pinsker for the problem with non-causal channel state information at the encoder in point to point communication.
[ { "version": "v1", "created": "Sun, 28 Dec 2008 09:33:13 GMT" } ]
2008-12-31T00:00:00
[ [ "Philosof", "Tal", "" ], [ "Zamir", "Ram", "" ], [ "Erez", "Uri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4814
Joergen Villadsen
J{\o}rgen Villadsen
Nominalistic Logic (Extended Abstract)
3 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nominalistic Logic (NL) is a new presentation of Paul Gilmore's Intensional Type Theory (ITT) as a sequent calculus together with a succinct nominalization axiom (N) that permits names of predicates as individuals in certain cases. The logic has a flexible comprehension axiom, but no extensionality axiom and no infinity axiom, although axiom N is the key to the derivation of Peano's postulates for the natural numbers.
[ { "version": "v1", "created": "Sun, 28 Dec 2008 12:45:05 GMT" } ]
2008-12-31T00:00:00
[ [ "Villadsen", "Jørgen", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0812.4826
Long Gao
Long Gao, Rui Zhang, Changchuan Yin, Shuguang Cui
Delay-Throughput Tradeoff for Supportive Two-Tier Networks
5 pages, 1 figure, submitted to ISIT 2009
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a static wireless network that has two tiers with different priorities: a primary tier vs. a secondary tier. The primary tier consists of randomly distributed legacy nodes of density $n$, which have an absolute priority to access the spectrum. The secondary tier consists of randomly distributed cognitive nodes of density $m=n^\beta$ with $\beta\geq 2$, which can only access the spectrum opportunistically to limit the interference to the primary tier. By allowing the secondary tier to route the packets for the primary tier, we show that the primary tier can achieve a throughput scaling of $\lambda_p(n)=\Theta(1/\log n)$ per node and a delay-throughput tradeoff of $D_p(n)=\Theta(\sqrt{n^\beta\log n}\lambda_p(n))$ for $\lambda_p(n)=O(1/\log n)$, while the secondary tier still achieves the same optimal delay-throughput tradeoff as a stand-alone network.
[ { "version": "v1", "created": "Sun, 28 Dec 2008 16:18:02 GMT" } ]
2008-12-31T00:00:00
[ [ "Gao", "Long", "" ], [ "Zhang", "Rui", "" ], [ "Yin", "Changchuan", "" ], [ "Cui", "Shuguang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4835
Ran Gelles
Michel Boyer, Ran Gelles, Dan Kenigsberg, Tal Mor
Semi-Quantum Key Distribution
13 pages, 2 figures
null
10.1103/PhysRevA.79.032341
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum. What is possible when only one party (Alice) is quantum, yet the other (Bob) has only classical capabilities? Recently, a semi-quantum key distribution protocol was presented (Boyer, Kenigsberg and Mor, Physical Review Letters, 2007), in which one of the parties (Bob) is classical, and yet, the protocol is proven to be completely robust against an eavesdropping attempt. Here we extend that result much further. We present two protocols with this constraint, and prove their robustness against attacks: we prove that any attempt of an adversary to obtain information (and even a tiny amount of information) necessarily induces some errors that the legitimate parties could notice. One protocol presented here is identical to the one referred to above, however, its robustness is proven here in a much more general scenario. The other protocol is very different as it is based on randomization.
[ { "version": "v1", "created": "Sun, 28 Dec 2008 18:15:05 GMT" } ]
2011-11-01T00:00:00
[ [ "Boyer", "Michel", "" ], [ "Gelles", "Ran", "" ], [ "Kenigsberg", "Dan", "" ], [ "Mor", "Tal", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0812.4848
Thomas Schneider
Michael Bauland, Thomas Schneider, Henning Schnoor, Ilka Schnoor, Heribert Vollmer
The Complexity of Generalized Satisfiability for Linear Temporal Logic
null
Logical Methods in Computer Science, Volume 5, Issue 1 (January 26, 2009) lmcs:1158
10.2168/LMCS-5(1:1)2009
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a seminal paper from 1985, Sistla and Clarke showed that satisfiability for Linear Temporal Logic (LTL) is either NP-complete or PSPACE-complete, depending on the set of temporal operators used. If, in contrast, the set of propositional operators is restricted, the complexity may decrease. This paper undertakes a systematic study of satisfiability for LTL formulae over restricted sets of propositional and temporal operators. Since every propositional operator corresponds to a Boolean function, there exist infinitely many propositional operators. In order to systematically cover all possible sets of them, we use Post's lattice. With its help, we determine the computational complexity of LTL satisfiability for all combinations of temporal operators and all but two classes of propositional functions. Each of these infinitely many problems is shown to be either PSPACE-complete, NP-complete, or in P.
[ { "version": "v1", "created": "Sun, 28 Dec 2008 21:10:06 GMT" }, { "version": "v2", "created": "Tue, 27 Jan 2009 13:14:33 GMT" }, { "version": "v3", "created": "Mon, 23 Mar 2009 11:56:18 GMT" } ]
2015-07-01T00:00:00
[ [ "Bauland", "Michael", "" ], [ "Schneider", "Thomas", "" ], [ "Schnoor", "Henning", "" ], [ "Schnoor", "Ilka", "" ], [ "Vollmer", "Heribert", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0812.4852
Carl Hewitt
Carl Hewitt
Formalizing common sense for scalable inconsistency-robust information integration using Direct Logic(TM) reasoning and the Actor Model
Corrected: all types are strict
null
null
null
cs.LO cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Because contemporary large software systems are pervasively inconsistent, it is not safe to reason about them using classical logic. The goal of Direct Logic is to be a minimal fix to classical mathematical logic that meets the requirements of large-scale Internet applications (including sense making for natural language) by addressing the following issues: inconsistency robustness, contrapositive inference bug, and direct argumentation. Direct Logic makes the following contributions over previous work: * Direct Inference (no contrapositive bug for inference) * Direct Argumentation (inference directly expressed) * Inconsistency-robust deduction without artifices such as indices (labels) on propositions or restrictions on reiteration * Intuitive inferences hold including the following: * Boolean Equivalences * Reasoning by splitting for disjunctive cases * Soundness * Inconsistency-robust Proof by Contradiction Since the global state model of computation (first formalized by Turing) is inadequate to the needs of modern large-scale Internet applications the Actor Model was developed to meet this need. Using, the Actor Model, this paper proves that Logic Programming is not computationally universal in that there are computations that cannot be implemented using logical inference. Consequently the Logic Programming paradigm is strictly less general than the Procedural Embedding of Knowledge paradigm.
[ { "version": "v1", "created": "Sun, 28 Dec 2008 21:37:23 GMT" }, { "version": "v10", "created": "Fri, 12 Jun 2009 21:10:35 GMT" }, { "version": "v100", "created": "Wed, 5 Nov 2014 14:09:33 GMT" }, { "version": "v101", "created": "Sun, 23 Nov 2014 22:59:31 GMT" }, { "version": "v102", "created": "Mon, 29 Dec 2014 16:47:29 GMT" }, { "version": "v103", "created": "Mon, 2 Mar 2015 06:39:17 GMT" }, { "version": "v11", "created": "Tue, 14 Jul 2009 00:08:22 GMT" }, { "version": "v12", "created": "Fri, 17 Jul 2009 05:28:44 GMT" }, { "version": "v13", "created": "Fri, 14 Aug 2009 07:48:39 GMT" }, { "version": "v14", "created": "Thu, 20 Aug 2009 18:19:06 GMT" }, { "version": "v15", "created": "Sat, 26 Sep 2009 18:10:14 GMT" }, { "version": "v16", "created": "Sun, 8 Nov 2009 07:43:45 GMT" }, { "version": "v17", "created": "Fri, 20 Nov 2009 16:05:14 GMT" }, { "version": "v18", "created": "Tue, 24 Nov 2009 05:50:49 GMT" }, { "version": "v19", "created": "Thu, 3 Dec 2009 15:42:13 GMT" }, { "version": "v2", "created": "Tue, 30 Dec 2008 23:30:05 GMT" }, { "version": "v20", "created": "Thu, 3 Dec 2009 23:03:29 GMT" }, { "version": "v21", "created": "Thu, 10 Dec 2009 07:12:22 GMT" }, { "version": "v22", "created": "Tue, 29 Dec 2009 23:00:04 GMT" }, { "version": "v23", "created": "Thu, 31 Dec 2009 20:06:59 GMT" }, { "version": "v24", "created": "Sat, 9 Jan 2010 18:28:38 GMT" }, { "version": "v25", "created": "Wed, 13 Jan 2010 22:53:30 GMT" }, { "version": "v26", "created": "Sat, 16 Jan 2010 21:02:44 GMT" }, { "version": "v27", "created": "Sun, 31 Jan 2010 11:51:22 GMT" }, { "version": "v28", "created": "Sun, 7 Feb 2010 22:47:16 GMT" }, { "version": "v29", "created": "Thu, 11 Feb 2010 22:23:44 GMT" }, { "version": "v3", "created": "Mon, 26 Jan 2009 18:10:14 GMT" }, { "version": "v30", "created": "Wed, 17 Feb 2010 17:54:03 GMT" }, { "version": "v31", "created": "Wed, 24 Feb 2010 01:49:48 GMT" }, { "version": "v32", "created": "Sat, 27 Feb 2010 14:08:25 GMT" }, { "version": "v33", "created": "Sat, 6 Mar 2010 17:44:48 GMT" }, { "version": "v34", "created": "Thu, 11 Mar 2010 15:34:10 GMT" }, { "version": "v35", "created": "Mon, 22 Mar 2010 01:39:19 GMT" }, { "version": "v36", "created": "Sun, 4 Apr 2010 10:13:36 GMT" }, { "version": "v37", "created": "Tue, 13 Apr 2010 16:37:09 GMT" }, { "version": "v38", "created": "Mon, 19 Apr 2010 16:28:14 GMT" }, { "version": "v39", "created": "Thu, 22 Apr 2010 19:20:04 GMT" }, { "version": "v4", "created": "Fri, 20 Mar 2009 17:32:25 GMT" }, { "version": "v40", "created": "Mon, 26 Apr 2010 16:52:49 GMT" }, { "version": "v41", "created": "Tue, 27 Apr 2010 16:17:39 GMT" }, { "version": "v42", "created": "Tue, 25 May 2010 14:53:37 GMT" }, { "version": "v43", "created": "Thu, 1 Jul 2010 14:48:06 GMT" }, { "version": "v44", "created": "Mon, 12 Jul 2010 15:46:06 GMT" }, { "version": "v45", "created": "Mon, 2 Aug 2010 10:51:53 GMT" }, { "version": "v46", "created": "Mon, 9 Aug 2010 11:11:23 GMT" }, { "version": "v47", "created": "Mon, 30 Aug 2010 17:19:34 GMT" }, { "version": "v48", "created": "Mon, 13 Sep 2010 19:00:50 GMT" }, { "version": "v49", "created": "Thu, 23 Sep 2010 17:42:38 GMT" }, { "version": "v5", "created": "Mon, 30 Mar 2009 14:24:19 GMT" }, { "version": "v50", "created": "Sun, 3 Oct 2010 02:36:47 GMT" }, { "version": "v51", "created": "Sun, 17 Oct 2010 00:29:19 GMT" }, { "version": "v52", "created": "Mon, 15 Nov 2010 23:37:16 GMT" }, { "version": "v53", "created": "Tue, 23 Nov 2010 19:19:16 GMT" }, { "version": "v54", "created": "Thu, 9 Dec 2010 13:25:55 GMT" }, { "version": "v55", "created": "Wed, 29 Dec 2010 13:27:45 GMT" }, { "version": "v56", "created": "Thu, 20 Jan 2011 07:46:17 GMT" }, { "version": "v57", "created": "Wed, 26 Jan 2011 08:31:46 GMT" }, { "version": "v58", "created": "Mon, 31 Jan 2011 00:17:50 GMT" }, { "version": "v59", "created": "Thu, 10 Feb 2011 08:28:00 GMT" }, { "version": "v6", "created": "Mon, 30 Mar 2009 23:44:01 GMT" }, { "version": "v60", "created": "Tue, 15 Mar 2011 16:15:16 GMT" }, { "version": "v61", "created": "Wed, 23 Mar 2011 13:25:55 GMT" }, { "version": "v62", "created": "Wed, 30 Mar 2011 06:55:12 GMT" }, { "version": "v63", "created": "Mon, 11 Apr 2011 16:45:02 GMT" }, { "version": "v64", "created": "Sun, 17 Apr 2011 23:39:33 GMT" }, { "version": "v65", "created": "Wed, 27 Apr 2011 08:28:01 GMT" }, { "version": "v66", "created": "Mon, 2 May 2011 14:13:51 GMT" }, { "version": "v67", "created": "Mon, 9 May 2011 16:14:00 GMT" }, { "version": "v68", "created": "Mon, 16 May 2011 03:13:50 GMT" }, { "version": "v69", "created": "Tue, 31 May 2011 10:21:32 GMT" }, { "version": "v7", "created": "Mon, 27 Apr 2009 08:17:17 GMT" }, { "version": "v70", "created": "Mon, 6 Jun 2011 17:00:09 GMT" }, { "version": "v71", "created": "Thu, 16 Jun 2011 18:37:21 GMT" }, { "version": "v72", "created": "Mon, 27 Jun 2011 19:40:09 GMT" }, { "version": "v73", "created": "Thu, 7 Jul 2011 00:36:10 GMT" }, { "version": "v74", "created": "Mon, 1 Aug 2011 19:25:13 GMT" }, { "version": "v75", "created": "Mon, 22 Aug 2011 06:42:33 GMT" }, { "version": "v76", "created": "Thu, 25 Aug 2011 14:51:09 GMT" }, { "version": "v77", "created": "Sun, 18 Sep 2011 14:44:39 GMT" }, { "version": "v78", "created": "Mon, 26 Sep 2011 20:45:24 GMT" }, { "version": "v79", "created": "Tue, 15 Nov 2011 15:31:31 GMT" }, { "version": "v8", "created": "Sat, 30 May 2009 23:38:27 GMT" }, { "version": "v80", "created": "Mon, 21 Nov 2011 20:08:06 GMT" }, { "version": "v81", "created": "Sun, 1 Jan 2012 00:46:32 GMT" }, { "version": "v82", "created": "Tue, 31 Jan 2012 03:10:35 GMT" }, { "version": "v83", "created": "Mon, 13 Feb 2012 07:17:46 GMT" }, { "version": "v84", "created": "Mon, 27 Feb 2012 23:02:35 GMT" }, { "version": "v85", "created": "Mon, 2 Apr 2012 14:16:11 GMT" }, { "version": "v86", "created": "Tue, 4 Dec 2012 18:26:14 GMT" }, { "version": "v87", "created": "Mon, 11 Mar 2013 19:40:08 GMT" }, { "version": "v88", "created": "Fri, 2 Aug 2013 21:41:29 GMT" }, { "version": "v89", "created": "Tue, 27 Aug 2013 13:27:49 GMT" }, { "version": "v9", "created": "Wed, 10 Jun 2009 14:59:46 GMT" }, { "version": "v90", "created": "Tue, 24 Sep 2013 19:05:21 GMT" }, { "version": "v91", "created": "Sat, 2 Nov 2013 04:51:44 GMT" }, { "version": "v92", "created": "Tue, 18 Feb 2014 19:43:19 GMT" }, { "version": "v93", "created": "Mon, 3 Mar 2014 07:52:01 GMT" }, { "version": "v94", "created": "Thu, 19 Jun 2014 22:03:58 GMT" }, { "version": "v95", "created": "Sat, 5 Jul 2014 22:04:00 GMT" }, { "version": "v96", "created": "Mon, 21 Jul 2014 12:48:15 GMT" }, { "version": "v97", "created": "Mon, 28 Jul 2014 14:54:56 GMT" }, { "version": "v98", "created": "Mon, 4 Aug 2014 16:55:37 GMT" }, { "version": "v99", "created": "Mon, 18 Aug 2014 14:28:05 GMT" } ]
2015-03-03T00:00:00
[ [ "Hewitt", "Carl", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0812.4889
Neri Merhav
Neri Merhav, Dongning Guo, and Shlomo Shamai (Shitz)
Statistical Physics of Signal Estimation in Gaussian Noise: Theory and Examples of Phase Transitions
Submitted to the IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2039047
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of signal estimation (denoising) from a statistical mechanical perspective, using a relationship between the minimum mean square error (MMSE), of estimating a signal, and the mutual information between this signal and its noisy version. The paper consists of essentially two parts. In the first, we derive several statistical-mechanical relationships between a few important quantities in this problem area, such as the MMSE, the differential entropy, the Fisher information, the free energy, and a generalized notion of temperature. We also draw analogies and differences between certain relations pertaining to the estimation problem and the parallel relations in thermodynamics and statistical physics. In the second part of the paper, we provide several application examples, where we demonstrate how certain analysis tools that are customary in statistical physics, prove useful in the analysis of the MMSE. In most of these examples, the corresponding statistical-mechanical systems turn out to consist of strong interactions that cause phase transitions, which in turn are reflected as irregularities and discontinuities (similar to threshold effects) in the behavior of the MMSE.
[ { "version": "v1", "created": "Mon, 29 Dec 2008 10:26:18 GMT" } ]
2016-11-17T00:00:00
[ [ "Merhav", "Neri", "", "Shitz" ], [ "Guo", "Dongning", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4893
Jukka Suomela
Patrik Flor\'een, Petteri Kaski, Valentin Polishchuk, Jukka Suomela
Almost stable matchings in constant time
20 pages
Algorithmica 58 (2010) 102-118
10.1007/s00453-009-9353-9
null
cs.DS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the ratio of matched individuals to blocking pairs grows linearly with the number of propose--accept rounds executed by the Gale--Shapley algorithm for the stable marriage problem. Consequently, the participants can arrive at an almost stable matching even without full information about the problem instance; for each participant, knowing only its local neighbourhood is enough. In distributed-systems parlance, this means that if each person has only a constant number of acceptable partners, an almost stable matching emerges after a constant number of synchronous communication rounds. This holds even if ties are present in the preference lists. We apply our results to give a distributed $(2+\epsilon)$-approximation algorithm for maximum-weight matching in bicoloured graphs and a centralised randomised constant-time approximation scheme for estimating the size of a stable matching.
[ { "version": "v1", "created": "Mon, 29 Dec 2008 11:04:46 GMT" } ]
2012-05-15T00:00:00
[ [ "Floréen", "Patrik", "" ], [ "Kaski", "Petteri", "" ], [ "Polishchuk", "Valentin", "" ], [ "Suomela", "Jukka", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0812.4905
Jure Leskovec
Jure Leskovec, Deepayan Chakrabarti, Jon Kleinberg, Christos Faloutsos and Zoubin Ghahramani
Kronecker Graphs: An Approach to Modeling Networks
null
null
null
null
stat.ML cs.DS physics.data-an physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How can we model networks with a mathematically tractable model that allows for rigorous analysis of network properties? Networks exhibit a long list of surprising properties: heavy tails for the degree distribution; small diameters; and densification and shrinking diameters over time. Most present network models either fail to match several of the above properties, are complicated to analyze mathematically, or both. In this paper we propose a generative model for networks that is both mathematically tractable and can generate networks that have the above mentioned properties. Our main idea is to use the Kronecker product to generate graphs that we refer to as "Kronecker graphs". First, we prove that Kronecker graphs naturally obey common network properties. We also provide empirical evidence showing that Kronecker graphs can effectively model the structure of real networks. We then present KronFit, a fast and scalable algorithm for fitting the Kronecker graph generation model to large real networks. A naive approach to fitting would take super- exponential time. In contrast, KronFit takes linear time, by exploiting the structure of Kronecker matrix multiplication and by using statistical simulation techniques. Experiments on large real and synthetic networks show that KronFit finds accurate parameters that indeed very well mimic the properties of target networks. Once fitted, the model parameters can be used to gain insights about the network structure, and the resulting synthetic graphs can be used for null- models, anonymization, extrapolations, and graph summarization.
[ { "version": "v1", "created": "Mon, 29 Dec 2008 13:22:23 GMT" }, { "version": "v2", "created": "Fri, 21 Aug 2009 21:52:11 GMT" } ]
2009-08-22T00:00:00
[ [ "Leskovec", "Jure", "" ], [ "Chakrabarti", "Deepayan", "" ], [ "Kleinberg", "Jon", "" ], [ "Faloutsos", "Christos", "" ], [ "Ghahramani", "Zoubin", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0812.4919
Ildik\'o Schlotter
D\'aniel Marx, Ildik\'o Schlotter
Obtaining a Planar Graph by Vertex Deletion
16 pages, 4 figures. A preliminary version of this paper appeared in the proceedings of WG 2007 (33rd International Workshop on Graph-Theoretic Concepts in Computer Science). The paper has been submitted to Algorithmica
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the k-Apex problem the task is to find at most k vertices whose deletion makes the given graph planar. The graphs for which there exists a solution form a minor closed class of graphs, hence by the deep results of Robertson and Seymour, there is an O(n^3) time algorithm for every fixed value of k. However, the proof is extremely complicated and the constants hidden by the big-O notation are huge. Here we give a much simpler algorithm for this problem with quadratic running time, by iteratively reducing the input graph and then applying techniques for graphs of bounded treewidth.
[ { "version": "v1", "created": "Mon, 29 Dec 2008 14:57:14 GMT" } ]
2008-12-31T00:00:00
[ [ "Marx", "Dániel", "" ], [ "Schlotter", "Ildikó", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.4937
Peter Trifonov
Peter Trifonov
Efficient Interpolation in the Guruswami-Sudan Algorithm
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2010.2053901
null
cs.IT cs.DM math.AC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel algorithm is proposed for the interpolation step of the Guruswami-Sudan list decoding algorithm. The proposed method is based on the binary exponentiation algorithm, and can be considered as an extension of the Lee-O'Sullivan algorithm. The algorithm is shown to achieve both asymptotical and practical performance gain compared to the case of iterative interpolation algorithm. Further complexity reduction is achieved by integrating the proposed method with re-encoding. The key contribution of the paper, which enables the complexity reduction, is a novel randomized ideal multiplication algorithm.
[ { "version": "v1", "created": "Mon, 29 Dec 2008 16:52:28 GMT" }, { "version": "v2", "created": "Fri, 5 Jun 2009 17:03:44 GMT" }, { "version": "v3", "created": "Mon, 12 Apr 2010 06:35:05 GMT" } ]
2016-11-18T00:00:00
[ [ "Trifonov", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4952
John Langford
Alina Beygelzimer, Sanjoy Dasgupta, and John Langford
Importance Weighted Active Learning
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a practical and statistically consistent scheme for actively learning binary classifiers under general loss functions. Our algorithm uses importance weighting to correct sampling bias, and by controlling the variance, we are able to give rigorous label complexity bounds for the learning process. Experiments on passively labeled data show that this approach reduces the label complexity required to achieve good predictive performance on many learning problems.
[ { "version": "v1", "created": "Mon, 29 Dec 2008 18:29:08 GMT" }, { "version": "v2", "created": "Fri, 6 Feb 2009 20:56:24 GMT" }, { "version": "v3", "created": "Thu, 7 May 2009 13:14:45 GMT" }, { "version": "v4", "created": "Wed, 20 May 2009 17:40:23 GMT" } ]
2009-05-20T00:00:00
[ [ "Beygelzimer", "Alina", "" ], [ "Dasgupta", "Sanjoy", "" ], [ "Langford", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0812.4973
Neil Dickson
Neil G. Dickson
A Simple, Linear-Time Algorithm for x86 Jump Encoding
5 pages
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of space-optimal jump encoding in the x86 instruction set, also known as branch displacement optimization, is described, and a linear-time algorithm is given that uses no complicated data structures, no recursion, and no randomization. The only assumption is that there are no array declarations whose size depends on the negative of the size of a section of code (Hyde 2006), which is reasonable for real code.
[ { "version": "v1", "created": "Mon, 29 Dec 2008 21:07:52 GMT" } ]
2009-09-29T00:00:00
[ [ "Dickson", "Neil G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0812.4974
Charles Fulton
Cecilia Knoll, Charles Fulton
Using a computer algebra system to simplify expressions for Titchmarsh-Weyl m-functions associated with the Hydrogen Atom on the half line
10 pages
null
null
null
math.SP cs.SC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we give simplified formulas for certain polynomials which arise in some new Titchmarsh-Weyl m-functions for the radial part of the separated Hydrogen atom on the half line and two independent programs for generating them using the symbolic manipulator Mathematica.
[ { "version": "v1", "created": "Mon, 29 Dec 2008 21:10:17 GMT" } ]
2008-12-31T00:00:00
[ [ "Knoll", "Cecilia", "" ], [ "Fulton", "Charles", "" ] ]
[ { "class": "Mathematics", "code": "math.SP", "description": "Schrodinger operators, operators on manifolds, general differential operators, numerical studies, integral operators, discrete models, resonances, non-self-adjoint operators, random operators/matrices", "span": "(Spectral Theory)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0812.4983
Md. Borhan Uddin
Nitesh Saxena and Md. Borhan Uddin
Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes
10 Pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To establish secure (point-to-point and/or broadcast) communication channels among the nodes of a wireless sensor network is a fundamental task. To this end, a plethora of (socalled) key pre-distribution schemes have been proposed in the past. All these schemes, however, rely on shared secret(s), which are assumed to be somehow pre-loaded onto the sensor nodes. In this paper, we propose a novel method for secure initialization of sensor nodes based on a visual out-of-band channel. Using the proposed method, the administrator of a sensor network can distribute keys onto the sensor nodes, necessary to bootstrap key pre-distribution. Our secure initialization method requires only a little extra cost, is efficient and scalable with respect to the number of sensor nodes. Moreover, based on a usability study that we conducted, the method turns out to be quite user-friendly and easy to use by naive human users.
[ { "version": "v1", "created": "Tue, 30 Dec 2008 01:34:29 GMT" } ]
2008-12-31T00:00:00
[ [ "Saxena", "Nitesh", "" ], [ "Uddin", "Md. Borhan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0812.4985
Goochul Chung
G. Chung, S. Sridharan, S. Vishwanath, C. S. Hwang
On the Capacity of Partially Cognitive Radios
7 pages,2 figures
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
This paper considers the problem of cognitive radios with partial-message information. Here, an interference channel setting is considered where one transmitter (the "cognitive" one) knows the message of the other ("legitimate" user) partially. An outer bound on the capacity region of this channel is found for the "weak" interference case (where the interference from the cognitive transmitter to the legitimate receiver is weak). This outer bound is shown for both the discrete-memoryless and the Gaussian channel cases. An achievable region is subsequently determined for a mixed interference Gaussian cognitive radio channel, where the interference from the legitimate transmitter to the cognitive receiver is "strong". It is shown that, for a class of mixed Gaussian cognitive radio channels, portions of the outer bound are achievable thus resulting in a characterization of a part of this channel's capacity region.
[ { "version": "v1", "created": "Mon, 29 Dec 2008 23:04:08 GMT" } ]
2008-12-31T00:00:00
[ [ "Chung", "G.", "" ], [ "Sridharan", "S.", "" ], [ "Vishwanath", "S.", "" ], [ "Hwang", "C. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0812.4986
Albrecht Schmidt
Albrecht Schmidt
An Array Algebra
Five pages, no figures
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is a proposal of an algebra which aims at distributed array processing. The focus lies on re-arranging and distributing array data, which may be multi-dimensional. The context of the work is scientific processing; thus, the core science operations are assumed to be taken care of in external libraries or languages. A main design driver is the desire to carry over some of the strategies of the relational algebra into the array domain.
[ { "version": "v1", "created": "Mon, 29 Dec 2008 23:14:00 GMT" } ]
2008-12-31T00:00:00
[ [ "Schmidt", "Albrecht", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0812.5026
Shamgar Gurevich
Shamgar Gurevich (UC Berkeley), Ronny Hadani (University of Chicago), Nir Sochen (Tel Aviv University)
Group representation design of digital signals and sequences
Appeared in the proceedings of the international conference on Sequences and Their Applications (SETA) 2008. Key words: Weil representation, commutative subgroups, eigenfunctions, good correlations, low supremum, Fourier invariance, explicit algorithm
null
null
null
cs.IT cs.DM math.IT math.RT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this survey a novel system, called the oscillator system, consisting of order of p^3 functions (signals) on the finite field F_{p}, is described and studied. The new functions are proved to satisfy good auto-correlation, cross-correlation and low peak-to-average power ratio properties. Moreover, the oscillator system is closed under the operation of discrete Fourier transform. Applications of the oscillator system for discrete radar and digital communication theory are explained. Finally, an explicit algorithm to construct the oscillator system is presented.
[ { "version": "v1", "created": "Tue, 30 Dec 2008 08:03:43 GMT" } ]
2008-12-31T00:00:00
[ [ "Gurevich", "Shamgar", "", "UC Berkeley" ], [ "Hadani", "Ronny", "", "University of Chicago" ], [ "Sochen", "Nir", "", "Tel Aviv University" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.RT", "description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra", "span": "(Representation Theory)" } ]
0812.5030
Gregory Price
Daniel Kane, Gregory N. Price, and Erik D. Demaine
A Pseudopolynomial Algorithm for Alexandrov's Theorem
25 pages; new Delaunay triangulation algorithm, minor other changes; an abbreviated v2 was at WADS 2009
null
null
null
cs.CG
http://creativecommons.org/licenses/by-nc-sa/3.0/
Alexandrov's Theorem states that every metric with the global topology and local geometry required of a convex polyhedron is in fact the intrinsic metric of a unique convex polyhedron. Recent work by Bobenko and Izmestiev describes a differential equation whose solution leads to the polyhedron corresponding to a given metric. We describe an algorithm based on this differential equation to compute the polyhedron to arbitrary precision given the metric, and prove a pseudopolynomial bound on its running time. Along the way, we develop pseudopolynomial algorithms for computing shortest paths and weighted Delaunay triangulations on a polyhedral surface, even when the surface edges are not shortest paths.
[ { "version": "v1", "created": "Tue, 30 Dec 2008 08:41:29 GMT" }, { "version": "v2", "created": "Wed, 27 May 2009 03:04:09 GMT" }, { "version": "v3", "created": "Mon, 4 Jan 2010 02:43:09 GMT" } ]
2010-01-04T00:00:00
[ [ "Kane", "Daniel", "" ], [ "Price", "Gregory N.", "" ], [ "Demaine", "Erik D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0812.5032
Qiang Li
Qiang Li, Yan He, Jing-ping Jiang
A New Clustering Algorithm Based Upon Flocking On Complex Network
18 pages, 4 figures, 3 tables
null
null
null
cs.LG cs.AI cs.CV physics.soc-ph
http://creativecommons.org/licenses/by-nc-sa/3.0/
We have proposed a model based upon flocking on a complex network, and then developed two clustering algorithms on the basis of it. In the algorithms, firstly a \textit{k}-nearest neighbor (knn) graph as a weighted and directed graph is produced among all data points in a dataset each of which is regarded as an agent who can move in space, and then a time-varying complex network is created by adding long-range links for each data point. Furthermore, each data point is not only acted by its \textit{k} nearest neighbors but also \textit{r} long-range neighbors through fields established in space by them together, so it will take a step along the direction of the vector sum of all fields. It is more important that these long-range links provides some hidden information for each data point when it moves and at the same time accelerate its speed converging to a center. As they move in space according to the proposed model, data points that belong to the same class are located at a same position gradually, whereas those that belong to different classes are away from one another. Consequently, the experimental results have demonstrated that data points in datasets are clustered reasonably and efficiently, and the rates of convergence of clustering algorithms are fast enough. Moreover, the comparison with other algorithms also provides an indication of the effectiveness of the proposed approach.
[ { "version": "v1", "created": "Tue, 30 Dec 2008 08:30:27 GMT" } ]
2008-12-31T00:00:00
[ [ "Li", "Qiang", "" ], [ "He", "Yan", "" ], [ "Jiang", "Jing-ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0812.5039
Gabriel Nivasch
Boris Bukh, Ji\v{r}\'i Matou\v{s}ek, Gabriel Nivasch
Lower bounds for weak epsilon-nets and stair-convexity
To appear in Israel J. Math. 21 pages, 4 figures
Israel Journal of Mathematics, 182:199-228, 2011
10.1007/s11856-011-0029-1
null
math.CO cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A set N is called a "weak epsilon-net" (with respect to convex sets) for a finite set X in R^d if N intersects every convex set that contains at least epsilon*|X| points of X. For every fixed d>=2 and every r>=1 we construct sets X in R^d for which every weak (1/r)-net has at least Omega(r log^{d-1} r) points; this is the first superlinear lower bound for weak epsilon-nets in a fixed dimension. The construction is a "stretched grid", i.e., the Cartesian product of d suitable fast-growing finite sequences, and convexity in this grid can be analyzed using "stair-convexity", a new variant of the usual notion of convexity. We also consider weak epsilon-nets for the diagonal of our stretched grid in R^d, d>=3, which is an "intrinsically 1-dimensional" point set. In this case we exhibit slightly superlinear lower bounds (involving the inverse Ackermann function), showing that upper bounds by Alon, Kaplan, Nivasch, Sharir, and Smorodinsky (2008) are not far from the truth in the worst case. Using the stretched grid we also improve the known upper bound for the so-called "second selection lemma" in the plane by a logarithmic factor: We obtain a set T of t triangles with vertices in an n-point set in the plane such that no point is contained in more than O(t^2 / (n^3 log (n^3/t))) triangles of T.
[ { "version": "v1", "created": "Tue, 30 Dec 2008 09:21:04 GMT" }, { "version": "v2", "created": "Wed, 14 Oct 2009 14:22:55 GMT" } ]
2013-03-25T00:00:00
[ [ "Bukh", "Boris", "" ], [ "Matoušek", "Jiří", "" ], [ "Nivasch", "Gabriel", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0812.5064
Qiang Li
Qiang Li, Zhuo Chen, Yan He, Jing-ping Jiang
A Novel Clustering Algorithm Based Upon Games on Evolving Network
17 pages, 5 figures, 3 tables
Expert Systems with Applications, 2010
10.1016/j.eswa.2010.02.050
null
cs.LG cs.CV cs.GT nlin.AO
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper introduces a model based upon games on an evolving network, and develops three clustering algorithms according to it. In the clustering algorithms, data points for clustering are regarded as players who can make decisions in games. On the network describing relationships among data points, an edge-removing-and-rewiring (ERR) function is employed to explore in a neighborhood of a data point, which removes edges connecting to neighbors with small payoffs, and creates new edges to neighbors with larger payoffs. As such, the connections among data points vary over time. During the evolution of network, some strategies are spread in the network. As a consequence, clusters are formed automatically, in which data points with the same evolutionarily stable strategy are collected as a cluster, so the number of evolutionarily stable strategies indicates the number of clusters. Moreover, the experimental results have demonstrated that data points in datasets are clustered reasonably and efficiently, and the comparison with other algorithms also provides an indication of the effectiveness of the proposed algorithms.
[ { "version": "v1", "created": "Tue, 30 Dec 2008 13:22:31 GMT" }, { "version": "v2", "created": "Fri, 19 Mar 2010 13:30:08 GMT" } ]
2010-03-22T00:00:00
[ [ "Li", "Qiang", "" ], [ "Chen", "Zhuo", "" ], [ "He", "Yan", "" ], [ "Jiang", "Jing-ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0812.5101
Katarzyna Paluch
Katarzyna Paluch, Marcin Mucha, Aleksander Madry
A 7/9 - Approximation Algorithm for the Maximum Traveling Salesman Problem
6 figures
null
10.1007/978-3-642-03685-9_23
null
cs.GT cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a 7/9 - Approximation Algorithm for the Maximum Traveling Salesman Problem.
[ { "version": "v1", "created": "Tue, 30 Dec 2008 19:11:48 GMT" } ]
2015-05-13T00:00:00
[ [ "Paluch", "Katarzyna", "" ], [ "Mucha", "Marcin", "" ], [ "Madry", "Aleksander", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0812.5104
Salah A. Aly
Salah A. Aly
On Quantum and Classical Error Control Codes: Constructions and Applications
Parts of PhD dissertation, Texas A&M University
null
null
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is conjectured that quantum computers are able to solve certain problems more quickly than any deterministic or probabilistic computer. A quantum computer exploits the rules of quantum mechanics to speed up computations. However, it is a formidable task to build a quantum computer, since the quantum mechanical systems storing the information unavoidably interact with their environment. Therefore, one has to mitigate the resulting noise and decoherence effects to avoid computational errors. In this work, I study various aspects of quantum error control codes -- the key component of fault-tolerant quantum information processing. I present the fundamental theory and necessary background of quantum codes and construct many families of quantum block and convolutional codes over finite fields, in addition to families of subsystem codes over symmetric and asymmetric channels. Particularly, many families of quantum BCH, RS, duadic, and convolutional codes are constructed over finite fields. Families of subsystem codes and a class of optimal MDS subsystem codes are derived over asymmetric and symmetric quantum channels. In addition, propagation rules and tables of upper bounds on subsystem code parameters are established. Classes of quantum and classical LDPC codes based on finite geometries and Latin squares are constructed.
[ { "version": "v1", "created": "Tue, 30 Dec 2008 20:09:07 GMT" } ]
2009-08-15T00:00:00
[ [ "Aly", "Salah A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0901.0015
Peter Harremo\"es
Peter Harremoes
Maximum Entropy on Compact Groups
null
Entropy 2009, 11(2), 222-237
10.3390/e11020222
null
cs.IT math.IT math.PR
http://creativecommons.org/licenses/by/3.0/
On a compact group the Haar probability measure plays the role of uniform distribution. The entropy and rate distortion theory for this uniform distribution is studied. New results and simplified proofs on convergence of convolutions on compact groups are presented and they can be formulated as entropy increases to its maximum. Information theoretic techniques and Markov chains play a crucial role. The convergence results are also formulated via rate distortion functions. The rate of convergence is shown to be exponential.
[ { "version": "v1", "created": "Tue, 30 Dec 2008 21:09:28 GMT" }, { "version": "v2", "created": "Sun, 29 Mar 2009 22:19:38 GMT" } ]
2010-05-27T00:00:00
[ [ "Harremoes", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0901.0029
John J. Rehr
J. J. Rehr, J. P. Gardner, M. Prange, L. Svec and F. Vila
Scientific Computing in the Cloud
null
null
null
null
cond-mat.mtrl-sci cs.DC physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the feasibility of high performance scientific computation using cloud computers as an alternative to traditional computational tools. The availability of these large, virtualized pools of compute resources raises the possibility of a new compute paradigm for scientific research with many advantages. For research groups, cloud computing provides convenient access to reliable, high performance clusters and storage, without the need to purchase and maintain sophisticated hardware. For developers, virtualization allows scientific codes to be optimized and pre-installed on machine images, facilitating control over the computational environment. Preliminary tests are presented for serial and parallelized versions of the widely used x-ray spectroscopy and electronic structure code FEFF on the Amazon Elastic Compute Cloud, including CPU and network performance.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 20:35:40 GMT" } ]
2009-01-05T00:00:00
[ [ "Rehr", "J. J.", "" ], [ "Gardner", "J. P.", "" ], [ "Prange", "M.", "" ], [ "Svec", "L.", "" ], [ "Vila", "F.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.mtrl-sci", "description": "Techniques, synthesis, characterization, structure. Structural phase transitions, mechanical properties, phonons. Defects, adsorbates, interfaces", "span": "(Materials Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" } ]
0901.0042
Zhuo Li
Zhuo Li, Li-Juan Xing, and Xin-Mei Wang
A family of asymptotically good quantum codes based on code concatenation
10 pages
null
null
null
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explicitly construct an infinite family of asymptotically good concatenated quantum stabilizer codes where the outer code uses CSS-type quantum Reed-Solomon code and the inner code uses a set of special quantum codes. In the field of quantum error-correcting codes, this is the first time that a family of asymptotically good quantum codes is derived from bad codes. Its occurrence supplies a gap in quantum coding theory.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 02:57:22 GMT" } ]
2009-01-06T00:00:00
[ [ "Li", "Zhuo", "" ], [ "Xing", "Li-Juan", "" ], [ "Wang", "Xin-Mei", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.0043
Rob van Glabbeek
Rob van Glabbeek, Ursula Goltz, Jens-Wolfhard Schicke
Symmetric and Asymmetric Asynchronous Interaction
27 pages. An extended abstract of this paper was presented at the first Interaction and Concurrency Experience (ICE'08) on Synchronous and Asynchronous Interactions in Concurrent Distributed Systems, and will appear in Electronic Notes in Theoretical Computer Science, Elsevier
null
null
Technical Report 2008-03, Technical University of Braunschweig
cs.LO cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate classes of systems based on different interaction patterns with the aim of achieving distributability. As our system model we use Petri nets. In Petri nets, an inherent concept of simultaneity is built in, since when a transition has more than one preplace, it can be crucial that tokens are removed instantaneously. When modelling a system which is intended to be implemented in a distributed way by a Petri net, this built-in concept of synchronous interaction may be problematic. To investigate this we consider asynchronous implementations of nets, in which removing tokens from places can no longer be considered as instantaneous. We model this by inserting silent (unobservable) transitions between transitions and some of their preplaces. We investigate three such implementations, differing in the selection of preplaces of a transition from which the removal of a token is considered time consuming, and the possibility of collecting the tokens in a given order. We investigate the effect of these different transformations of instantaneous interaction into asynchronous interaction patterns by comparing the behaviours of nets before and after insertion of the silent transitions. We exhibit for which classes of Petri nets we obtain equivalent behaviour with respect to failures equivalence. It turns out that the resulting hierarchy of Petri net classes can be described by semi-structural properties. For two of the classes we obtain precise characterisations; for the remaining class we obtain lower and upper bounds. We briefly comment on possible applications of our results to Message Sequence Charts.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 03:43:25 GMT" } ]
2009-01-05T00:00:00
[ [ "van Glabbeek", "Rob", "" ], [ "Goltz", "Ursula", "" ], [ "Schicke", "Jens-Wolfhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0901.0044
Mokshay Madiman
Mokshay Madiman and Prasad Tetali
Information Inequalities for Joint Distributions, with Interpretations and Applications
15 pages, 1 figure. Originally submitted to the IEEE Transactions on Information Theory in May 2007, the current version incorporates reviewer comments including elimination of an error
IEEE Transactions on Information Theory, Vol. 56(6), pp. 2699-2713, June 2010
null
null
cs.IT math.CO math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Upper and lower bounds are obtained for the joint entropy of a collection of random variables in terms of an arbitrary collection of subset joint entropies. These inequalities generalize Shannon's chain rule for entropy as well as inequalities of Han, Fujishige and Shearer. A duality between the upper and lower bounds for joint entropy is developed. All of these results are shown to be special cases of general, new results for submodular functions-- thus, the inequalities presented constitute a richly structured class of Shannon-type inequalities. The new inequalities are applied to obtain new results in combinatorics, such as bounds on the number of independent sets in an arbitrary graph and the number of zero-error source-channel codes, as well as new determinantal inequalities in matrix theory. A new inequality for relative entropies is also developed, along with interpretations in terms of hypothesis testing. Finally, revealing connections of the results to literature in economics, computer science, and physics are explored.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 03:13:13 GMT" }, { "version": "v2", "created": "Mon, 3 Aug 2009 07:04:16 GMT" } ]
2010-06-17T00:00:00
[ [ "Madiman", "Mokshay", "" ], [ "Tetali", "Prasad", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0901.0048
Rob van Glabbeek
Rob van Glabbeek, Ursula Goltz and Jens-Wolfhard Schicke
On Synchronous and Asynchronous Interaction in Distributed Systems
26 pages. An extended abstract of this paper appeared in Proceedings 33rd International Symposium on Mathematical Foundations of Computer Science (MFCS 2008), Torun, Poland, August 2008 (E. Ochmanski & J. Tyszkiewicz, eds.), LNCS 5162, Springer, 2008, pp. 16-35
null
null
Technical Report 2008-04, Technical University of Braunschweig
cs.LO cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When considering distributed systems, it is a central issue how to deal with interactions between components. In this paper, we investigate the paradigms of synchronous and asynchronous interaction in the context of distributed systems. We investigate to what extent or under which conditions synchronous interaction is a valid concept for specification and implementation of such systems. We choose Petri nets as our system model and consider different notions of distribution by associating locations to elements of nets. First, we investigate the concept of simultaneity which is inherent in the semantics of Petri nets when transitions have multiple input places. We assume that tokens may only be taken instantaneously by transitions on the same location. We exhibit a hierarchy of `asynchronous' Petri net classes by different assumptions on possible distributions. Alternatively, we assume that the synchronisations specified in a Petri net are crucial system properties. Hence transitions and their preplaces may no longer placed on separate locations. We then answer the question which systems may be implemented in a distributed way without restricting concurrency, assuming that locations are inherently sequential. It turns out that in both settings we find semi-structural properties of Petri nets describing exactly the problematic situations for interactions in distributed systems.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 04:13:35 GMT" } ]
2009-01-05T00:00:00
[ [ "van Glabbeek", "Rob", "" ], [ "Goltz", "Ursula", "" ], [ "Schicke", "Jens-Wolfhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0901.0055
Mokshay Madiman
Mokshay Madiman, Adam Marcus, Prasad Tetali
Entropy and set cardinality inequalities for partition-determined functions
26 pages. v2: Revised version incorporating referee feedback plus inclusion of some additional corollaries and discussion. v3: Final version with minor corrections. To appear in Random Structures and Algorithms
Random Structures and Algorithms, Vol. 40, pp. 399-424, 2012
10.1002/rsa.20385
null
cs.IT math.CO math.IT math.NT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new notion of partition-determined functions is introduced, and several basic inequalities are developed for the entropy of such functions of independent random variables, as well as for cardinalities of compound sets obtained using these functions. Here a compound set means a set obtained by varying each argument of a function of several variables over a set associated with that argument, where all the sets are subsets of an appropriate algebraic structure so that the function is well defined. On the one hand, the entropy inequalities developed for partition-determined functions imply entropic analogues of general inequalities of Pl\"unnecke-Ruzsa type. On the other hand, the cardinality inequalities developed for compound sets imply several inequalities for sumsets, including for instance a generalization of inequalities proved by Gyarmati, Matolcsi and Ruzsa (2010). We also provide partial progress towards a conjecture of Ruzsa (2007) for sumsets in nonabelian groups. All proofs are elementary and rely on properly developing certain information-theoretic inequalities.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 04:30:15 GMT" }, { "version": "v2", "created": "Sun, 12 Jun 2011 00:51:32 GMT" }, { "version": "v3", "created": "Wed, 10 Aug 2011 03:55:13 GMT" } ]
2012-06-05T00:00:00
[ [ "Madiman", "Mokshay", "" ], [ "Marcus", "Adam", "" ], [ "Tetali", "Prasad", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0901.0062
Mokshay Madiman
Mokshay Madiman
Cores of Cooperative Games in Information Theory
12 pages, published at http://www.hindawi.com/GetArticle.aspx?doi=10.1155/2008/318704 in EURASIP Journal on Wireless Communications and Networking, Special Issue on "Theory and Applications in Multiuser/Multiterminal Communications", April 2008
EURASIP Journal on Wireless Communications and Networking, Volume 2008, Article ID 318704
10.1155/2008/318704
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cores of cooperative games are ubiquitous in information theory, and arise most frequently in the characterization of fundamental limits in various scenarios involving multiple users. Examples include classical settings in network information theory such as Slepian-Wolf source coding and multiple access channels, classical settings in statistics such as robust hypothesis testing, and new settings at the intersection of networking and statistics such as distributed estimation problems for sensor networks. Cooperative game theory allows one to understand aspects of all of these problems from a fresh and unifying perspective that treats users as players in a game, sometimes leading to new insights. At the heart of these analyses are fundamental dualities that have been long studied in the context of cooperative games; for information theoretic purposes, these are dualities between information inequalities on the one hand and properties of rate, capacity or other resource allocation regions on the other.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 05:26:59 GMT" } ]
2009-01-05T00:00:00
[ [ "Madiman", "Mokshay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.0065
Alireza Avanaki
Alireza Avanaki
Exact Histogram Specification Optimized for Structural Similarity
null
null
10.1007/s10043-009-0119-z
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An exact histogram specification (EHS) method modifies its input image to have a specified histogram. Applications of EHS include image (contrast) enhancement (e.g., by histogram equalization) and histogram watermarking. Performing EHS on an image, however, reduces its visual quality. Starting from the output of a generic EHS method, we maximize the structural similarity index (SSIM) between the original image (before EHS) and the result of EHS iteratively. Essential in this process is the computationally simple and accurate formula we derive for SSIM gradient. As it is based on gradient ascent, the proposed EHS always converges. Experimental results confirm that while obtaining the histogram exactly as specified, the proposed method invariably outperforms the existing methods in terms of visual quality of the result. The computational complexity of the proposed method is shown to be of the same order as that of the existing methods. Index terms: histogram modification, histogram equalization, optimization for perceptual visual quality, structural similarity gradient ascent, histogram watermarking, contrast enhancement.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 06:13:39 GMT" } ]
2015-05-13T00:00:00
[ [ "Avanaki", "Alireza", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0901.0118
Jubin Jose
Jubin Jose, Lei Ying, Sriram Vishwanath
On the Stability Region of Amplify-and-Forward Cooperative Relay Networks
accepted for presentation at ITW 2009, Taormina, Sicily
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers an amplify-and-forward relay network with fading states. Amplify-and-forward scheme (along with its variations) is the core mechanism for enabling cooperative communication in wireless networks, and hence understanding the network stability region under amplify-and-forward scheme is very important. However, in a relay network employing amplify-and-forward, the interaction between nodes is described in terms of real-valued ``packets'' (signals) instead of discrete packets (bits). This restrains the relay nodes from re-encoding the packets at desired rates. Hence, the stability analysis for relay networks employing amplify-and-forward scheme is by no means a straightforward extension of that in packet-based networks. In this paper, the stability region of a four-node relay network is characterized, and a simple throughput optimal algorithm with joint scheduling and rate allocation is proposed.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 17:00:12 GMT" }, { "version": "v2", "created": "Thu, 6 Aug 2009 06:02:12 GMT" } ]
2009-08-06T00:00:00
[ [ "Jose", "Jubin", "" ], [ "Ying", "Lei", "" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.0121
Vahan Mkrtchyan
Artur Khojabaghyan, Vahan V. Mkrtchyan
On upper bounds for parameters related to construction of special maximum matchings
11 pages, no figures
Discrete Mathematics 312/2 (2012), pp. 213--220
10.1016/j.disc.2011.08.026
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a graph $G$ let $L(G)$ and $l(G)$ denote the size of the largest and smallest maximum matching of a graph obtained from $G$ by removing a maximum matching of $G$. We show that $L(G)\leq 2l(G),$ and $L(G)\leq (3/2)l(G)$ provided that $G$ contains a perfect matching. We also characterize the class of graphs for which $L(G)=2l(G)$. Our characterization implies the existence of a polynomial algorithm for testing the property $L(G)=2l(G)$. Finally we show that it is $NP$-complete to test whether a graph $G$ containing a perfect matching satisfies $L(G)=(3/2)l(G)$.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 17:23:00 GMT" }, { "version": "v2", "created": "Thu, 24 Jun 2010 08:13:18 GMT" }, { "version": "v3", "created": "Mon, 25 Jul 2011 09:38:59 GMT" } ]
2011-11-17T00:00:00
[ [ "Khojabaghyan", "Artur", "" ], [ "Mkrtchyan", "Vahan V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0901.0131
Ioan Raicu
Ian Foster, Yong Zhao, Ioan Raicu, Shiyong Lu
Cloud Computing and Grid Computing 360-Degree Compared
IEEE Grid Computing Environments (GCE08) 2008
null
10.1109/GCE.2008.4738445
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud Computing has become another buzzword after Web 2.0. However, there are dozens of different definitions for Cloud Computing and there seems to be no consensus on what a Cloud is. On the other hand, Cloud Computing is not a completely new concept; it has intricate connection to the relatively new but thirteen-year established Grid Computing paradigm, and other relevant technologies such as utility computing, cluster computing, and distributed systems in general. This paper strives to compare and contrast Cloud Computing with Grid Computing from various angles and give insights into the essential characteristics of both.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 19:13:05 GMT" } ]
2016-11-15T00:00:00
[ [ "Foster", "Ian", "" ], [ "Zhao", "Yong", "" ], [ "Raicu", "Ioan", "" ], [ "Lu", "Shiyong", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0901.0134
Ioan Raicu
Zhao Zhang, Allan Espinosa, Kamil Iskra, Ioan Raicu, Ian Foster, Michael Wilde
Design and Evaluation of a Collective IO Model for Loosely Coupled Petascale Programming
IEEE Many-Task Computing on Grids and Supercomputers (MTAGS08) 2008
null
10.1109/MTAGS.2008.4777908
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Loosely coupled programming is a powerful paradigm for rapidly creating higher-level applications from scientific programs on petascale systems, typically using scripting languages. This paradigm is a form of many-task computing (MTC) which focuses on the passing of data between programs as ordinary files rather than messages. While it has the significant benefits of decoupling producer and consumer and allowing existing application programs to be executed in parallel with no recoding, its typical implementation using shared file systems places a high performance burden on the overall system and on the user who will analyze and consume the downstream data. Previous efforts have achieved great speedups with loosely coupled programs, but have done so with careful manual tuning of all shared file system access. In this work, we evaluate a prototype collective IO model for file-based MTC. The model enables efficient and easy distribution of input data files to computing nodes and gathering of output results from them. It eliminates the need for such manual tuning and makes the programming of large-scale clusters using a loosely coupled model easier. Our approach, inspired by in-memory approaches to collective operations for parallel programming, builds on fast local file systems to provide high-speed local file caches for parallel scripts, uses a broadcast approach to handle distribution of common input data, and uses efficient scatter/gather and caching techniques for input and output. We describe the design of the prototype model, its implementation on the Blue Gene/P supercomputer, and present preliminary measurements of its performance on synthetic benchmarks and on a large-scale molecular dynamics application.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 19:35:07 GMT" } ]
2016-11-15T00:00:00
[ [ "Zhang", "Zhao", "" ], [ "Espinosa", "Allan", "" ], [ "Iskra", "Kamil", "" ], [ "Raicu", "Ioan", "" ], [ "Foster", "Ian", "" ], [ "Wilde", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0901.0148
Michal Zerola
Michal Zerola, Jerome Lauret, Roman Bartak and Michal Sumbera
Using constraint programming to resolve the multi-source/multi-site data movement paradigm on the Grid
10 pages; ACAT 2008 workshop
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to achieve both fast and coordinated data transfer to collaborative sites as well as to create a distribution of data over multiple sites, efficient data movement is one of the most essential aspects in distributed environment. With such capabilities at hand, truly distributed task scheduling with minimal latencies would be reachable by internationally distributed collaborations (such as ones in HENP) seeking for scavenging or maximizing on geographically spread computational resources. But it is often not all clear (a) how to move data when available from multiple sources or (b) how to move data to multiple compute resources to achieve an optimal usage of available resources. We present a method of creating a Constraint Programming (CP) model consisting of sites, links and their attributes such as bandwidth for grid network data transfer also considering user tasks as part of the objective function for an optimal solution. We will explore and explain trade-off between schedule generation time and divergence from the optimal solution and show how to improve and render viable the solution's finding time by using search tree time limit, approximations, restrictions such as symmetry breaking or grouping similar tasks together, or generating sequence of optimal schedules by splitting the input problem. Results of data transfer simulation for each case will also include a well known Peer-2-Peer model, and time taken to generate a schedule as well as time needed for a schedule execution will be compared to a CP optimal solution. We will additionally present a possible implementation aimed to bring a distributed datasets (multiple sources) to a given site in a minimal time.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 21:25:32 GMT" } ]
2009-04-14T00:00:00
[ [ "Zerola", "Michal", "" ], [ "Lauret", "Jerome", "" ], [ "Bartak", "Roman", "" ], [ "Sumbera", "Michal", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0901.0163
Manish Agarwal
Manish Agarwal, Dongning Guo, Michael Honig
Limited-Rate Channel State Feedback for Multicarrier Block Fading Channels
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2010.2080970
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity of a fading channel can be substantially increased by feeding back channel state information from the receiver to the transmitter. With limited-rate feedback what state information to feed back and how to encode it are important open questions. This paper studies power loading in a multicarrier system using no more than one bit of feedback per sub-channel. The sub-channels can be correlated and full channel state information is assumed at the receiver.
[ { "version": "v1", "created": "Thu, 1 Jan 2009 05:35:05 GMT" } ]
2016-11-15T00:00:00
[ [ "Agarwal", "Manish", "" ], [ "Guo", "Dongning", "" ], [ "Honig", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.0168
Harshan Jagadeesh
J. Harshan, B. Sundar Rajan
Coding for Two-User SISO and MIMO Multiple Access Channels
18 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constellation Constrained (CC) capacity regions of a two-user SISO Gaussian Multiple Access Channel (GMAC) with finite complex input alphabets and continuous output are computed in this paper. When both the users employ the same code alphabet, it is well known that an appropriate rotation between the alphabets provides unique decodability to the receiver. For such a set-up, a metric is proposed to compute the angle(s) of rotation between the alphabets such that the CC capacity region is maximally enlarged. Subsequently, code pairs based on Trellis Coded Modulation (TCM) are designed for the two-user GMAC with $M$-PSK and $M$-PAM alphabet pairs for arbitrary values of $M$ and it is proved that, for certain angles of rotation, Ungerboeck labelling on the trellis of each user maximizes the guaranteed squared Euclidean distance of the \textit{sum trellis}. Hence, such a labelling scheme can be used systematically to construct trellis code pairs for a two-user GMAC to achieve sum rates close to the sum capacity of the channel. More importantly, it is shown for the first time that ML decoding complexity at the destination is significantly reduced when $M$-PAM alphabet pairs are employed with \textit{almost} no loss in the sum capacity. \indent A two-user Multiple Input Multiple Output (MIMO) fading MAC with $N_{t}$ antennas at both the users and a single antenna at the destination has also been considered with the assumption that the destination has the perfect knowledge of channel state information and the two users have the perfect knowledge of only the phase components of their channels. For such a set-up, two distinct classes of Space Time Block Code (STBC) pairs derived from the well known class of real orthogonal designs are proposed such that the STBC pairs are information lossless and have low ML decoding complexity.
[ { "version": "v1", "created": "Thu, 1 Jan 2009 18:05:39 GMT" }, { "version": "v2", "created": "Tue, 6 Jan 2009 06:52:00 GMT" }, { "version": "v3", "created": "Mon, 9 Feb 2009 16:11:13 GMT" } ]
2009-02-09T00:00:00
[ [ "Harshan", "J.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.0170
Tobias Kretz
Tobias Kretz
Pedestrian Traffic: on the Quickest Path
null
J. Stat. Mech. (2009)
10.1088/1742-5468/2009/03/P03012
P03012
physics.soc-ph cs.MA physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When a large group of pedestrians moves around a corner, most pedestrians do not follow the shortest path, which is to stay as close as possible to the inner wall, but try to minimize the travel time. For this they accept to move on a longer path with some distance to the corner, to avoid large densities and by this succeed in maintaining a comparatively high speed. In many models of pedestrian dynamics the basic rule of motion is often either "move as far as possible toward the destination" or - reformulated - "of all coordinates accessible in this time step move to the one with the smallest distance to the destination". Atop of this rule modifications are placed to make the motion more realistic. These modifications usually focus on local behavior and neglect long-ranged effects. Compared to real pedestrians this leads to agents in a simulation valuing the shortest path a lot better than the quickest. So, in a situation as the movement of a large crowd around a corner, one needs an additional element in a model of pedestrian dynamics that makes the agents deviate from the rule of the shortest path. In this work it is shown, how this can be achieved by using a flood fill dynamic potential field method, where during the filling process the value of a field cell is not increased by 1, but by a larger value, if it is occupied by an agent. This idea may be an obvious one, however, the tricky part - and therefore in a strict sense the contribution of this work - is a) to minimize unrealistic artifacts, as naive flood fill metrics deviate considerably from the Euclidean metric and in this respect yield large errors, b) do this with limited computational effort, and c) keep agents' movement at very low densities unaltered.
[ { "version": "v1", "created": "Thu, 1 Jan 2009 09:29:38 GMT" } ]
2009-05-28T00:00:00
[ [ "Kretz", "Tobias", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" } ]