id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0706.3479 | David Love | David Love | Hypocomputation | 34 pages | null | null | null | cs.OH | null | Hypercomputational formal theories will, clearly, be both structurally and
foundationally different from the formal theories underpinning computational
theories. However, many of the maps that might guide us into this strange realm
have been lost. So little work has been done recently in the area of
metamathematics, and so many of the previous results have been folded into
other theories, that we are in danger of loosing an appreciation of the broader
structure of formal theories. As an aid to those looking to develop
hypercomputational theories, we will briefly survey the known landmarks both
inside and outside the borders of computational theory. We will not focus in
this paper on why the structure of formal theory looks the way it does. Instead
we will focus on what this structure looks like, moving from hypocomputational,
through traditional computational theories, and then beyond to
hypercomputational theories.
| [
{
"version": "v1",
"created": "Sat, 23 Jun 2007 21:13:43 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Love",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0706.3480 | Soheil Mohajer | Soheil Mohajer and Ali Kakhbod | Tight Bounds on the Average Length, Entropy, and Redundancy of
Anti-Uniform Huffman Codes | 9 pages, 2 figures | IET Communications, vol. 5, no. 9, pp. 1213-1219, 2011 | null | null | cs.IT math.IT | null | In this paper we consider the class of anti-uniform Huffman codes and derive
tight lower and upper bounds on the average length, entropy, and redundancy of
such codes in terms of the alphabet size of the source. The Fibonacci
distributions are introduced which play a fundamental role in AUH codes. It is
shown that such distributions maximize the average length and the entropy of
the code for a given alphabet size. Another previously known bound on the
entropy for given average length follows immediately from our results.
| [
{
"version": "v1",
"created": "Sat, 23 Jun 2007 21:18:36 GMT"
}
] | 2012-07-27T00:00:00 | [
[
"Mohajer",
"Soheil",
""
],
[
"Kakhbod",
"Ali",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.3502 | P Vijay Kumar | Petros Elia and P. Vijay Kumar | Approximately-Universal Space-Time Codes for the Parallel, Multi-Block
and Cooperative-Dynamic-Decode-and-Forward Channels | null | null | null | null | cs.IT cs.DM cs.NI math.IT | null | Explicit codes are constructed that achieve the diversity-multiplexing gain
tradeoff of the cooperative-relay channel under the dynamic decode-and-forward
protocol for any network size and for all numbers of transmit and receive
antennas at the relays.
A particularly simple code construction that makes use of the Alamouti code
as a basic building block is provided for the single relay case.
Along the way, we prove that space-time codes previously constructed in the
literature for the block-fading and parallel channels are approximately
universal, i.e., they achieve the DMT for any fading distribution. It is shown
how approximate universality of these codes leads to the first DMT-optimum code
construction for the general, MIMO-OFDM channel.
| [
{
"version": "v1",
"created": "Sun, 24 Jun 2007 07:47:57 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Jul 2007 12:43:51 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Elia",
"Petros",
""
],
[
"Kumar",
"P. Vijay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.3523 | Olivier Finkel | Dominique Lecomte (UMR 7586), Olivier Finkel (LIP) | There Exist some Omega-Powers of Any Borel Rank | To appear in the Proceedings of the 16th EACSL Annual Conference on
Computer Science and Logic, CSL 2007, Lausanne, Switzerland, September 11-15,
2007, Lecture Notes in Computer Science, (c) Springer, 2007 | Dans Proceedings of the 16th EACSL Annual Conference on Computer
Science and Logic, CSL 2007, - 16th EACSL Annual Conference on Computer
Science and Logic, CSL 2007, September 11-15, 2007, Lausanne : Suisse | null | null | cs.LO cs.CC math.LO | null | Omega-powers of finitary languages are languages of infinite words
(omega-languages) in the form V^omega, where V is a finitary language over a
finite alphabet X. They appear very naturally in the characterizaton of regular
or context-free omega-languages. Since the set of infinite words over a finite
alphabet X can be equipped with the usual Cantor topology, the question of the
topological complexity of omega-powers of finitary languages naturally arises
and has been posed by Niwinski (1990), Simonnet (1992) and Staiger (1997). It
has been recently proved that for each integer n > 0, there exist some
omega-powers of context free languages which are Pi^0_n-complete Borel sets,
that there exists a context free language L such that L^omega is analytic but
not Borel, and that there exists a finitary language V such that V^omega is a
Borel set of infinite rank. But it was still unknown which could be the
possible infinite Borel ranks of omega-powers. We fill this gap here, proving
the following very surprising result which shows that omega-powers exhibit a
great topological complexity: for each non-null countable ordinal alpha, there
exist some Sigma^0_alpha-complete omega-powers, and some Pi^0_alpha-complete
omega-powers.
| [
{
"version": "v1",
"created": "Mon, 25 Jun 2007 16:03:36 GMT"
}
] | 2008-03-12T00:00:00 | [
[
"Lecomte",
"Dominique",
"",
"UMR 7586"
],
[
"Finkel",
"Olivier",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0706.3546 | Samer Al Kiswany | Samer Al Kiswany, Matei Ripeanu, Sudharshan S. Vazhkudai, Abdullah
Gharaibeh | stdchk: A Checkpoint Storage System for Desktop Grid Computing | 13 pages, 8 figures | null | null | null | cs.DC | null | Checkpointing is an indispensable technique to provide fault tolerance for
long-running high-throughput applications like those running on desktop grids.
This paper argues that a dedicated checkpoint storage system, optimized to
operate in these environments, can offer multiple benefits: reduce the load on
a traditional file system, offer high-performance through specialization, and,
finally, optimize data management by taking into account checkpoint application
semantics. Such a storage system can present a unifying abstraction to
checkpoint operations, while hiding the fact that there are no dedicated
resources to store the checkpoint data. We prototype stdchk, a checkpoint
storage system that uses scavenged disk space from participating desktops to
build a low-cost storage system, offering a traditional file system interface
for easy integration with applications. This paper presents the stdchk
architecture, key performance optimizations, support for incremental
checkpointing, and increased data availability. Our evaluation confirms that
the stdchk approach is viable in a desktop grid setting and offers a low cost
storage system with desirable performance characteristics: high write
throughput and reduced storage space and network effort to save checkpoint
images.
| [
{
"version": "v1",
"created": "Mon, 25 Jun 2007 01:24:46 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Nov 2007 20:51:06 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Kiswany",
"Samer Al",
""
],
[
"Ripeanu",
"Matei",
""
],
[
"Vazhkudai",
"Sudharshan S.",
""
],
[
"Gharaibeh",
"Abdullah",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.3565 | Anatoly Plotnikov | Anatoly D. Plotnikov | Experimental Algorithm for the Maximum Independent Set Problem | From author's book "Discrete mathematics",3-th ed., Moscow,New
knowledge,2007, 18 pages, 8 figures | Cybernetics and Systems Analysis: Volume 48, Issue 5 (2012), Page
673-680 | null | null | cs.DS | null | We develop an experimental algorithm for the exact solving of the maximum
independent set problem. The algorithm consecutively finds the maximal
independent sets of vertices in an arbitrary undirected graph such that the
next such set contains more elements than the preceding one. For this purpose,
we use a technique, developed by Ford and Fulkerson for the finite partially
ordered sets, in particular, their method for partition of a poset into the
minimum number of chains with finding the maximum antichain. In the process of
solving, a special digraph is constructed, and a conjecture is formulated
concerning properties of such digraph. This allows to offer of the solution
algorithm. Its theoretical estimation of running time equals to is $O(n^{8})$,
where $n$ is the number of graph vertices. The offered algorithm was tested by
a program on random graphs. The testing the confirms correctness of the
algorithm.
| [
{
"version": "v1",
"created": "Mon, 25 Jun 2007 06:45:49 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Jul 2007 02:16:12 GMT"
}
] | 2016-03-02T00:00:00 | [
[
"Plotnikov",
"Anatoly D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0706.3639 | Marcus Hutter | Shane Legg and Marcus Hutter | A Collection of Definitions of Intelligence | 12 LaTeX pages | Frontiers in Artificial Intelligence and Applications, Vol.157
(2007) 17-24 | null | IDSIA-07-07 | cs.AI | null | This paper is a survey of a large number of informal definitions of
``intelligence'' that the authors have collected over the years. Naturally,
compiling a complete list would be impossible as many definitions of
intelligence are buried deep inside articles and books. Nevertheless, the
70-odd definitions presented here are, to the authors' knowledge, the largest
and most well referenced collection there is.
| [
{
"version": "v1",
"created": "Mon, 25 Jun 2007 13:40:56 GMT"
}
] | 2007-06-26T00:00:00 | [
[
"Legg",
"Shane",
""
],
[
"Hutter",
"Marcus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0706.3679 | Yann Guermeur | Yann Guermeur (LORIA) | Scale-sensitive Psi-dimensions: the Capacity Measures for Classifiers
Taking Values in R^Q | null | ASMDA 2007 (2007) 1-8 | null | null | cs.LG | null | Bounds on the risk play a crucial role in statistical learning theory. They
usually involve as capacity measure of the model studied the VC dimension or
one of its extensions. In classification, such "VC dimensions" exist for models
taking values in {0, 1}, {1,..., Q} and R. We introduce the generalizations
appropriate for the missing case, the one of models with values in R^Q. This
provides us with a new guaranteed risk for M-SVMs which appears superior to the
existing one.
| [
{
"version": "v1",
"created": "Mon, 25 Jun 2007 17:28:57 GMT"
}
] | 2007-06-26T00:00:00 | [
[
"Guermeur",
"Yann",
"",
"LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0706.3710 | Shivratna Srinivasan | Shivratna Giri Srinivasan and Mahesh K. Varanasi | Optimal Constellations for the Low SNR Noncoherent MIMO Block Rayleigh
Fading Channel | 52 pages, to appear in IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reliable communication over the discrete-input/continuous-output noncoherent
multiple-input multiple-output (MIMO) Rayleigh block fading channel is
considered when the signal-to-noise ratio (SNR) per degree of freedom is low.
Two key problems are posed and solved to obtain the optimum discrete input. In
both problems, the average and peak power per space-time slot of the input
constellation are constrained. In the first one, the peak power to average
power ratio (PPAPR) of the input constellation is held fixed, while in the
second problem, the peak power is fixed independently of the average power. In
the first PPAPR-constrained problem, the mutual information, which grows as
O(SNR^2), is maximized up to second order in SNR. In the second
peak-constrained problem, where the mutual information behaves as O(SNR), the
structure of constellations that are optimal up to first order, or
equivalently, that minimize energy/bit, are explicitly characterized.
Furthermore, among constellations that are first-order optimal, those that
maximize the mutual information up to second order, or equivalently, the
wideband slope, are characterized. In both PPAPR-constrained and
peak-constrained problems, the optimal constellations are obtained in
closed-form as solutions to non-convex optimizations, and interestingly, they
are found to be identical. Due to its special structure, the common solution is
referred to as Space Time Orthogonal Rank one Modulation, or STORM. In both
problems, it is seen that STORM provides a sharp characterization of the
behavior of noncoherent MIMO capacity.
| [
{
"version": "v1",
"created": "Mon, 25 Jun 2007 20:40:45 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jun 2007 00:40:49 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Sep 2008 13:08:09 GMT"
}
] | 2008-09-22T00:00:00 | [
[
"Srinivasan",
"Shivratna Giri",
""
],
[
"Varanasi",
"Mahesh K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.3723 | Tobias Ganzow | Tobias Ganzow and Sasha Rubin | Order-Invariant MSO is Stronger than Counting MSO in the Finite | Revised version contributed to STACS 2008 | Dans Proceedings of the 25th Annual Symposium on the Theoretical
Aspects of Computer Science - STACS 2008, Bordeaux : France (2008) | null | null | cs.LO | null | We compare the expressiveness of two extensions of monadic second-order logic
(MSO) over the class of finite structures. The first, counting monadic
second-order logic (CMSO), extends MSO with first-order modulo-counting
quantifiers, allowing the expression of queries like ``the number of elements
in the structure is even''. The second extension allows the use of an
additional binary predicate, not contained in the signature of the queried
structure, that must be interpreted as an arbitrary linear order on its
universe, obtaining order-invariant MSO.
While it is straightforward that every CMSO formula can be translated into an
equivalent order-invariant MSO formula, the converse had not yet been settled.
Courcelle showed that for restricted classes of structures both order-invariant
MSO and CMSO are equally expressive, but conjectured that, in general,
order-invariant MSO is stronger than CMSO.
We affirm this conjecture by presenting a class of structures that is
order-invariantly definable in MSO but not definable in CMSO.
| [
{
"version": "v1",
"created": "Tue, 26 Jun 2007 12:16:18 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Mar 2008 16:48:20 GMT"
}
] | 2008-03-20T00:00:00 | [
[
"Ganzow",
"Tobias",
""
],
[
"Rubin",
"Sasha",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0706.3750 | Federico Ardila | Federico Ardila and Elitza Maneva | Pruning Processes and a New Characterization of Convex Geometries | 14 pages, 3 figures; the exposition has changed significantly from
previous version | null | null | null | math.CO cs.DM math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a new characterization of convex geometries via a multivariate
version of an identity that was originally proved by Maneva, Mossel and
Wainwright for certain combinatorial objects arising in the context of the
k-SAT problem. We thus highlight the connection between various
characterizations of convex geometries and a family of removal processes
studied in the literature on random structures.
| [
{
"version": "v1",
"created": "Tue, 26 Jun 2007 02:41:09 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Jun 2007 19:19:11 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Nov 2007 01:29:58 GMT"
},
{
"version": "v4",
"created": "Sun, 31 Aug 2008 16:52:05 GMT"
}
] | 2008-08-31T00:00:00 | [
[
"Ardila",
"Federico",
""
],
[
"Maneva",
"Elitza",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0706.3752 | Ruoheng Liu | Ruoheng Liu, Yingbin Liang, H. Vincent Poor, and Predrag Spasojevic | Secure Nested Codes for Type II Wiretap Channels | To appear in the Proceedings of the 2007 IEEE Information Theory
Workshop on Frontiers in Coding Theory, Lake Tahoe, CA, September 2-6, 2007 | null | 10.1109/ITW.2007.4313097 | null | cs.IT cs.CR math.IT | null | This paper considers the problem of secure coding design for a type II
wiretap channel, where the main channel is noiseless and the eavesdropper
channel is a general binary-input symmetric-output memoryless channel. The
proposed secure error-correcting code has a nested code structure. Two secure
nested coding schemes are studied for a type II Gaussian wiretap channel. The
nesting is based on cosets of a good code sequence for the first scheme and on
cosets of the dual of a good code sequence for the second scheme. In each case,
the corresponding achievable rate-equivocation pair is derived based on the
threshold behavior of good code sequences. The two secure coding schemes
together establish an achievable rate-equivocation region, which almost covers
the secrecy capacity-equivocation region in this case study. The proposed
secure coding scheme is extended to a type II binary symmetric wiretap channel.
A new achievable perfect secrecy rate, which improves upon the previously
reported result by Thangaraj et al., is derived for this channel.
| [
{
"version": "v1",
"created": "Tue, 26 Jun 2007 03:57:34 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Liu",
"Ruoheng",
""
],
[
"Liang",
"Yingbin",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Spasojevic",
"Predrag",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.3753 | Ruoheng Liu | Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, and H. Vincent Poor | Multiple Access Channels with Generalized Feedback and Confidential
Messages | To appear in the Proceedings of the 2007 IEEE Information Theory
Workshop on Frontiers in Coding Theory, Lake Tahoe, CA, September 2-6, 2007 | null | 10.1109/ITW.2007.4313144 | null | cs.IT math.IT | null | This paper considers the problem of secret communication over a multiple
access channel with generalized feedback. Two trusted users send independent
confidential messages to an intended receiver, in the presence of a passive
eavesdropper. In this setting, an active cooperation between two trusted users
is enabled through using channel feedback in order to improve the communication
efficiency. Based on rate-splitting and decode-and-forward strategies,
achievable secrecy rate regions are derived for both discrete memoryless and
Gaussian channels. Results show that channel feedback improves the achievable
secrecy rates.
| [
{
"version": "v1",
"created": "Tue, 26 Jun 2007 04:07:45 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Tang",
"Xiaojun",
""
],
[
"Liu",
"Ruoheng",
""
],
[
"Spasojevic",
"Predrag",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.3768 | Luca Dall'Asta | Luca Dall'Asta | Dynamic Exploration of Networks: from general principles to the
traceroute process | 13 pages, 6 figures | null | 10.1140/epjb/e2007-00326-9 | null | physics.soc-ph cond-mat.dis-nn cs.NI physics.data-an | null | Dynamical processes taking place on real networks define on them evolving
subnetworks whose topology is not necessarily the same of the underlying one.
We investigate the problem of determining the emerging degree distribution,
focusing on a class of tree-like processes, such as those used to explore the
Internet's topology. A general theory based on mean-field arguments is
proposed, both for single-source and multiple-source cases, and applied to the
specific example of the traceroute exploration of networks. Our results provide
a qualitative improvement in the understanding of dynamical sampling and of the
interplay between dynamics and topology in large networks like the Internet.
| [
{
"version": "v1",
"created": "Tue, 26 Jun 2007 08:00:09 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Dall'Asta",
"Luca",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0706.3812 | Pierre Parrend | Pierre Parrend (INRIA Rh\^one-Alpes), St\'ephane Fr\'enot (INRIA
Rh\^one-Alpes) | Java Components Vulnerabilities - An Experimental Classification
Targeted at the OSGi Platform | null | null | null | null | cs.CR cs.OS | null | The OSGi Platform finds a growing interest in two different applications
domains: embedded systems, and applications servers. However, the security
properties of this platform are hardly studied, which is likely to hinder its
use in production systems. This is all the more important that the dynamic
aspect of OSGi-based applications, that can be extended at runtime, make them
vulnerable to malicious code injection. We therefore perform a systematic audit
of the OSGi platform so as to build a vulnerability catalog that intends to
reference OSGi Vulnerabilities originating in the Core Specification, and in
behaviors related to the use of the Java language. Standard Services are not
considered. To support this audit, a Semi-formal Vulnerability Pattern is
defined, that enables to uniquely characterize fundamental properties for each
vulnerability, to include verbose description in the pattern, to reference
known security protections, and to track the implementation status of the
proof-of-concept OSGi Bundles that exploit the vulnerability. Based on the
analysis of the catalog, a robust OSGi Platform is built, and recommendations
are made to enhance the OSGi Specifications.
| [
{
"version": "v1",
"created": "Tue, 26 Jun 2007 12:36:37 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jun 2007 08:03:05 GMT"
},
{
"version": "v3",
"created": "Fri, 27 Jul 2007 13:50:46 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Parrend",
"Pierre",
"",
"INRIA Rhône-Alpes"
],
[
"Frénot",
"Stéphane",
"",
"INRIA\n Rhône-Alpes"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0706.3834 | Andrea Abrardo | A. Abrardo | Design of optimal convolutional codes for joint decoding of correlated
sources in wireless sensor networks | regular paper, 24 pages 10 figures | null | null | null | cs.IT math.IT | null | We consider a wireless sensors network scenario where two nodes detect
correlated sources and deliver them to a central collector via a wireless link.
Differently from the Slepian-Wolf approach to distributed source coding, in the
proposed scenario the sensing nodes do not perform any pre-compression of the
sensed data. Original data are instead independently encoded by means of
low-complexity convolutional codes. The decoder performs joint decoding with
the aim of exploiting the inherent correlation between the transmitted sources.
Complexity at the decoder is kept low thanks to the use of an iterative joint
decoding scheme, where the output of each decoder is fed to the other decoder's
input as a-priori information. For such scheme, we derive a novel analytical
framework for evaluating an upper bound of joint-detection packet error
probability and for deriving the optimum coding scheme. Experimental results
confirm the validity of the analytical framework, and show that recursive codes
allow a noticeable performance gain with respect to non-recursive coding
schemes. Moreover, the proposed recursive coding scheme allows to approach the
ideal Slepian-Wolf scheme performance in AWGN channel, and to clearly
outperform it over fading channels on account of diversity gain due to
correlation of information.
| [
{
"version": "v1",
"created": "Tue, 26 Jun 2007 14:08:22 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Abrardo",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.3846 | Man-On Pun | Man-On Pun, Visa Koivunen and H. Vincent Poor | Opportunistic Scheduling and Beamforming for MIMO-SDMA Downlink Systems
with Linear Combining | To appear in the Proceedings of the 18th Annual IEEE International
Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC),
Athens, Greece, September 3 - 7, 2007 | null | 10.1109/PIMRC.2007.4394179 | null | cs.IT math.IT | null | Opportunistic scheduling and beamforming schemes are proposed for multiuser
MIMO-SDMA downlink systems with linear combining in this work. Signals received
from all antennas of each mobile terminal (MT) are linearly combined to improve
the {\em effective} signal-to-noise-interference ratios (SINRs). By exploiting
limited feedback on the effective SINRs, the base station (BS) schedules
simultaneous data transmission on multiple beams to the MTs with the largest
effective SINRs. Utilizing the extreme value theory, we derive the asymptotic
system throughputs and scaling laws for the proposed scheduling and beamforming
schemes with different linear combining techniques. Computer simulations
confirm that the proposed schemes can substantially improve the system
throughput.
| [
{
"version": "v1",
"created": "Tue, 26 Jun 2007 15:33:32 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Pun",
"Man-On",
""
],
[
"Koivunen",
"Visa",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.3848 | Vlady Ravelomanana | Jean Cardinal (ULB), Vlady Ravelomanana (LIPN), Mario Valencia-Pabon
(LIPN) | Minimum Sum Edge Colorings of Multicycles | null | null | null | null | cs.DM | null | In the minimum sum edge coloring problem, we aim to assign natural numbers to
edges of a graph, so that adjacent edges receive different numbers, and the sum
of the numbers assigned to the edges is minimum. The {\em chromatic edge
strength} of a graph is the minimum number of colors required in a minimum sum
edge coloring of this graph. We study the case of multicycles, defined as
cycles with parallel edges, and give a closed-form expression for the chromatic
edge strength of a multicycle, thereby extending a theorem due to Berge. It is
shown that the minimum sum can be achieved with a number of colors equal to the
chromatic index. We also propose simple algorithms for finding a minimum sum
edge coloring of a multicycle. Finally, these results are generalized to a
large family of minimum cost coloring problems.
| [
{
"version": "v1",
"created": "Tue, 26 Jun 2007 14:43:15 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Jan 2008 13:36:41 GMT"
}
] | 2008-01-22T00:00:00 | [
[
"Cardinal",
"Jean",
"",
"ULB"
],
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
],
[
"Valencia-Pabon",
"Mario",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0706.3856 | Jean-Luc Marichal | Jean-Luc Marichal, Pierre Mathonet | Approximations of Lovasz extensions and their induced interaction index | 19 pages | Discrete Applied Mathematics 156 (1) (2008) 11-24 | null | null | math.CO cs.DM | null | The Lovasz extension of a pseudo-Boolean function $f : \{0,1\}^n \to R$ is
defined on each simplex of the standard triangulation of $[0,1]^n$ as the
unique affine function $\hat f : [0,1]^n \to R$ that interpolates $f$ at the
$n+1$ vertices of the simplex. Its degree is that of the unique multilinear
polynomial that expresses $f$. In this paper we investigate the least squares
approximation problem of an arbitrary Lovasz extension $\hat f$ by Lovasz
extensions of (at most) a specified degree. We derive explicit expressions of
these approximations. The corresponding approximation problem for
pseudo-Boolean functions was investigated by Hammer and Holzman (1992) and then
solved explicitly by Grabisch, Marichal, and Roubens (2000), giving rise to an
alternative definition of Banzhaf interaction index. Similarly we introduce a
new interaction index from approximations of $\hat f$ and we present some of
its properties. It turns out that its corresponding power index identifies with
the power index introduced by Grabisch and Labreuche (2001).
| [
{
"version": "v1",
"created": "Tue, 26 Jun 2007 15:14:06 GMT"
}
] | 2010-11-19T00:00:00 | [
[
"Marichal",
"Jean-Luc",
""
],
[
"Mathonet",
"Pierre",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0706.3865 | John Tomlin | Ralphe Wiggins and John A. Tomlin | Bid Optimization for Internet Graphical Ad Auction Systems via Special
Ordered Sets | null | null | null | YR-2007-004 | cs.DM | null | This paper describes an optimization model for setting bid levels for certain
types of advertisements on web pages. This model is non-convex, but we are able
to obtain optimal or near-optimal solutions rapidly using branch and cut
open-source software. The financial benefits obtained using the prototype
system have been substantial.
| [
{
"version": "v1",
"created": "Tue, 26 Jun 2007 15:59:42 GMT"
}
] | 2007-06-27T00:00:00 | [
[
"Wiggins",
"Ralphe",
""
],
[
"Tomlin",
"John A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0706.3984 | Ali Mesbah | Engin Bozdag, Ali Mesbah, Arie van Deursen | A Comparison of Push and Pull Techniques for Ajax | Conference: WSE 2007 | null | null | null | cs.SE cs.PF | null | Ajax applications are designed to have high user interactivity and low
user-perceived latency. Real-time dynamic web data such as news headlines,
stock tickers, and auction updates need to be propagated to the users as soon
as possible. However, Ajax still suffers from the limitations of the Web's
request/response architecture which prevents servers from pushing real-time
dynamic web data. Such applications usually use a pull style to obtain the
latest updates, where the client actively requests the changes based on a
predefined interval. It is possible to overcome this limitation by adopting a
push style of interaction where the server broadcasts data when a change occurs
on the server side. Both these options have their own trade-offs. This paper
explores the fundamental limits of browser-based applications and analyzes push
solutions for Ajax technology. It also shows the results of an empirical study
comparing push and pull.
| [
{
"version": "v1",
"created": "Wed, 27 Jun 2007 09:14:40 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Aug 2007 11:53:37 GMT"
}
] | 2007-08-16T00:00:00 | [
[
"Bozdag",
"Engin",
""
],
[
"Mesbah",
"Ali",
""
],
[
"van Deursen",
"Arie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0706.4004 | Ahmed Ait Ali | Ahmed Ait Ali (CRAN), Fabien Michaut (CRAN), Francis Lepage (CRAN) | End-to-End Available Bandwidth Measurement Tools : A Comparative
Evaluation of Performances | null | IPS-MoMe 2006 IEEE /ACM International workshop on Internet
Performance, Simulation, Monitoring and Measurement, Autriche (27/02/2005) 13 | null | null | cs.NI | null | In recent years, there has been a strong interest in measuring the available
bandwidth of network paths. Several methods and techniques have been proposed
and various measurement tools have been developed and evaluated. However, there
have been few comparative studies with regards to the actual performance of
these tools. This paper presents a study of available bandwidth measurement
techniques and undertakes a comparative analysis in terms of accuracy,
intrusiveness and response time of active probing tools. Finally, measurement
errors and the uncertainty of the tools are analysed and overall conclusions
made.
| [
{
"version": "v1",
"created": "Wed, 27 Jun 2007 11:51:36 GMT"
}
] | 2007-06-28T00:00:00 | [
[
"Ali",
"Ahmed Ait",
"",
"CRAN"
],
[
"Michaut",
"Fabien",
"",
"CRAN"
],
[
"Lepage",
"Francis",
"",
"CRAN"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.4009 | Veronika Rehn-Sonigo | Anne Benoit (INRIA Rh\^one-Alpes, LIP), Veronika Rehn-Sonigo (INRIA
Rh\^one-Alpes, LIP), Yves Robert (INRIA Rh\^one-Alpes, LIP) | Multi-criteria scheduling of pipeline workflows | null | null | null | null | cs.DC | null | Mapping workflow applications onto parallel platforms is a challenging
problem, even for simple application patterns such as pipeline graphs. Several
antagonist criteria should be optimized, such as throughput and latency (or a
combination). In this paper, we study the complexity of the bi-criteria mapping
problem for pipeline graphs on communication homogeneous platforms. In
particular, we assess the complexity of the well-known chains-to-chains problem
for different-speed processors, which turns out to be NP-hard. We provide
several efficient polynomial bi-criteria heuristics, and their relative
performance is evaluated through extensive simulations.
| [
{
"version": "v1",
"created": "Wed, 27 Jun 2007 13:43:16 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Jun 2007 15:20:26 GMT"
}
] | 2007-06-28T00:00:00 | [
[
"Benoit",
"Anne",
"",
"INRIA Rhône-Alpes, LIP"
],
[
"Rehn-Sonigo",
"Veronika",
"",
"INRIA\n Rhône-Alpes, LIP"
],
[
"Robert",
"Yves",
"",
"INRIA Rhône-Alpes, LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.4015 | Franck Petit | Christian Boulinier (LaRIA), Franck Petit (LaRIA) | Self-Stabilizing Wavelets and r-Hops Coordination | null | Rapport Interne (01/04/2007) | null | null | cs.DC | null | We introduce a simple tool called the wavelet (or, r-wavelet) scheme.
Wavelets deals with coordination among processes which are at most r hops away
of each other. We present a selfstabilizing solution for this scheme. Our
solution requires no underlying structure and works in arbritrary anonymous
networks, i.e., no process identifier is required. Moreover, our solution works
under any (even unfair) daemon. Next, we use the wavelet scheme to design
self-stabilizing layer clocks. We show that they provide an efficient device in
the design of local coordination problems at distance r, i.e., r-barrier
synchronization and r-local resource allocation (LRA) such as r-local mutual
exclusion (LME), r-group mutual exclusion (GME), and r-Reader/Writers. Some
solutions to the r-LRA problem (e.g., r-LME) also provide transformers to
transform algorithms written assuming any r-central daemon into algorithms
working with any distributed daemon.
| [
{
"version": "v1",
"created": "Wed, 27 Jun 2007 12:53:06 GMT"
}
] | 2007-06-28T00:00:00 | [
[
"Boulinier",
"Christian",
"",
"LaRIA"
],
[
"Petit",
"Franck",
"",
"LaRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.4035 | Sapon Tanachaiwiwat | Sapon Tanachaiwiwat, Ahmed Helmy | Encounter-based worms: Analysis and Defense | Submitted to a journal | null | null | null | cs.NI cs.CR | null | Encounter-based network is a frequently-disconnected wireless ad-hoc network
requiring immediate neighbors to store and forward aggregated data for
information disseminations. Using traditional approaches such as gateways or
firewalls for deterring worm propagation in encounter-based networks is
inappropriate. We propose the worm interaction approach that relies upon
automated beneficial worm generation aiming to alleviate problems of worm
propagations in such networks. To understand the dynamic of worm interactions
and its performance, we mathematically model worm interactions based on major
worm interaction factors including worm interaction types, network
characteristics, and node characteristics using ordinary differential equations
and analyze their effects on our proposed metrics. We validate our proposed
model using extensive synthetic and trace-driven simulations. We find that, all
worm interaction factors significantly affect the pattern of worm propagations.
For example, immunization linearly decreases the infection of susceptible nodes
while on-off behavior only impacts the duration of infection. Using realistic
mobile network measurements, we find that encounters are bursty, multi-group
and non-uniform. The trends from the trace-driven simulations are consistent
with the model, in general. Immunization and timely deployment seem to be the
most effective to counter the worm attacks in such scenarios while cooperation
may help in a specific case. These findings provide insight that we hope would
aid to develop counter-worm protocols in future encounter-based networks.
| [
{
"version": "v1",
"created": "Wed, 27 Jun 2007 18:01:50 GMT"
}
] | 2007-06-28T00:00:00 | [
[
"Tanachaiwiwat",
"Sapon",
""
],
[
"Helmy",
"Ahmed",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0706.4038 | Frederic Vivien | Matthieu Gallet (LIP, INRIA Rh\^one-Alpes), Yves Robert (LIP, INRIA
Rh\^one-Alpes), Fr\'ed\'eric Vivien (LIP, INRIA Rh\^one-Alpes) | Scheduling multiple divisible loads on a linear processor network | null | null | null | null | cs.DC | null | Min, Veeravalli, and Barlas have recently proposed strategies to minimize the
overall execution time of one or several divisible loads on a heterogeneous
linear network, using one or more installments. We show on a very simple
example that their approach does not always produce a solution and that, when
it does, the solution is often suboptimal. We also show how to find an optimal
schedule for any instance, once the number of installments per load is given.
Then, we formally state that any optimal schedule has an infinite number of
installments under a linear cost model as the one assumed in the original
papers. Therefore, such a cost model cannot be used to design practical
multi-installment strategies. Finally, through extensive simulations we
confirmed that the best solution is always produced by the linear programming
approach, while solutions of the original papers can be far away from the
optimal.
| [
{
"version": "v1",
"created": "Wed, 27 Jun 2007 14:43:13 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Jun 2007 15:02:05 GMT"
}
] | 2007-06-28T00:00:00 | [
[
"Gallet",
"Matthieu",
"",
"LIP, INRIA Rhône-Alpes"
],
[
"Robert",
"Yves",
"",
"LIP, INRIA\n Rhône-Alpes"
],
[
"Vivien",
"Frédéric",
"",
"LIP, INRIA Rhône-Alpes"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.4044 | Lutz Schr\"oder | Lutz Schr\"oder and Dirk Pattinson | PSPACE Bounds for Rank-1 Modal Logics | null | ACM Transactions on Computational Logic 10 (2:13), pp. 1-33, 2009 | 10.1145/1462179.1462185 | Imperial College TR 2007/4 | cs.LO cs.CC | null | For lack of general algorithmic methods that apply to wide classes of logics,
establishing a complexity bound for a given modal logic is often a laborious
task. The present work is a step towards a general theory of the complexity of
modal logics. Our main result is that all rank-1 logics enjoy a shallow model
property and thus are, under mild assumptions on the format of their
axiomatisation, in PSPACE. This leads to a unified derivation of tight
PSPACE-bounds for a number of logics including K, KD, coalition logic, graded
modal logic, majority logic, and probabilistic modal logic. Our generic
algorithm moreover finds tableau proofs that witness pleasant proof-theoretic
properties including a weak subformula property. This generality is made
possible by a coalgebraic semantics, which conveniently abstracts from the
details of a given model class and thus allows covering a broad range of logics
in a uniform way.
| [
{
"version": "v1",
"created": "Wed, 27 Jun 2007 15:15:57 GMT"
}
] | 2011-01-18T00:00:00 | [
[
"Schröder",
"Lutz",
""
],
[
"Pattinson",
"Dirk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0706.4048 | Michael Noble S. | Michael S. Noble | Getting More From Your Multicore: Exploiting OpenMP From An Open Source
Numerical Scripting Language | 15 pages, 16 figures; working paper, in preparation | null | null | null | cs.DC astro-ph | null | We introduce SLIRP, a module generator for the S-Lang numerical scripting
language, with a focus on its vectorization capabilities. We demonstrate how
both SLIRP and S-Lang were easily adapted to exploit the inherent parallelism
of high-level mathematical languages with OpenMP, allowing general users to
employ tightly-coupled multiprocessors in scriptable research calculations
while requiring no special knowledge of parallel programming. Motivated by
examples in the ISIS astrophysical modeling & analysis tool, performance
figures are presented for several machine and compiler configurations,
demonstrating beneficial speedups for real-world operations.
| [
{
"version": "v1",
"created": "Wed, 27 Jun 2007 15:21:28 GMT"
}
] | 2007-06-28T00:00:00 | [
[
"Noble",
"Michael S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
null
] |
0706.4095 | Ilya Kapovich | Ilya Kapovich and Paul Schupp | Some Quantitative Aspects of Fractional Computability | null | null | null | null | math.GR cs.CC | null | Motivated by results on generic-case complexity in group theory, we apply the
ideas of effective Baire category and effective measure theory to study
complexity classes of functions which are "fractionally computable" by a
partial algorithm. For this purpose it is crucial to specify an allowable
effective density, $\delta$, of convergence for a partial algorithm. The set
$\mathcal{FC}(\delta)$ consists of all total functions $ f: \Sigma^\ast \to
\{0,1 \}$ where $\Sigma$ is a finite alphabet with $|\Sigma| \ge 2$ which are
"fractionally computable at density $\delta$". The space $\mathcal{FC}(\delta)
$ is effectively of the second category while any fractional complexity class,
defined using $\delta$ and any computable bound $\beta$ with respect to an
abstract Blum complexity measure, is effectively meager. A remarkable result of
Kautz and Miltersen shows that relative to an algorithmically random oracle
$A$, the relativized class $\mathcal{NP}^A$ does not have effective polynomial
measure zero in $\mathcal{E}^A$, the relativization of strict exponential time.
We define the class $\mathcal{UFP}^A$ of all languages which are fractionally
decidable in polynomial time at ``a uniform rate'' by algorithms with an oracle
for $A$. We show that this class does have effective polynomial measure zero in
$\mathcal{E}^A$ for every oracle $A$. Thus relaxing the requirement of
polynomial time decidability to hold only for a fraction of possible inputs
does not compensate for the power of nondeterminism in the case of random
oracles.
| [
{
"version": "v1",
"created": "Wed, 27 Jun 2007 20:26:19 GMT"
}
] | 2007-06-30T00:00:00 | [
[
"Kapovich",
"Ilya",
""
],
[
"Schupp",
"Paul",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0706.4107 | Mihai Patrascu | Gianni Franceschini, S. Muthukrishnan and Mihai Patrascu | Radix Sorting With No Extra Space | Full version of paper accepted to ESA 2007. (17 pages) | null | null | null | cs.DS | null | It is well known that n integers in the range [1,n^c] can be sorted in O(n)
time in the RAM model using radix sorting. More generally, integers in any
range [1,U] can be sorted in O(n sqrt{loglog n}) time. However, these
algorithms use O(n) words of extra memory. Is this necessary?
We present a simple, stable, integer sorting algorithm for words of size
O(log n), which works in O(n) time and uses only O(1) words of extra memory on
a RAM model. This is the integer sorting case most useful in practice. We
extend this result with same bounds to the case when the keys are read-only,
which is of theoretical interest. Another interesting question is the case of
arbitrary c. Here we present a black-box transformation from any RAM sorting
algorithm to a sorting algorithm which uses only O(1) extra space and has the
same running time. This settles the complexity of in-place sorting in terms of
the complexity of sorting.
| [
{
"version": "v1",
"created": "Wed, 27 Jun 2007 22:04:40 GMT"
}
] | 2007-06-29T00:00:00 | [
[
"Franceschini",
"Gianni",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Patrascu",
"Mihai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0706.4161 | Maurice Margenstern | Maurice Margenstern | The Domino Problem of the Hyperbolic Plane Is Undecidable | 18 pages, This is a synthesis of previous deposits | The Bulletin of EATCS, 93(Oct.), (2007), 220-237 | null | null | cs.CG cs.DM | null | In this paper, we prove that the general tiling problem of the hyperbolic
plane is undecidable by proving a slightly stronger version using only a
regular polygon as the basic shape of the tiles. The problem was raised by a
paper of Raphael Robinson in 1971, in his famous simplified proof that the
general tiling problem is undecidable for the Euclidean plane, initially proved
by Robert Berger in 1966.
| [
{
"version": "v1",
"created": "Thu, 28 Jun 2007 09:16:19 GMT"
}
] | 2008-04-19T00:00:00 | [
[
"Margenstern",
"Maurice",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0706.4170 | Alessandro Mirone | Alessandro Mirone | Hilbert++ Manual | null | null | null | null | cs.OH cond-mat.str-el | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present here an installation guide, a hand-on mini-tutorial through
examples, and the theoretical foundations of the Hilbert++ code.
| [
{
"version": "v1",
"created": "Thu, 28 Jun 2007 09:09:55 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Mar 2009 09:03:37 GMT"
}
] | 2009-03-03T00:00:00 | [
[
"Mirone",
"Alessandro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Physics",
"code": "cond-mat.str-el",
"description": "Quantum magnetism, non-Fermi liquids, spin liquids, quantum criticality, charge density waves, metal-insulator transitions",
"span": "(Strongly Correlated Electrons)"
}
] |
0706.4175 | Cedric Adjih | Song Yean Cho (INRIA Rocquencourt), C\'edric Adjih (INRIA
Rocquencourt), Philippe Jacquet (INRIA Rocquencourt) | Heuristics for Network Coding in Wireless Networks | null | null | null | null | cs.NI | null | Multicast is a central challenge for emerging multi-hop wireless
architectures such as wireless mesh networks, because of its substantial cost
in terms of bandwidth. In this report, we study one specific case of multicast:
broadcasting, sending data from one source to all nodes, in a multi-hop
wireless network. The broadcast we focus on is based on network coding, a
promising avenue for reducing cost; previous work of ours showed that the
performance of network coding with simple heuristics is asymptotically optimal:
each transmission is beneficial to nearly every receiver. This is for
homogenous and large networks of the plan. But for small, sparse or for
inhomogeneous networks, some additional heuristics are required. This report
proposes such additional new heuristics (for selecting rates) for broadcasting
with network coding. Our heuristics are intended to use only simple local
topology information. We detail the logic of the heuristics, and with
experimental results, we illustrate the behavior of the heuristics, and
demonstrate their excellent performance.
| [
{
"version": "v1",
"created": "Thu, 28 Jun 2007 09:56:50 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Jul 2007 12:24:12 GMT"
}
] | 2009-04-16T00:00:00 | [
[
"Cho",
"Song Yean",
"",
"INRIA Rocquencourt"
],
[
"Adjih",
"Cédric",
"",
"INRIA\n Rocquencourt"
],
[
"Jacquet",
"Philippe",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.4224 | Sergey Andreyev | Sergey Andreyev | User driven applications - new design paradigm | null | null | null | null | cs.GR cs.HC | null | Programs for complicated engineering and scientific tasks always have to deal
with a problem of showing numerous graphical results. The limits of the screen
space and often opposite requirements from different users are the cause of the
infinite discussions between designers and users, but the source of this
ongoing conflict is not in the level of interface design, but in the basic
principle of current graphical output: user may change some views and details,
but in general the output view is absolutely defined and fixed by the
developer. Author was working for several years on the algorithm that will
allow eliminating this problem thus allowing stepping from designer-driven
applications to user-driven. Such type of applications in which user is
deciding what, when and how to show on the screen, is the dream of scientists
and engineers working on the analysis of the most complicated tasks. The new
paradigm is based on movable and resizable graphics, and such type of graphics
can be widely used not only for scientific and engineering applications.
| [
{
"version": "v1",
"created": "Thu, 28 Jun 2007 13:19:04 GMT"
}
] | 2007-06-29T00:00:00 | [
[
"Andreyev",
"Sergey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0706.4298 | Christian Boulinier | Christian Boulinier (LaRIA) | Unison as a Self-Stabilizing Wave Stream Algorithm in Asynchronous
Anonymous Networks | null | Rapport de recherche. (28/06/2007) | null | null | cs.DC | null | How to pass from local to global scales in anonymous networks? How to
organize a selfstabilizing propagation of information with feedback. From the
Angluin impossibility results, we cannot elect a leader in a general anonymous
network. Thus, it is impossible to build a rooted spanning tree. Many problems
can only be solved by probabilistic methods. In this paper we show how to use
Unison to design a self-stabilizing barrier synchronization in an anonymous
network. We show that the commuication structure of this barrier
synchronization designs a self-stabilizing wave-stream, or pipelining wave, in
anonymous networks. We introduce two variants of Wave: the strong waves and the
wavelets. A strong wave can be used to solve the idempotent r-operator
parametrized computation problem. A wavelet deals with k-distance computation.
We show how to use Unison to design a self-stabilizing wave stream, a
self-stabilizing strong wave stream and a self-stabilizing wavelet stream.
| [
{
"version": "v1",
"created": "Thu, 28 Jun 2007 18:51:36 GMT"
}
] | 2007-06-29T00:00:00 | [
[
"Boulinier",
"Christian",
"",
"LaRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.4323 | Khalil Djelloul | Khalil Djelloul, Thi-bich-hanh Dao and Thom Fruehwirth | Theory of Finite or Infinite Trees Revisited | null | null | null | null | cs.LO cs.AI | null | We present in this paper a first-order axiomatization of an extended theory
$T$ of finite or infinite trees, built on a signature containing an infinite
set of function symbols and a relation $\fini(t)$ which enables to distinguish
between finite or infinite trees. We show that $T$ has at least one model and
prove its completeness by giving not only a decision procedure, but a full
first-order constraint solver which gives clear and explicit solutions for any
first-order constraint satisfaction problem in $T$. The solver is given in the
form of 16 rewriting rules which transform any first-order constraint $\phi$
into an equivalent disjunction $\phi$ of simple formulas such that $\phi$ is
either the formula $\true$ or the formula $\false$ or a formula having at least
one free variable, being equivalent neither to $\true$ nor to $\false$ and
where the solutions of the free variables are expressed in a clear and explicit
way. The correctness of our rules implies the completeness of $T$. We also
describe an implementation of our algorithm in CHR (Constraint Handling Rules)
and compare the performance with an implementation in C++ and that of a recent
decision procedure for decomposable theories.
| [
{
"version": "v1",
"created": "Thu, 28 Jun 2007 21:18:19 GMT"
}
] | 2007-07-02T00:00:00 | [
[
"Djelloul",
"Khalil",
""
],
[
"Dao",
"Thi-bich-hanh",
""
],
[
"Fruehwirth",
"Thom",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0706.4375 | Thierry Hamon | Thierry Hamon (LIPN), Adeline Nazarenko (LIPN), Thierry Poibeau
(LIPN), Sophie Aubin (LIPN), Julien Derivi\`ere (LIPN) | A Robust Linguistic Platform for Efficient and Domain specific Web
Content Analysis | null | Proceedings of RIAO 2007 (30/05/2007) | null | null | cs.AI | null | Web semantic access in specific domains calls for specialized search engines
with enhanced semantic querying and indexing capacities, which pertain both to
information retrieval (IR) and to information extraction (IE). A rich
linguistic analysis is required either to identify the relevant semantic units
to index and weight them according to linguistic specific statistical
distribution, or as the basis of an information extraction process. Recent
developments make Natural Language Processing (NLP) techniques reliable enough
to process large collections of documents and to enrich them with semantic
annotations. This paper focuses on the design and the development of a text
processing platform, Ogmios, which has been developed in the ALVIS project. The
Ogmios platform exploits existing NLP modules and resources, which may be tuned
to specific domains and produces linguistically annotated documents. We show
how the three constraints of genericity, domain semantic awareness and
performance can be handled all together.
| [
{
"version": "v1",
"created": "Fri, 29 Jun 2007 08:58:02 GMT"
}
] | 2007-07-02T00:00:00 | [
[
"Hamon",
"Thierry",
"",
"LIPN"
],
[
"Nazarenko",
"Adeline",
"",
"LIPN"
],
[
"Poibeau",
"Thierry",
"",
"LIPN"
],
[
"Aubin",
"Sophie",
"",
"LIPN"
],
[
"Derivière",
"Julien",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0706.4440 | Craig Alan Feinstein | Craig Alan Feinstein | 2-State 3-Symbol Universal Turing Machines Do Not Exist | 1 page | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this brief note, we give a simple information-theoretic proof that 2-state
3-symbol universal Turing machines cannot possibly exist, unless one loosens
the definition of "universal".
| [
{
"version": "v1",
"created": "Fri, 29 Jun 2007 16:47:40 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jul 2007 15:16:11 GMT"
},
{
"version": "v3",
"created": "Mon, 27 Aug 2007 19:17:08 GMT"
},
{
"version": "v4",
"created": "Thu, 30 Aug 2007 19:55:30 GMT"
},
{
"version": "v5",
"created": "Fri, 9 Dec 2011 18:34:17 GMT"
}
] | 2011-12-12T00:00:00 | [
[
"Feinstein",
"Craig Alan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0707.0050 | Nicolas Bonneau | Nicolas Bonneau, M\'erouane Debbah, Eitan Altman, Are Hj{\o}rungnes | Non-atomic Games for Multi-User Systems | 17 pages, 4 figures, submitted to IEEE JSAC Special Issue on ``Game
Theory in Communication Systems'' | null | 10.1109/JSAC.2008.080903 | null | cs.IT cs.GT math.IT | null | In this contribution, the performance of a multi-user system is analyzed in
the context of frequency selective fading channels. Using game theoretic tools,
a useful framework is provided in order to determine the optimal power
allocation when users know only their own channel (while perfect channel state
information is assumed at the base station). We consider the realistic case of
frequency selective channels for uplink CDMA. This scenario illustrates the
case of decentralized schemes, where limited information on the network is
available at the terminal. Various receivers are considered, namely the Matched
filter, the MMSE filter and the optimum filter. The goal of this paper is to
derive simple expressions for the non-cooperative Nash equilibrium as the
number of mobiles becomes large and the spreading length increases. To that end
two asymptotic methodologies are combined. The first is asymptotic random
matrix theory which allows us to obtain explicit expressions of the impact of
all other mobiles on any given tagged mobile. The second is the theory of
non-atomic games which computes good approximations of the Nash equilibrium as
the number of mobiles grows.
| [
{
"version": "v1",
"created": "Sat, 30 Jun 2007 09:53:16 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Bonneau",
"Nicolas",
""
],
[
"Debbah",
"Mérouane",
""
],
[
"Altman",
"Eitan",
""
],
[
"Hjørungnes",
"Are",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0181 | Yuriy Bunyak | Yu. Bunyak and O. Bunyak | Location and Spectral Estimation of Weak Wave Packets on Noise
Background | 7 pages, 8 figures. Extended version of presentation in the
conferences IMTC-2007 | null | null | null | cs.CE | null | The method of location and spectral estimation of weak signals on a noise
background is being considered. The method is based on the optimized on order
and noise dispersion autoregressive model of a sought signal. A new approach of
model order determination is being offered. Available estimation of the noise
dispersion is close to the real one. The optimized model allows to define
function of empirical data spectral and dynamic features changes. The analysis
of the signal as dynamic invariant in respect of the linear shift
transformation yields the function of model consistency. Use of these both
functions enables to detect short-time and nonstationary wave packets at signal
to noise ratio as from -20 dB and above.
| [
{
"version": "v1",
"created": "Mon, 2 Jul 2007 09:47:33 GMT"
}
] | 2007-07-03T00:00:00 | [
[
"Bunyak",
"Yu.",
""
],
[
"Bunyak",
"O.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0707.0234 | Ketan Rajawat | Ketan Rajawat and Adrish Banerjee | Selection Relaying at Low Signal to Noise Ratios | null | null | null | null | cs.IT math.IT | null | Performance of cooperative diversity schemes at Low Signal to Noise Ratios
(LSNR) was recently studied by Avestimehr et. al. [1] who emphasized the
importance of diversity gain over multiplexing gain at low SNRs. It has also
been pointed out that continuous energy transfer to the channel is necessary
for achieving the max-flow min-cut bound at LSNR. Motivated by this we propose
the use of Selection Decode and Forward (SDF) at LSNR and analyze its
performance in terms of the outage probability. We also propose an energy
optimization scheme which further brings down the outage probability.
| [
{
"version": "v1",
"created": "Mon, 2 Jul 2007 14:08:52 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Rajawat",
"Ketan",
""
],
[
"Banerjee",
"Adrish",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0282 | Igor Razgon | Igor Razgon and Barry O'Sullivan | Directed Feedback Vertex Set is Fixed-Parameter Tractable | 14 pages | null | null | null | cs.DS cs.CC | null | We resolve positively a long standing open question regarding the
fixed-parameter tractability of the parameterized Directed Feedback Vertex Set
problem. In particular, we propose an algorithm which solves this problem in
$O(8^kk!*poly(n))$.
| [
{
"version": "v1",
"created": "Mon, 2 Jul 2007 17:56:53 GMT"
}
] | 2007-07-03T00:00:00 | [
[
"Razgon",
"Igor",
""
],
[
"O'Sullivan",
"Barry",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0707.0285 | Edwin Hammerich | Edwin Hammerich | A Generalized Sampling Theorem for Frequency Localized Signals | 20 pages, extended version of talk at International Workshop on
Sampling Theory and Applications SampTA07, Thessaloniki, Greece, June 1-5,
2007. Submitted to Sampl. Theory Signal Image Process | Sampl. Theory Signal Image Process., Vol. 8, No. 2, May 2009, pp.
127-146 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A generalized sampling theorem for frequency localized signals is presented.
The generalization in the proposed model of sampling is twofold: (1) It applies
to various prefilters effecting a "soft" bandlimitation, (2) an approximate
reconstruction from sample values rather than a perfect one is obtained (though
the former might be "practically perfect" in many cases). For an arbitrary
finite-energy signal the frequency localization is performed by a prefilter
realizing a crosscorrelation with a function of prescribed properties. The
range of the filter, the so-called localization space, is described in some
detail. Regular sampling is applied and a reconstruction formula is given. For
the reconstruction error a general error estimate is derived and connections
between a critical sampling interval and notions of "soft bandwidth" for the
prefilter are indicated. Examples based on the sinc-function, Gaussian
functions and B-splines are discussed.
| [
{
"version": "v1",
"created": "Mon, 2 Jul 2007 18:40:29 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Apr 2009 19:48:31 GMT"
}
] | 2009-08-30T00:00:00 | [
[
"Hammerich",
"Edwin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0323 | Syed Jafar | Viveck R. Cadambe, Syed A. Jafar | Interference Alignment and the Degrees of Freedom for the K User
Interference Channel | 30 pages. Revision extends the 3 user proof to K users | null | null | null | cs.IT math.IT | null | While the best known outerbound for the K user interference channel states
that there cannot be more than K/2 degrees of freedom, it has been conjectured
that in general the constant interference channel with any number of users has
only one degree of freedom. In this paper, we explore the spatial degrees of
freedom per orthogonal time and frequency dimension for the K user wireless
interference channel where the channel coefficients take distinct values across
frequency slots but are fixed in time. We answer five closely related
questions. First, we show that K/2 degrees of freedom can be achieved by
channel design, i.e. if the nodes are allowed to choose the best constant,
finite and nonzero channel coefficient values. Second, we show that if channel
coefficients can not be controlled by the nodes but are selected by nature,
i.e., randomly drawn from a continuous distribution, the total number of
spatial degrees of freedom for the K user interference channel is almost surely
K/2 per orthogonal time and frequency dimension. Thus, only half the spatial
degrees of freedom are lost due to distributed processing of transmitted and
received signals on the interference channel. Third, we show that interference
alignment and zero forcing suffice to achieve all the degrees of freedom in all
cases. Fourth, we show that the degrees of freedom $D$ directly lead to an
$\mathcal{O}(1)$ capacity characterization of the form
$C(SNR)=D\log(1+SNR)+\mathcal{O}(1)$ for the multiple access channel, the
broadcast channel, the 2 user interference channel, the 2 user MIMO X channel
and the 3 user interference channel with M>1 antennas at each node. Fifth, we
characterize the degree of freedom benefits from cognitive sharing of messages
on the 3 user interference channel.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 15:26:19 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Jul 2007 01:28:41 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Cadambe",
"Viveck R.",
""
],
[
"Jafar",
"Syed A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0336 | Erhan Bayraktar | Erhan Bayraktar | Pricing Options on Defaultable Stocks | Key Words: Option pricing, multiscale perturbation methods,
defaultable stocks, stochastic intensity of default, implied volatility skew | null | null | null | cs.CE | null | In this note, we develop stock option price approximations for a model which
takes both the risk o default and the stochastic volatility into account. We
also let the intensity of defaults be influenced by the volatility. We show
that it might be possible to infer the risk neutral default intensity from the
stock option prices. Our option price approximation has a rich implied
volatility surface structure and fits the data implied volatility well. Our
calibration exercise shows that an effective hazard rate from bonds issued by a
company can be used to explain the implied volatility skew of the implied
volatility of the option prices issued by the same company.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 03:28:35 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Dec 2007 01:08:18 GMT"
}
] | 2007-12-21T00:00:00 | [
[
"Bayraktar",
"Erhan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0707.0365 | Jean-Christophe Dubacq | Heithem Abbes (UTIC), Christophe C\'erin (LIPN), Jean-Christophe
Dubacq (LIPN), Mohamed Jemni (UTIC) | Performance Analysis of Publish/Subscribe Systems | null | Rapport Interne LIPN (15/05/2007) | null | null | cs.DC | null | The Desktop Grid offers solutions to overcome several challenges and to
answer increasingly needs of scientific computing. Its technology consists
mainly in exploiting resources, geographically dispersed, to treat complex
applications needing big power of calculation and/or important storage
capacity. However, as resources number increases, the need for scalability,
self-organisation, dynamic reconfigurations, decentralisation and performance
becomes more and more essential. Since such properties are exhibited by P2P
systems, the convergence of grid computing and P2P computing seems natural. In
this context, this paper evaluates the scalability and performance of P2P tools
for discovering and registering services. Three protocols are used for this
purpose: Bonjour, Avahi and Free-Pastry. We have studied the behaviour of
theses protocols related to two criteria: the elapsed time for registrations
services and the needed time to discover new services. Our aim is to analyse
these results in order to choose the best protocol we can use in order to
create a decentralised middleware for desktop grid.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 09:02:45 GMT"
}
] | 2007-07-04T00:00:00 | [
[
"Abbes",
"Heithem",
"",
"UTIC"
],
[
"Cérin",
"Christophe",
"",
"LIPN"
],
[
"Dubacq",
"Jean-Christophe",
"",
"LIPN"
],
[
"Jemni",
"Mohamed",
"",
"UTIC"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0707.0397 | Shijun Xiang jack-xiang | Shijun Xiang and Jiwu Huang | Robust Audio Watermarking Against the D/A and A/D conversions | Pages 29 | null | null | null | cs.CR cs.MM | null | Audio watermarking has played an important role in multimedia security. In
many applications using audio watermarking, D/A and A/D conversions (denoted by
DA/AD in this paper) are often involved. In previous works, however, the
robustness issue of audio watermarking against the DA/AD conversions has not
drawn sufficient attention yet. In our extensive investigation, it has been
found that the degradation of a watermarked audio signal caused by the DA/AD
conversions manifests itself mainly in terms of wave magnitude distortion and
linear temporal scaling, making the watermark extraction failed. Accordingly, a
DWT-based audio watermarking algorithm robust against the DA/AD conversions is
proposed in this paper. To resist the magnitude distortion, the relative energy
relationships among different groups of the DWT coefficients in the
low-frequency sub-band are utilized in watermark embedding by adaptively
controlling the embedding strength. Furthermore, the resynchronization is
designed to cope with the linear temporal scaling. The time-frequency
localization characteristics of DWT are exploited to save the computational
load in the resynchronization. Consequently, the proposed audio watermarking
algorithm is robust against the DA/AD conversions, other common audio
processing manipulations, and the attacks in StirMark Benchmark for Audio,
which has been verified by experiments.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 11:49:03 GMT"
}
] | 2007-07-04T00:00:00 | [
[
"Xiang",
"Shijun",
""
],
[
"Huang",
"Jiwu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0707.0421 | Riccardo Dondi | Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi | The $k$-anonymity Problem is Hard | 21 pages, A short version of this paper has been accepted in FCT 2009
- 17th International Symposium on Fundamentals of Computation Theory | null | null | null | cs.DB cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of publishing personal data without giving up privacy is becoming
increasingly important. An interesting formalization recently proposed is the
k-anonymity. This approach requires that the rows in a table are clustered in
sets of size at least k and that all the rows in a cluster become the same
tuple, after the suppression of some records. The natural optimization problem,
where the goal is to minimize the number of suppressed entries, is known to be
NP-hard when the values are over a ternary alphabet, k = 3 and the rows length
is unbounded. In this paper we give a lower bound on the approximation factor
that any polynomial-time algorithm can achive on two restrictions of the
problem,namely (i) when the records values are over a binary alphabet and k =
3, and (ii) when the records have length at most 8 and k = 4, showing that
these restrictions of the problem are APX-hard.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 14:17:49 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Jun 2009 16:40:37 GMT"
}
] | 2009-06-02T00:00:00 | [
[
"Bonizzoni",
"Paola",
""
],
[
"Della Vedova",
"Gianluca",
""
],
[
"Dondi",
"Riccardo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0707.0430 | Branislav Rovan | Peter Ga\v{z}i, Branislav Rovan | Assisted Problem Solving and Decompositions of Finite Automata | 14 pages | null | null | null | cs.CC | null | A study of assisted problem solving formalized via decompositions of
deterministic finite automata is initiated. The landscape of new types of
decompositions of finite automata this study uncovered is presented. Languages
with various degrees of decomposability between undecomposable and perfectly
decomposable are shown to exist.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 14:54:53 GMT"
}
] | 2007-07-04T00:00:00 | [
[
"Gaži",
"Peter",
""
],
[
"Rovan",
"Branislav",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0707.0454 | George Amariucai | George T. Amariucai, Shuangqing Wei and Rajgopal Kannan | Optimal Strategies for Gaussian Jamming in Block-Fading Channels under
Delay and Power Constraints | Submitted to IEEE Trans. Inform. Theory, June 03, 2007, for review,
This paper has been withdrawn by the authors. A more recent ane more
elaborate version is available at arXiv:0808.3418 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Without assuming any knowledge on source's codebook and its output signals,
we formulate a Gaussian jamming problem in block fading channels as a
two-player zero sum game. The outage probability is adopted as an objective
function, over which transmitter aims at minimization and jammer aims at
maximization by selecting their power control strategies. Optimal power control
strategies for each player are obtained under both short-term and long-term
power constraints. For the latter case, we first prove the non-existence of a
Nash equilibrium, and then provide a complete solution for both maxmin and
minimax problems. Numerical results demonstrate a sharp difference between the
outage probabilities of the minimax and maxmin solutions.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 16:09:37 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Sep 2009 15:53:34 GMT"
}
] | 2009-09-28T00:00:00 | [
[
"Amariucai",
"George T.",
""
],
[
"Wei",
"Shuangqing",
""
],
[
"Kannan",
"Rajgopal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0459 | Petar Popovski | Petar Popovski and Hiroyuki Yomo | Physical Network Coding in Two-Way Wireless Relay Channels | null | Proc. of IEEE International Conference on Communications (ICC),
Glasgow, Scotland, 2007 | null | null | cs.IT cs.NI math.IT | null | It has recently been recognized that the wireless networks represent a
fertile ground for devising communication modes based on network coding. A
particularly suitable application of the network coding arises for the two--way
relay channels, where two nodes communicate with each other assisted by using a
third, relay node. Such a scenario enables application of \emph{physical
network coding}, where the network coding is either done (a) jointly with the
channel coding or (b) through physical combining of the communication flows
over the multiple access channel. In this paper we first group the existing
schemes for physical network coding into two generic schemes, termed 3--step
and 2--step scheme, respectively. We investigate the conditions for
maximization of the two--way rate for each individual scheme: (1) the
Decode--and--Forward (DF) 3--step schemes (2) three different schemes with two
steps: Amplify--and--Forward (AF), JDF and Denoise--and--Forward (DNF). While
the DNF scheme has a potential to offer the best two--way rate, the most
interesting result of the paper is that, for some SNR configurations of the
source--relay links, JDF yields identical maximal two--way rate as the upper
bound on the rate for DNF.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 16:40:41 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Popovski",
"Petar",
""
],
[
"Yomo",
"Hiroyuki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0463 | Yuanning Yu | Yuanning Yu, Athina P. Petropulu, H. Vincent Poor and Visa Koivunen | Blind Estimation of Multiple Carrier Frequency Offsets | To appear in the Proceedings of the 18th Annual IEEE International
Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC),
Athens, Greece, September 3-7, 2007 | null | 10.1109/PIMRC.2007.4394103 | null | cs.IT math.IT | null | Multiple carrier-frequency offsets (CFO) arise in a distributed antenna
system, where data are transmitted simultaneously from multiple antennas. In
such systems the received signal contains multiple CFOs due to mismatch between
the local oscillators of transmitters and receiver. This results in a
time-varying rotation of the data constellation, which needs to be compensated
for at the receiver before symbol recovery. This paper proposes a new approach
for blind CFO estimation and symbol recovery. The received base-band signal is
over-sampled, and its polyphase components are used to formulate a virtual
Multiple-Input Multiple-Output (MIMO) problem. By applying blind MIMO system
estimation techniques, the system response is estimated and used to
subsequently transform the multiple CFOs estimation problem into many
independent single CFO estimation problems. Furthermore, an initial estimate of
the CFO is obtained from the phase of the MIMO system response. The Cramer-Rao
Lower bound is also derived, and the large sample performance of the proposed
estimator is compared to the bound.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 16:58:43 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Yu",
"Yuanning",
""
],
[
"Petropulu",
"Athina P.",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Koivunen",
"Visa",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0476 | Nihar Jindal | Nihar Jindal, Steven Weber, Jeffrey G. Andrews | Fractional Power Control for Decentralized Wireless Networks | 16 pages, in revision for IEEE Trans. on Wireless Communication | null | 10.1109/T-WC.2008.071439 | null | cs.IT math.IT | null | We consider a new approach to power control in decentralized wireless
networks, termed fractional power control (FPC). Transmission power is chosen
as the current channel quality raised to an exponent -s, where s is a constant
between 0 and 1. The choices s = 1 and s = 0 correspond to the familiar cases
of channel inversion and constant power transmission, respectively. Choosing s
in (0,1) allows all intermediate policies between these two extremes to be
evaluated, and we see that usually neither extreme is ideal. We derive
closed-form approximations for the outage probability relative to a target SINR
in a decentralized (ad hoc or unlicensed) network as well as for the resulting
transmission capacity, which is the number of users/m^2 that can achieve this
SINR on average. Using these approximations, which are quite accurate over
typical system parameter values, we prove that using an exponent of 1/2
minimizes the outage probability, meaning that the inverse square root of the
channel strength is a sensible transmit power scaling for networks with a
relatively low density of interferers. We also show numerically that this
choice of s is robust to a wide range of variations in the network parameters.
Intuitively, s=1/2 balances between helping disadvantaged users while making
sure they do not flood the network with interference.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 18:54:05 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Apr 2008 14:44:07 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Jindal",
"Nihar",
""
],
[
"Weber",
"Steven",
""
],
[
"Andrews",
"Jeffrey G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0479 | Hamidreza Farmanbar | Hamidreza Farmanbar and Amir K. Khandani | Precoding for the AWGN Channel with Discrete Interference | 5 pages, 3 figures, presented at ISIT 2007. In section 2, a new upper
bound is obtained for the cardinality of the auxiliary random variable in the
Shannon's capacity formula for the channel with causal side information at
the encoder | null | null | UW-ECE-2006-24 | cs.IT math.IT | null | For a state-dependent DMC with input alphabet $\mathcal{X}$ and state
alphabet $\mathcal{S}$ where the i.i.d. state sequence is known causally at the
transmitter, it is shown that by using at most
$|\mathcal{X}||\mathcal{S}|-|\mathcal{S}|+1$ out of
$|\mathcal{X}|^{|\mathcal{S}|}$ input symbols of the Shannon's
\emph{associated} channel, the capacity is achievable. As an example of
state-dependent channels with side information at the transmitter, $M$-ary
signal transmission over AWGN channel with additive $Q$-ary interference where
the sequence of i.i.d. interference symbols is known causally at the
transmitter is considered. For the special case where the Gaussian noise power
is zero, a sufficient condition, which is independent of interference, is given
for the capacity to be $\log_2 M$ bits per channel use. The problem of
maximization of the transmission rate under the constraint that the channel
input given any current interference symbol is uniformly distributed over the
channel input alphabet is investigated. For this setting, the general structure
of a communication system with optimal precoding is proposed.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 18:59:11 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Farmanbar",
"Hamidreza",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0498 | Roy Murphy Dr | Roy E. Murphy | The Role of Time in the Creation of Knowledge | Adaptive Processes | null | null | null | cs.LG cs.AI cs.IT math.IT | null | This paper I assume that in humans the creation of knowledge depends on a
discrete time, or stage, sequential decision-making process subjected to a
stochastic, information transmitting environment. For each time-stage, this
environment randomly transmits Shannon type information-packets to the
decision-maker, who examines each of them for relevancy and then determines his
optimal choices. Using this set of relevant information-packets, the
decision-maker adapts, over time, to the stochastic nature of his environment,
and optimizes the subjective expected rate-of-growth of knowledge. The
decision-maker's optimal actions, lead to a decision function that involves,
over time, his view of the subjective entropy of the environmental process and
other important parameters at each time-stage of the process. Using this model
of human behavior, one could create psychometric experiments using computer
simulation and real decision-makers, to play programmed games to measure the
resulting human performance.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 20:43:43 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Murphy",
"Roy E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0500 | Wenjun Li Ms. | Wenjun Li, Yanbing Zhang and Huaiyu Dai | Location-Aided Fast Distributed Consensus in Wireless Networks | 44 pages, 14 figures. Submitted to IEEE Transactions on Information
Theory | null | 10.1109/TIT.2010.2081030 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing works on distributed consensus explore linear iterations based on
reversible Markov chains, which contribute to the slow convergence of the
algorithms. It has been observed that by overcoming the diffusive behavior of
reversible chains, certain nonreversible chains lifted from reversible ones mix
substantially faster than the original chains. In this paper, we investigate
the idea of accelerating distributed consensus via lifting Markov chains, and
propose a class of Location-Aided Distributed Averaging (LADA) algorithms for
wireless networks, where nodes' coarse location information is used to
construct nonreversible chains that facilitate distributed computing and
cooperative processing. First, two general pseudo-algorithms are presented to
illustrate the notion of distributed averaging through chain-lifting. These
pseudo-algorithms are then respectively instantiated through one LADA algorithm
on grid networks, and one on general wireless networks. For a $k\times k$ grid
network, the proposed LADA algorithm achieves an $\epsilon$-averaging time of
$O(k\log(\epsilon^{-1}))$. Based on this algorithm, in a wireless network with
transmission range $r$, an $\epsilon$-averaging time of
$O(r^{-1}\log(\epsilon^{-1}))$ can be attained through a centralized algorithm.
Subsequently, we present a fully-distributed LADA algorithm for wireless
networks, which utilizes only the direction information of neighbors to
construct nonreversible chains. It is shown that this distributed LADA
algorithm achieves the same scaling law in averaging time as the centralized
scheme. Finally, we propose a cluster-based LADA (C-LADA) algorithm, which,
requiring no central coordination, provides the additional benefit of reduced
message complexity compared with the distributed LADA algorithm.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 20:47:08 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Jul 2008 23:54:00 GMT"
},
{
"version": "v3",
"created": "Mon, 23 Mar 2009 23:40:57 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Li",
"Wenjun",
""
],
[
"Zhang",
"Yanbing",
""
],
[
"Dai",
"Huaiyu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0514 | Matthew Cargo | Matthew Charles Cargo | Phase space methods and psychoacoustic models in lossy transform coding | null | null | null | null | cs.IT cs.SD math.IT | null | I present a method for lossy transform coding of digital audio that uses the
Weyl symbol calculus for constructing the encoding and decoding transformation.
The method establishes a direct connection between a time-frequency
representation of the signal dependent threshold of masked noise and the
encode/decode pair. The formalism also offers a time-frequency measure of
perceptual entropy.
| [
{
"version": "v1",
"created": "Tue, 3 Jul 2007 22:41:11 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Cargo",
"Matthew Charles",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0546 | Juli\'an Mestre | Juli\'an Mestre | Weighted Popular Matchings | 14 pages, 3 figures. A preliminary version appeared in the
Proceedings of the 33rd International Colloquium on Automata, Languages and
Programming (ICALP) | null | null | null | cs.DS | null | We study the problem of assigning jobs to applicants. Each applicant has a
weight and provides a preference list ranking a subset of the jobs. A matching
M is popular if there is no other matching M' such that the weight of the
applicants who prefer M' over M exceeds the weight of those who prefer M over
M'. This paper gives efficient algorithms to find a popular matching if one
exists.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 06:55:43 GMT"
}
] | 2007-07-05T00:00:00 | [
[
"Mestre",
"Julián",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0707.0548 | Sebastien Verel | Michael Defoin Platel (I3S), Sebastien Verel (I3S), Manuel Clergue
(I3S), Philippe Collard (I3S) | From Royal Road to Epistatic Road for Variable Length Evolution
Algorithm | null | Lecture notes in computer science (Lect. notes comput. sci.) ISSN
0302-9743 (27/10/2003) 3-14 | null | null | cs.NE | null | Although there are some real world applications where the use of variable
length representation (VLR) in Evolutionary Algorithm is natural and suitable,
an academic framework is lacking for such representations. In this work we
propose a family of tunable fitness landscapes based on VLR of genotypes. The
fitness landscapes we propose possess a tunable degree of both neutrality and
epistasis; they are inspired, on the one hand by the Royal Road fitness
landscapes, and the other hand by the NK fitness landscapes. So these
landscapes offer a scale of continuity from Royal Road functions, with
neutrality and no epistasis, to landscapes with a large amount of epistasis and
no redundancy. To gain insight into these fitness landscapes, we first use
standard tools such as adaptive walks and correlation length. Second, we
evaluate the performances of evolutionary algorithms on these landscapes for
various values of the neutral and the epistatic parameters; the results allow
us to correlate the performances with the expected degrees of neutrality and
epistasis.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 06:57:52 GMT"
}
] | 2007-07-05T00:00:00 | [
[
"Platel",
"Michael Defoin",
"",
"I3S"
],
[
"Verel",
"Sebastien",
"",
"I3S"
],
[
"Clergue",
"Manuel",
"",
"I3S"
],
[
"Collard",
"Philippe",
"",
"I3S"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0707.0556 | Roberto Amadio | Roberto Amadio (PPS), Mehdi Dogguy (PPS) | Determinacy in a synchronous pi-calculus | To appear in the book `From semantics to computer science: essays in
honor of Gilles Kahn', Cambridge University Press | From semantics to computer science: essays in honor of Gilles
Kahn, Y. Bertot et al. (Ed.) (2009) 1-27 | null | null | cs.LO | null | The S-pi-calculus is a synchronous pi-calculus which is based on the SL
model. The latter is a relaxation of the Esterel model where the reaction to
the absence of a signal within an instant can only happen at the next instant.
In the present work, we present and characterise a compositional semantics of
the S-pi-calculus based on suitable notions of labelled transition system and
bisimulation. Based on this semantic framework, we explore the notion of
determinacy and the related one of (local) confluence.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 08:12:17 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Feb 2008 18:58:19 GMT"
}
] | 2010-07-01T00:00:00 | [
[
"Amadio",
"Roberto",
"",
"PPS"
],
[
"Dogguy",
"Mehdi",
"",
"PPS"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.0562 | Stefan G\"oller | Stefan G\"oller and Dirk Nowotka | On a Non-Context-Free Extension of PDL | null | null | null | null | cs.LO | null | Over the last 25 years, a lot of work has been done on seeking for decidable
non-regular extensions of Propositional Dynamic Logic (PDL). Only recently, an
expressive extension of PDL, allowing visibly pushdown automata (VPAs) as a
formalism to describe programs, was introduced and proven to have a
satisfiability problem complete for deterministic double exponential time.
Lately, the VPA formalism was extended to so called k-phase multi-stack visibly
pushdown automata (k-MVPAs). Similarly to VPAs, it has been shown that the
language of k-MVPAs have desirable effective closure properties and that the
emptiness problem is decidable. On the occasion of introducing k-MVPAs, it has
been asked whether the extension of PDL with k-MVPAs still leads to a decidable
logic. This question is answered negatively here. We prove that already for the
extension of PDL with 2-phase MVPAs with two stacks satisfiability becomes
\Sigma_1^1-complete.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 09:33:21 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Jul 2007 10:11:01 GMT"
}
] | 2007-07-18T00:00:00 | [
[
"Göller",
"Stefan",
""
],
[
"Nowotka",
"Dirk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.0568 | Gesualdo Scutari | Gesualdo Scutari, D.P. Palomar, S. Barbarossa | Optimal Linear Precoding Strategies for Wideband Non-Cooperative Systems
based on Game Theory-Part I: Nash Equilibria | Paper submitted to IEEE Transactions on Signal Processing, September
22, 2005. Revised March 14, 2007. Accepted June 5, 2007. To be published on
IEEE Transactions on Signal Processing, 2007. To appear on IEEE Transactions
on Signal Processing, 2007 | null | 10.1109/TSP.2007.907807 | null | cs.IT cs.GT math.IT | null | In this two-parts paper we propose a decentralized strategy, based on a
game-theoretic formulation, to find out the optimal precoding/multiplexing
matrices for a multipoint-to-multipoint communication system composed of a set
of wideband links sharing the same physical resources, i.e., time and
bandwidth. We assume, as optimality criterion, the achievement of a Nash
equilibrium and consider two alternative optimization problems: 1) the
competitive maximization of mutual information on each link, given constraints
on the transmit power and on the spectral mask imposed by the radio spectrum
regulatory bodies; and 2) the competitive maximization of the transmission
rate, using finite order constellations, under the same constraints as above,
plus a constraint on the average error probability. In Part I of the paper, we
start by showing that the solution set of both noncooperative games is always
nonempty and contains only pure strategies. Then, we prove that the optimal
precoding/multiplexing scheme for both games leads to a channel diagonalizing
structure, so that both matrix-valued problems can be recast in a simpler
unified vector power control game, with no performance penalty. Thus, we study
this simpler game and derive sufficient conditions ensuring the uniqueness of
the Nash equilibrium. Interestingly, although derived under stronger
constraints, incorporating for example spectral mask constraints, our
uniqueness conditions have broader validity than previously known conditions.
Finally, we assess the goodness of the proposed decentralized strategy by
comparing its performance with the performance of a Pareto-optimal centralized
scheme. To reach the Nash equilibria of the game, in Part II, we propose
alternative distributed algorithms, along with their convergence conditions.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 10:33:25 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Scutari",
"Gesualdo",
""
],
[
"Palomar",
"D. P.",
""
],
[
"Barbarossa",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0610 | Joseph O'Rourke | Joseph O'Rourke | Unfolding Orthogonal Terrains | 7 pages, 7 figures, 5 references. First revision adds Figure 7, and
improves Figure 6. Second revision further improves Figure 7, and adds one
clarifying sentence. Third corrects label in Figure 7. Fourth revision
corrects a sentence in the conclusion about the class of shapes now known to
be grid-unfoldable | null | null | Smith Technical Report 084 | cs.CG | null | It is shown that every orthogonal terrain, i.e., an orthogonal (right-angled)
polyhedron based on a rectangle that meets every vertical line in a segment,
has a grid unfolding: its surface may be unfolded to a single non-overlapping
piece by cutting along grid edges defined by coordinate planes through every
vertex.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 15:04:33 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jul 2007 18:11:20 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Jul 2007 12:39:04 GMT"
},
{
"version": "v4",
"created": "Thu, 12 Jul 2007 13:16:38 GMT"
}
] | 2007-07-12T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0707.0641 | Sebastien Verel | S\'ebastien Verel (I3S), Philippe Collard (I3S), Manuel Clergue (I3S) | Where are Bottlenecks in NK Fitness Landscapes? | null | Evolutionary Computation, 2003. CEC'03 (08/12/2003) 273--280 | 10.1109/CEC.2003.1299585 | null | cs.NE | null | Usually the offspring-parent fitness correlation is used to visualize and
analyze some caracteristics of fitness landscapes such as evolvability. In this
paper, we introduce a more general representation of this correlation, the
Fitness Cloud (FC). We use the bottleneck metaphor to emphasise fitness levels
in landscape that cause local search process to slow down. For a local search
heuristic such as hill-climbing or simulated annealing, FC allows to visualize
bottleneck and neutrality of landscapes. To confirm the relevance of the FC
representation we show where the bottlenecks are in the well-know NK fitness
landscape and also how to use neutrality information from the FC to combine
some neutral operator with local search heuristic.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 15:30:54 GMT"
}
] | 2007-07-05T00:00:00 | [
[
"Verel",
"Sébastien",
"",
"I3S"
],
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Clergue",
"Manuel",
"",
"I3S"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0707.0643 | Sebastien Verel | S\'ebastien Verel (I3S), Philippe Collard (I3S), Manuel Clergue (I3S) | Scuba Search : when selection meets innovation | null | Evolutionary Computation, 2004. CEC2004 (23/06/2004) 924 - 931 | 10.1109/CEC.2004.1330960 | null | cs.NE | null | We proposed a new search heuristic using the scuba diving metaphor. This
approach is based on the concept of evolvability and tends to exploit
neutrality in fitness landscape. Despite the fact that natural evolution does
not directly select for evolvability, the basic idea behind the scuba search
heuristic is to explicitly push the evolvability to increase. The search
process switches between two phases: Conquest-of-the-Waters and
Invasion-of-the-Land. A comparative study of the new algorithm and standard
local search heuristics on the NKq-landscapes has shown advantage and limit of
the scuba search. To enlighten qualitative differences between neutral search
processes, the space is changed into a connected graph to visualize the
pathways that the search is likely to follow.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 15:36:35 GMT"
}
] | 2007-07-05T00:00:00 | [
[
"Verel",
"Sébastien",
"",
"I3S"
],
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Clergue",
"Manuel",
"",
"I3S"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0707.0644 | Ali Akhavi | Ali Akhavi (GREYC), C\'eline Moreira (GREYC) | Another view of the Gaussian algorithm | null | Proceedings of Latin'04 (04/2004) 474--487 | null | null | cs.DS cs.DM | null | We introduce here a rewrite system in the group of unimodular matrices,
\emph{i.e.}, matrices with integer entries and with determinant equal to $\pm
1$. We use this rewrite system to precisely characterize the mechanism of the
Gaussian algorithm, that finds shortest vectors in a two--dimensional lattice
given by any basis. Putting together the algorithmic of lattice reduction and
the rewrite system theory, we propose a new worst--case analysis of the
Gaussian algorithm. There is already an optimal worst--case bound for some
variant of the Gaussian algorithm due to Vall\'ee \cite {ValGaussRevisit}. She
used essentially geometric considerations. Our analysis generalizes her result
to the case of the usual Gaussian algorithm. An interesting point in our work
is its possible (but not easy) generalization to the same problem in higher
dimensions, in order to exhibit a tight upper-bound for the number of
iterations of LLL--like reduction algorithms in the worst case. Moreover, our
method seems to work for analyzing other families of algorithms. As an
illustration, the analysis of sorting algorithms are briefly developed in the
last section of the paper.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 15:37:15 GMT"
}
] | 2007-07-05T00:00:00 | [
[
"Akhavi",
"Ali",
"",
"GREYC"
],
[
"Moreira",
"Céline",
"",
"GREYC"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.0648 | Viswanath Nagarajan | Anupam Gupta, MohammadTaghi Hajiaghayi, Viswanath Nagarajan, R. Ravi | Dial a Ride from k-forest | Preliminary version in Proc. European Symposium on Algorithms, 2007 | null | null | null | cs.DS | null | The k-forest problem is a common generalization of both the k-MST and the
dense-$k$-subgraph problems. Formally, given a metric space on $n$ vertices
$V$, with $m$ demand pairs $\subseteq V \times V$ and a ``target'' $k\le m$,
the goal is to find a minimum cost subgraph that connects at least $k$ demand
pairs. In this paper, we give an $O(\min\{\sqrt{n},\sqrt{k}\})$-approximation
algorithm for $k$-forest, improving on the previous best ratio of
$O(n^{2/3}\log n)$ by Segev & Segev.
We then apply our algorithm for k-forest to obtain approximation algorithms
for several Dial-a-Ride problems. The basic Dial-a-Ride problem is the
following: given an $n$ point metric space with $m$ objects each with its own
source and destination, and a vehicle capable of carrying at most $k$ objects
at any time, find the minimum length tour that uses this vehicle to move each
object from its source to destination. We prove that an $\alpha$-approximation
algorithm for the $k$-forest problem implies an
$O(\alpha\cdot\log^2n)$-approximation algorithm for Dial-a-Ride. Using our
results for $k$-forest, we get an $O(\min\{\sqrt{n},\sqrt{k}\}\cdot\log^2 n)$-
approximation algorithm for Dial-a-Ride. The only previous result known for
Dial-a-Ride was an $O(\sqrt{k}\log n)$-approximation by Charikar &
Raghavachari; our results give a different proof of a similar approximation
guarantee--in fact, when the vehicle capacity $k$ is large, we give a slight
improvement on their results.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 16:08:40 GMT"
}
] | 2007-07-05T00:00:00 | [
[
"Gupta",
"Anupam",
""
],
[
"Hajiaghayi",
"MohammadTaghi",
""
],
[
"Nagarajan",
"Viswanath",
""
],
[
"Ravi",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0707.0649 | Albert Guill\'en i F\`abregas | Albert Guillen i Fabregas and Emanuele Viterbo | Sphere Lower Bound for Rotated Lattice Constellations in Fading Channels | accepted for publication at the IEEE Transactions on Wireless
Communications | null | null | null | cs.IT math.IT | null | We study the error probability performance of rotated lattice constellations
in frequency-flat Nakagami-$m$ block-fading channels. In particular, we use the
sphere lower bound on the underlying infinite lattice as a performance
benchmark. We show that the sphere lower bound has full diversity. We observe
that optimally rotated lattices with largest known minimum product distance
perform very close to the lower bound, while the ensemble of random rotations
is shown to lack diversity and perform far from it.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 15:56:03 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Fabregas",
"Albert Guillen i",
""
],
[
"Viterbo",
"Emanuele",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0652 | Sebastien Verel | Philippe Collard (I3S), S\'ebastien Verel (I3S), Manuel Clergue (I3S) | How to use the Scuba Diving metaphor to solve problem with neutrality ? | null | ECAI'2004 (27/08/2004) 166-170 | null | null | cs.NE | null | We proposed a new search heuristic using the scuba diving metaphor. This
approach is based on the concept of evolvability and tends to exploit
neutrality which exists in many real-world problems. Despite the fact that
natural evolution does not directly select for evolvability, the basic idea
behind the scuba search heuristic is to explicitly push evolvability to
increase. A comparative study of the scuba algorithm and standard local search
heuristics has shown the advantage and the limitation of the scuba search. In
order to tune neutrality, we use the NKq fitness landscapes and a family of
travelling salesman problems (TSP) where cities are randomly placed on a
lattice and where travel distance between cities is computed with the Manhattan
metric. In this last problem the amount of neutrality varies with the city
concentration on the grid ; assuming the concentration below one, this TSP
reasonably remains a NP-hard problem.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 16:12:17 GMT"
}
] | 2007-07-05T00:00:00 | [
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Verel",
"Sébastien",
"",
"I3S"
],
[
"Clergue",
"Manuel",
"",
"I3S"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0707.0701 | Alexandre d'Aspremont | Ronny Luss, Alexandre d'Aspremont | Clustering and Feature Selection using Sparse Principal Component
Analysis | More experiments | null | null | null | cs.AI cs.LG cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the application of sparse principal component
analysis (PCA) to clustering and feature selection problems. Sparse PCA seeks
sparse factors, or linear combinations of the data variables, explaining a
maximum amount of variance in the data while having only a limited number of
nonzero coefficients. PCA is often used as a simple clustering technique and
sparse factors allow us here to interpret the clusters in terms of a reduced
set of variables. We begin with a brief introduction and motivation on sparse
PCA and detail our implementation of the algorithm in d'Aspremont et al.
(2005). We then apply these results to some classic clustering and feature
selection problems arising in biology.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 21:53:11 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Oct 2008 18:41:53 GMT"
}
] | 2008-10-08T00:00:00 | [
[
"Luss",
"Ronny",
""
],
[
"d'Aspremont",
"Alexandre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0707.0704 | Alexandre d'Aspremont | Onureena Banerjee, Laurent El Ghaoui, Alexandre d'Aspremont | Model Selection Through Sparse Maximum Likelihood Estimation | null | null | null | null | cs.AI cs.LG | null | We consider the problem of estimating the parameters of a Gaussian or binary
distribution in such a way that the resulting undirected graphical model is
sparse. Our approach is to solve a maximum likelihood problem with an added
l_1-norm penalty term. The problem as formulated is convex but the memory
requirements and complexity of existing interior point methods are prohibitive
for problems with more than tens of nodes. We present two new algorithms for
solving problems with at least a thousand nodes in the Gaussian case. Our first
algorithm uses block coordinate descent, and can be interpreted as recursive
l_1-norm penalized regression. Our second algorithm, based on Nesterov's first
order method, yields a complexity estimate with a better dependence on problem
size than existing interior point methods. Using a log determinant relaxation
of the log partition function (Wainwright & Jordan (2006)), we show that these
same algorithms can be used to solve an approximate sparse maximum likelihood
problem for the binary case. We test our algorithms on synthetic data, as well
as on gene expression and senate voting records data.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 22:13:42 GMT"
}
] | 2007-07-06T00:00:00 | [
[
"Banerjee",
"Onureena",
""
],
[
"Ghaoui",
"Laurent El",
""
],
[
"d'Aspremont",
"Alexandre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0707.0705 | Alexandre d'Aspremont | Alexandre d'Aspremont, Francis Bach, Laurent El Ghaoui | Optimal Solutions for Sparse Principal Component Analysis | Revised journal version. More efficient optimality conditions and new
examples in subset selection and sparse recovery. Original version is in ICML
proceedings | null | null | null | cs.AI cs.LG | null | Given a sample covariance matrix, we examine the problem of maximizing the
variance explained by a linear combination of the input variables while
constraining the number of nonzero coefficients in this combination. This is
known as sparse principal component analysis and has a wide array of
applications in machine learning and engineering. We formulate a new
semidefinite relaxation to this problem and derive a greedy algorithm that
computes a full set of good solutions for all target numbers of non zero
coefficients, with total complexity O(n^3), where n is the number of variables.
We then use the same relaxation to derive sufficient conditions for global
optimality of a solution, which can be tested in O(n^3) per pattern. We discuss
applications in subset selection and sparse recovery and show on artificial
examples and biological data that our algorithm does provide globally optimal
solutions in many cases.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2007 22:28:28 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Aug 2007 22:30:22 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Aug 2007 00:49:31 GMT"
},
{
"version": "v4",
"created": "Fri, 9 Nov 2007 17:27:11 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"d'Aspremont",
"Alexandre",
""
],
[
"Bach",
"Francis",
""
],
[
"Ghaoui",
"Laurent El",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0707.0724 | Damien Chablat | Daniel Kanaan (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat
(IRCCyN) | Workspace Analysis of the Parallel Module of the VERNE Machine | null | Problems of Mechanics 25, 4 (01/12/2006) 26-42 | null | null | cs.RO physics.class-ph | null | The paper addresses geometric aspects of a spatial three-degree-of-freedom
parallel module, which is the parallel module of a hybrid serial-parallel
5-axis machine tool. This parallel module consists of a moving platform that is
connected to a fixed base by three non-identical legs. Each leg is made up of
one prismatic and two pairs of spherical joint, which are connected in a way
that the combined effects of the three legs lead to an over-constrained
mechanism with complex motion. This motion is defined as a simultaneous
combination of rotation and translation. A method for computing the complete
workspace of the VERNE parallel module for various tool lengths is presented.
An algorithm describing this method is also introduced.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 06:43:49 GMT"
}
] | 2007-07-06T00:00:00 | [
[
"Kanaan",
"Daniel",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
] |
0707.0740 | Richard McClatchey | A. Ali, A. Anjum, J. Bunn, F. Khan, R.McClatchey, H. Newman, C.
Steenberg, M. Thomas, Ian Willers | A Multi Interface Grid Discovery System | 2 pages, 4 figures. Presented at the Grid 2006 conference, Barcelona
Spain | null | null | null | cs.DC | null | Discovery Systems (DS) can be considered as entry points for global loosely
coupled distributed systems. An efficient Discovery System in essence increases
the performance, reliability and decision making capability of distributed
systems. With the rapid increase in scale of distributed applications, existing
solutions for discovery systems are fast becoming either obsolete or incapable
of handling such complexity. They are particularly ineffective when handling
service lifetimes and providing up-to-date information, poor at enabling
dynamic service access and they can also impose unwanted restrictions on
interfaces to widely available information repositories. In this paper we
present essential the design characteristics, an implementation and a
performance analysis for a discovery system capable of overcoming these
deficiencies in large, globally distributed environments.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 09:22:45 GMT"
}
] | 2007-07-06T00:00:00 | [
[
"Ali",
"A.",
""
],
[
"Anjum",
"A.",
""
],
[
"Bunn",
"J.",
""
],
[
"Khan",
"F.",
""
],
[
"McClatchey",
"R.",
""
],
[
"Newman",
"H.",
""
],
[
"Steenberg",
"C.",
""
],
[
"Thomas",
"M.",
""
],
[
"Willers",
"Ian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0707.0742 | Richard McClatchey | A. Ali, A. Anjum, T. Azim, J. Bunn, A. Ikram, R. McClatchey, H.
Newman, C. Steenberg, M. Thomas, I. Willers | Mobile Computing in Physics Analysis - An Indicator for eScience | 8 pages, 7 figures. Presented at the 3rd Int Conf on Mobile Computing
& Ubiquitous Networking (ICMU06. London October 2006 | null | null | null | cs.DC | null | This paper presents the design and implementation of a Grid-enabled physics
analysis environment for handheld and other resource-limited computing devices
as one example of the use of mobile devices in eScience. Handheld devices offer
great potential because they provide ubiquitous access to data and
round-the-clock connectivity over wireless links. Our solution aims to provide
users of handheld devices the capability to launch heavy computational tasks on
computational and data Grids, monitor the jobs status during execution, and
retrieve results after job completion. Users carry their jobs on their handheld
devices in the form of executables (and associated libraries). Users can
transparently view the status of their jobs and get back their outputs without
having to know where they are being executed. In this way, our system is able
to act as a high-throughput computing environment where devices ranging from
powerful desktop machines to small handhelds can employ the power of the Grid.
The results shown in this paper are readily applicable to the wider eScience
community.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 09:32:29 GMT"
}
] | 2007-07-06T00:00:00 | [
[
"Ali",
"A.",
""
],
[
"Anjum",
"A.",
""
],
[
"Azim",
"T.",
""
],
[
"Bunn",
"J.",
""
],
[
"Ikram",
"A.",
""
],
[
"McClatchey",
"R.",
""
],
[
"Newman",
"H.",
""
],
[
"Steenberg",
"C.",
""
],
[
"Thomas",
"M.",
""
],
[
"Willers",
"I.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0707.0743 | Richard McClatchey | A. Anjum, R. McClatchey, H. Stockinger, A. Ali, I. Willers, M. Thomas,
M. Sagheer, K. Hasham, O. Alvi | DIANA Scheduling Hierarchies for Optimizing Bulk Job Scheduling | 8 pages, 9 figures. Presented at the 2nd IEEE Int Conference on
eScience & Grid Computing. Amsterdam Netherlands, December 2006 | null | 10.1109/E-SCIENCE.2006.261173 | null | cs.DC | null | The use of meta-schedulers for resource management in large-scale distributed
systems often leads to a hierarchy of schedulers. In this paper, we discuss why
existing meta-scheduling hierarchies are sometimes not sufficient for Grid
systems due to their inability to re-organise jobs already scheduled locally.
Such a job re-organisation is required to adapt to evolving loads which are
common in heavily used Grid infrastructures. We propose a peer-to-peer
scheduling model and evaluate it using case studies and mathematical modelling.
We detail the DIANA (Data Intensive and Network Aware) scheduling algorithm and
its queue management system for coping with the load distribution and for
supporting bulk job scheduling. We demonstrate that such a system is beneficial
for dynamic, distributed and self-organizing resource management and can assist
in optimizing load or job distribution in complex Grid infrastructures.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 09:36:18 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Anjum",
"A.",
""
],
[
"McClatchey",
"R.",
""
],
[
"Stockinger",
"H.",
""
],
[
"Ali",
"A.",
""
],
[
"Willers",
"I.",
""
],
[
"Thomas",
"M.",
""
],
[
"Sagheer",
"M.",
""
],
[
"Hasham",
"K.",
""
],
[
"Alvi",
"O.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0707.0744 | Inge Bethke | Jan Bergstra, Inge Bethke and Mark Burgess | A process algebra based framework for promise theory | 9 pages, 4 figures | null | null | PRG0701 | cs.LO | null | We present a process algebra based approach to formalize the interactions of
computing devices such as the representation of policies and the resolution of
conflicts. As an example we specify how promises may be used in coming to an
agreement regarding a simple though practical transportation problem.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 09:39:14 GMT"
}
] | 2007-07-06T00:00:00 | [
[
"Bergstra",
"Jan",
""
],
[
"Bethke",
"Inge",
""
],
[
"Burgess",
"Mark",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.0745 | Richard McClatchey | K. Munir, M. Odeh, R. McClatchey, S. Khan, I. Habib | Semantic Information Retrieval from Distributed Heterogeneous Data
Sources | 6 pages, 3 figures. Presented at the 4th International Workshop on
Frontiers of Information Technology -- FIT 2006. Islamabad, Pakistan December
2006 | null | null | null | cs.DB | null | Information retrieval from distributed heterogeneous data sources remains a
challenging issue. As the number of data sources increases more intelligent
retrieval techniques, focusing on information content and semantics, are
required. Currently ontologies are being widely used for managing semantic
knowledge, especially in the field of bioinformatics. In this paper we describe
an ontology assisted system that allows users to query distributed
heterogeneous data sources by hiding details like location, information
structure, access pattern and semantic structure of the data. Our goal is to
provide an integrated view on biomedical information sources for the
Health-e-Child project with the aim to overcome the lack of sufficient
semantic-based reformulation techniques for querying distributed data sources.
In particular, this paper examines the problem of query reformulation across
biomedical data sources, based on merged ontologies and the underlying
heterogeneous descriptions of the respective data sources.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 09:40:19 GMT"
}
] | 2007-07-06T00:00:00 | [
[
"Munir",
"K.",
""
],
[
"Odeh",
"M.",
""
],
[
"McClatchey",
"R.",
""
],
[
"Khan",
"S.",
""
],
[
"Habib",
"I.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0707.0748 | Richard McClatchey | F. Estrella, T. Hauer, R. McClatchey, M. Odeh, D Rogulin, T.
Solomonides | Experiences of Engineering Grid-Based Medical Software | 18 pages, 2 tables, 5 figures. In press International Journal of
Medical Informatics. Elsevier publishers | null | null | null | cs.DC | null | Objectives: Grid-based technologies are emerging as potential solutions for
managing and collaborating distributed resources in the biomedical domain. Few
examples exist, however, of successful implementations of Grid-enabled medical
systems and even fewer have been deployed for evaluation in practice. The
objective of this paper is to evaluate the use in clinical practice of a
Grid-based imaging prototype and to establish directions for engineering future
medical Grid developments and their subsequent deployment. Method: The
MammoGrid project has deployed a prototype system for clinicians using the Grid
as its information infrastructure. To assist in the specification of the system
requirements (and for the first time in healthgrid applications), use-case
modelling has been carried out in close collaboration with clinicians and
radiologists who had no prior experience of this modelling technique. A
critical qualitative and, where possible, quantitative analysis of the
MammoGrid prototype is presented leading to a set of recommendations from the
delivery of the first deployed Grid-based medical imaging application. Results:
We report critically on the application of software engineering techniques in
the specification and implementation of the MammoGrid project and show that
use-case modelling is a suitable vehicle for representing medical requirements
and for communicating effectively with the clinical community. This paper also
discusses the practical advantages and limitations of applying the Grid to
real-life clinical applications and presents the consequent lessons learned.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 10:06:41 GMT"
}
] | 2007-07-06T00:00:00 | [
[
"Estrella",
"F.",
""
],
[
"Hauer",
"T.",
""
],
[
"McClatchey",
"R.",
""
],
[
"Odeh",
"M.",
""
],
[
"Rogulin",
"D",
""
],
[
"Solomonides",
"T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0707.0761 | Richard McClatchey | David Manset, Herve Verjus, Richard McClatchey | Managing Separation of Concerns in Grid Applications Through
Architectural Model Transformations | 4 pages, 2 figures. Presented at the First European Conference on
Software Architectures (ECSA 2007). Madrid, Spain September 24-26, 2007 | null | null | null | cs.SE cs.DC | null | Grids enable the aggregation, virtualization and sharing of massive
heterogeneous and geographically dispersed resources, using files, applications
and storage devices, to solve computation and data intensive problems, across
institutions and countries via temporary collaborations called virtual
organizations (VO). Most implementations result in complex superposition of
software layers, often delivering low quality of service and quality of
applications. As a consequence, Grid-based applications design and development
is increasingly complex, and the use of most classical engineering practices is
unsuccessful. Not only is the development of such applications a
time-consuming, error prone and expensive task, but also the resulting
applications are often hard-coded for specific Grid configurations, platforms
and infra-structures. Having neither guidelines nor rules in the design of a
Grid-based application is a paradox since there are many existing architectural
approaches for distributed computing, which could ease and promote rigorous
engineering methods based on the re-use of software components. It is our
belief that ad-hoc and semi-formal engineer-ing approaches, in current use, are
insufficient to tackle tomorrows Grid develop-ments requirements. Because
Grid-based applications address multi-disciplinary and complex domains (health,
military, scientific computation), their engineering requires rigor and
control. This paper therefore advocates a formal model-driven engineering
process and corresponding design framework and tools for building the next
generation of Grids.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 11:10:03 GMT"
}
] | 2007-07-06T00:00:00 | [
[
"Manset",
"David",
""
],
[
"Verjus",
"Herve",
""
],
[
"McClatchey",
"Richard",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0707.0762 | Richard McClatchey | Irfan Habib, Kamran Soomro, Ashiq Anjum, Richard McClatchey, Arshad
Ali, Peter Bloodsworth | PhantomOS: A Next Generation Grid Operating System | 8 pages, 6 figures. Presented at the UK eScience All Hands Meeting
2007 (AHM07). Nottingham, UK. September 2007 | null | null | null | cs.DC | null | Grid Computing has made substantial advances in the past decade; these are
primarily due to the adoption of standardized Grid middleware. However Grid
computing has not yet become pervasive because of some barriers that we believe
have been caused by the adoption of middleware centric approaches. These
barriers include: scant support for major types of applications such as
interactive applications; lack of flexible, autonomic and scalable Grid
architectures; lack of plug-and-play Grid computing and, most importantly, no
straightforward way to setup and administer Grids. PhantomOS is a project which
aims to address many of these barriers. Its goal is the creation of a user
friendly pervasive Grid computing platform that facilitates the rapid
deployment and easy maintenance of Grids whilst providing support for major
types of applications on Grids of almost any topology. In this paper we present
the detailed system architecture and an overview of its implementation.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 11:14:45 GMT"
}
] | 2007-07-06T00:00:00 | [
[
"Habib",
"Irfan",
""
],
[
"Soomro",
"Kamran",
""
],
[
"Anjum",
"Ashiq",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Ali",
"Arshad",
""
],
[
"Bloodsworth",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0707.0763 | Richard McClatchey | Ashiq Anjum, Peter Bloodsworth, Andrew Branson, Tamas Hauer, Richard
McClatchey, Kamran Munir, Dmitry Rogulin, Jetendr Shamdasani | The Requirements for Ontologies in Medical Data Integration: A Case
Study | 6 pages, 1 figure. Presented at the 11th International Database
Engineering & Applications Symposium (Ideas2007). Banff, Canada September
2007 | null | null | null | cs.DB | null | Evidence-based medicine is critically dependent on three sources of
information: a medical knowledge base, the patients medical record and
knowledge of available resources, including where appropriate, clinical
protocols. Patient data is often scattered in a variety of databases and may,
in a distributed model, be held across several disparate repositories.
Consequently addressing the needs of an evidence-based medicine community
presents issues of biomedical data integration, clinical interpretation and
knowledge management. This paper outlines how the Health-e-Child project has
approached the challenge of requirements specification for (bio-) medical data
integration, from the level of cellular data, through disease to that of
patient and population. The approach is illuminated through the requirements
elicitation and analysis of Juvenile Idiopathic Arthritis (JIA), one of three
diseases being studied in the EC-funded Health-e-Child project.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 11:21:39 GMT"
}
] | 2007-07-06T00:00:00 | [
[
"Anjum",
"Ashiq",
""
],
[
"Bloodsworth",
"Peter",
""
],
[
"Branson",
"Andrew",
""
],
[
"Hauer",
"Tamas",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Munir",
"Kamran",
""
],
[
"Rogulin",
"Dmitry",
""
],
[
"Shamdasani",
"Jetendr",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0707.0764 | Branko Dragovich | Branko Dragovich and Alexandra Dragovich | p-Adic Degeneracy of the Genetic Code | 11 pages, 1 table. Published in the Proceedings of '4th Summer School
in Modern Mathematcal Physics', September 2006, Belgrade (Serbia) | SFIN XX A1 (2007) 179-188 | null | null | q-bio.GN cs.IT math.IT physics.bio-ph | null | Degeneracy of the genetic code is a biological way to minimize effects of the
undesirable mutation changes. Degeneration has a natural description on the
5-adic space of 64 codons $\mathcal{C}_5 (64) = \{n_0 + n_1 5 + n_2 5^2
: n_i = 1, 2, 3, 4 \} ,$ where $n_i$ are digits related to nucleotides as
follows: C = 1, A = 2, T = U = 3, G = 4. The smallest 5-adic distance between
codons joins them into 16 quadruplets, which under 2-adic distance decay into
32 doublets. p-Adically close codons are assigned to one of 20 amino acids,
which are building blocks of proteins, or code termination of protein
synthesis. We shown that genetic code multiplets are made of the p-adic nearest
codons.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 11:40:53 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Dragovich",
"Branko",
""
],
[
"Dragovich",
"Alexandra",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.bio-ph",
"description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.",
"span": "(Biological Physics)"
}
] |
0707.0785 | Matthieu Picantin | Matthieu Picantin (LIAFA) | Garside monoids vs divisibility monoids | null | null | null | null | math.GR cs.DM | null | Divisibility monoids (resp. Garside monoids) are a natural algebraic
generalization of Mazurkiewicz trace monoids (resp. spherical Artin monoids),
namely monoids in which the distributivity of the underlying lattices (resp.
the existence of common multiples) is kept as an hypothesis, but the relations
between the generators are not supposed to necessarily be commutations (resp.
be of Coxeter type). Here, we show that the quasi-center of these monoids can
be studied and described similarly, and then we exhibit the intersection
between the two classes of monoids.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 13:53:18 GMT"
}
] | 2007-07-06T00:00:00 | [
[
"Picantin",
"Matthieu",
"",
"LIAFA"
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.0796 | Alessandro Nordio | A. Nordio, C.-F. Chiasserini, E. Viterbo | Performance of Linear Field Reconstruction Techniques with Noise and
Uncertain Sensor Locations | null | null | 10.1109/TSP.2008.924865 | null | cs.OH | null | We consider a wireless sensor network, sampling a bandlimited field,
described by a limited number of harmonics. Sensor nodes are irregularly
deployed over the area of interest or subject to random motion; in addition
sensors measurements are affected by noise. Our goal is to obtain a high
quality reconstruction of the field, with the mean square error (MSE) of the
estimate as performance metric. In particular, we analytically derive the
performance of several reconstruction/estimation techniques based on linear
filtering. For each technique, we obtain the MSE, as well as its asymptotic
expression in the case where the field number of harmonics and the number of
sensors grow to infinity, while their ratio is kept constant. Through numerical
simulations, we show the validity of the asymptotic analysis, even for a small
number of sensors. We provide some novel guidelines for the design of sensor
networks when many parameters, such as field bandwidth, number of sensors,
reconstruction quality, sensor motion characteristics, and noise level of the
measures, have to be traded off.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 14:58:24 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Nordio",
"A.",
""
],
[
"Chiasserini",
"C. -F.",
""
],
[
"Viterbo",
"E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0707.0799 | Xinjia Chen | Xinjia Chen, Kemin Zhou and Jorge Aravena | A New Family of Unitary Space-Time Codes with a Fast Parallel Sphere
Decoder Algorithm | 66 pages, 7 figures | IEEE Transactions on Information Theory, vol. 52, pp. 115-140,
January 2006 | null | null | cs.IT math.IT | null | In this paper we propose a new design criterion and a new class of unitary
signal constellations for differential space-time modulation for
multiple-antenna systems over Rayleigh flat-fading channels with unknown fading
coefficients. Extensive simulations show that the new codes have significantly
better performance than existing codes. We have compared the performance of our
codes with differential detection schemes using orthogonal design, Cayley
differential codes, fixed-point-free group codes and product of groups and for
the same bit error rate, our codes allow smaller signal to noise ratio by as
much as 10 dB. The design of the new codes is accomplished in a systematic way
through the optimization of a performance index that closely describes the bit
error rate as a function of the signal to noise ratio. The new performance
index is computationally simple and we have derived analytical expressions for
its gradient with respect to constellation parameters. Decoding of the proposed
constellations is reduced to a set of one-dimensional closest point problems
that we solve using parallel sphere decoder algorithms. This decoding strategy
can also improve efficiency of existing codes.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 19:01:53 GMT"
}
] | 2008-05-12T00:00:00 | [
[
"Chen",
"Xinjia",
""
],
[
"Zhou",
"Kemin",
""
],
[
"Aravena",
"Jorge",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0802 | Patricia Reynier | Dinu Coltuc, Jean-Marc Chassery (GIPSA-lab) | Very fast watermarking by reversible contrast mapping | null | IEEE Signal Processing Letters 14, 4 (04/2007) pp 255-258 | 10.1109/LSP.2006.884895 | null | cs.MM cs.CR cs.CV cs.IT math.IT | null | Reversible contrast mapping (RCM) is a simple integer transform that applies
to pairs of pixels. For some pairs of pixels, RCM is invertible, even if the
least significant bits (LSBs) of the transformed pixels are lost. The data
space occupied by the LSBs is suitable for data hiding. The embedded
information bit-rates of the proposed spatial domain reversible watermarking
scheme are close to the highest bit-rates reported so far. The scheme does not
need additional data compression, and, in terms of mathematical complexity, it
appears to be the lowest complexity one proposed up to now. A very fast lookup
table implementation is proposed. Robustness against cropping can be ensured as
well.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 15:11:24 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Coltuc",
"Dinu",
"",
"GIPSA-lab"
],
[
"Chassery",
"Jean-Marc",
"",
"GIPSA-lab"
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0805 | Xinjia Chen | Xinjia Chen | A New Generalization of Chebyshev Inequality for Random Vectors | 7 pages, 1 figure; added some references | null | null | null | math.ST cs.LG math.PR stat.AP stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, we derive a new generalization of Chebyshev inequality for
random vectors. We demonstrate that the new generalization is much less
conservative than the classical generalization.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 15:28:05 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Jun 2011 15:08:17 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Chen",
"Xinjia",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0707.0808 | Patrick C. McGuire | Alexandra Bartolo, Patrick C. McGuire, Kenneth P. Camilleri,
Christopher Spiteri, Jonathan C. Borg, Philip J. Farrugia, Jens Ormo, Javier
Gomez-Elvira, Jose Antonio Rodriguez-Manfredi, Enrique Diaz-Martinez, Helge
Ritter, Robert Haschke, Markus Oesker, Joerg Ontrup | The Cyborg Astrobiologist: Porting from a wearable computer to the
Astrobiology Phone-cam | 15 pages, 4 figures, accepted for publication in the International
Journal of Astrobiology | International Journal of Astrobiology, vol. 6, issue 4, pp.
255-261 (2007) | 10.1017/S1473550407003862 | null | cs.CV astro-ph cs.AI cs.CE cs.HC cs.NI cs.RO cs.SE | null | We have used a simple camera phone to significantly improve an `exploration
system' for astrobiology and geology. This camera phone will make it much
easier to develop and test computer-vision algorithms for future planetary
exploration. We envision that the `Astrobiology Phone-cam' exploration system
can be fruitfully used in other problem domains as well.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 15:19:37 GMT"
}
] | 2010-01-08T00:00:00 | [
[
"Bartolo",
"Alexandra",
""
],
[
"McGuire",
"Patrick C.",
""
],
[
"Camilleri",
"Kenneth P.",
""
],
[
"Spiteri",
"Christopher",
""
],
[
"Borg",
"Jonathan C.",
""
],
[
"Farrugia",
"Philip J.",
""
],
[
"Ormo",
"Jens",
""
],
[
"Gomez-Elvira",
"Javier",
""
],
[
"Rodriguez-Manfredi",
"Jose Antonio",
""
],
[
"Diaz-Martinez",
"Enrique",
""
],
[
"Ritter",
"Helge",
""
],
[
"Haschke",
"Robert",
""
],
[
"Oesker",
"Markus",
""
],
[
"Ontrup",
"Joerg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
null,
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0707.0860 | Mohammad Asad Rehman Chaudhry | Salim Y. El Rouayheb, Mohammad Asad R. Chaudhry, and Alex Sprintson | On the Minimum Number of Transmissions in Single-Hop Wireless Coding
Networks | 6 pages | null | null | null | cs.IT cs.NI math.IT | null | The advent of network coding presents promising opportunities in many areas
of communication and networking. It has been recently shown that network coding
technique can significantly increase the overall throughput of wireless
networks by taking advantage of their broadcast nature. In wireless networks,
each transmitted packet is broadcasted within a certain area and can be
overheard by the neighboring nodes. When a node needs to transmit packets, it
employs the opportunistic coding approach that uses the knowledge of what the
node's neighbors have heard in order to reduce the number of transmissions.
With this approach, each transmitted packet is a linear combination of the
original packets over a certain finite field.
In this paper, we focus on the fundamental problem of finding the optimal
encoding for the broadcasted packets that minimizes the overall number of
transmissions. We show that this problem is NP-complete over GF(2) and
establish several fundamental properties of the optimal solution. We also
propose a simple heuristic solution for the problem based on graph coloring and
present some empirical results for random settings.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 19:58:23 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Rouayheb",
"Salim Y. El",
""
],
[
"Chaudhry",
"Mohammad Asad R.",
""
],
[
"Sprintson",
"Alex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0862 | Richard McClatchey | Richard McClatchey, Ashiq Anjum, Heinz Stockinger, Arshad Ali, Ian
Willers, Michael Thomas | Scheduling in Data Intensive and Network Aware (DIANA) Grid Environments | 22 pages, 14 figures. Early draft of paper to be submitted to Journal
of Grid Computing | null | null | null | cs.DC | null | In Grids scheduling decisions are often made on the basis of jobs being
either data or computation intensive: in data intensive situations jobs may be
pushed to the data and in computation intensive situations data may be pulled
to the jobs. This kind of scheduling, in which there is no consideration of
network characteristics, can lead to performance degradation in a Grid
environment and may result in large processing queues and job execution delays
due to site overloads. In this paper we describe a Data Intensive and Network
Aware (DIANA) meta-scheduling approach, which takes into account data,
processing power and network characteristics when making scheduling decisions
across multiple sites. Through a practical implementation on a Grid testbed, we
demonstrate that queue and execution times of data-intensive jobs can be
significantly improved when we introduce our proposed DIANA scheduler. The
basic scheduling decisions are dictated by a weighting factor for each
potential target location which is a calculated function of network
characteristics, processing cycles and data location and size. The job
scheduler provides a global ranking of the computing resources and then selects
an optimal one on the basis of this overall access and execution cost. The
DIANA approach considers the Grid as a combination of active network elements
and takes network characteristics as a first class criterion in the scheduling
decision matrix along with computation and data. The scheduler can then make
informed decisions by taking into account the changing state of the network,
locality and size of the data and the pool of available processing cycles.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 19:46:51 GMT"
}
] | 2007-07-06T00:00:00 | [
[
"McClatchey",
"Richard",
""
],
[
"Anjum",
"Ashiq",
""
],
[
"Stockinger",
"Heinz",
""
],
[
"Ali",
"Arshad",
""
],
[
"Willers",
"Ian",
""
],
[
"Thomas",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0707.0871 | Gesualdo Scutari | Gesualdo Scutari, Daniel P. Palomar, and Sergio Barbarossa | Optimal Linear Precoding Strategies for Wideband Non-Cooperative Systems
based on Game Theory-Part II: Algorithms | Paper submitted to IEEE Transactions on Signal Processing, February
22, 2006. Revised March 26, 2007. Accepted June 5, 2007. To appear on IEEE
Transactions on Signal Processing, 2007 | null | 10.1109/TSP.2007.907808 | null | cs.IT cs.GT math.IT | null | In this two-part paper, we address the problem of finding the optimal
precoding/multiplexing scheme for a set of non-cooperative links sharing the
same physical resources, e.g., time and bandwidth. We consider two alternative
optimization problems: P.1) the maximization of mutual information on each
link, given constraints on the transmit power and spectral mask; and P.2) the
maximization of the transmission rate on each link, using finite order
constellations, under the same constraints as in P.1, plus a constraint on the
maximum average error probability on each link. Aiming at finding decentralized
strategies, we adopted as optimality criterion the achievement of a Nash
equilibrium and thus we formulated both problems P.1 and P.2 as strategic
noncooperative (matrix-valued) games. In Part I of this two-part paper, after
deriving the optimal structure of the linear transceivers for both games, we
provided a unified set of sufficient conditions that guarantee the uniqueness
of the Nash equilibrium. In this Part II, we focus on the achievement of the
equilibrium and propose alternative distributed iterative algorithms that solve
both games. Specifically, the new proposed algorithms are the following: 1) the
sequential and simultaneous iterative waterfilling based algorithms,
incorporating spectral mask constraints; 2) the sequential and simultaneous
gradient projection based algorithms, establishing an interesting link with
variational inequality problems. Our main contribution is to provide sufficient
conditions for the global convergence of all the proposed algorithms which,
although derived under stronger constraints, incorporating for example spectral
mask constraints, have a broader validity than the convergence conditions known
in the current literature for the sequential iterative waterfilling algorithm.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 20:15:04 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Scutari",
"Gesualdo",
""
],
[
"Palomar",
"Daniel P.",
""
],
[
"Barbarossa",
"Sergio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0878 | Xinjia Chen | Xinjia Chen, Jorge Aravena and Kemin Zhou | Risk Analysis in Robust Control -- Making the Case for Probabilistic
Robust Control | 22 pages, 2 figures | Proceedings of American Control Conference, pp. 1533-1538,
Portland, June 2005. | null | null | math.OC cs.SY math.ST stat.TH | null | This paper offers a critical view of the "worst-case" approach that is the
cornerstone of robust control design. It is our contention that a blind
acceptance of worst-case scenarios may lead to designs that are actually more
dangerous than designs based on probabilistic techniques with a built-in risk
factor. The real issue is one of modeling. If one accepts that no mathematical
model of uncertainties is perfect then a probabilistic approach can lead to
more reliable control even if it cannot guarantee stability for all possible
cases. Our presentation is based on case analysis. We first establish that
worst-case is not necessarily "all-encompassing." In fact, we show that for
some uncertain control problems to have a conventional robust control solution
it is necessary to make assumptions that leave out some feasible cases. Once we
establish that point, we argue that it is not uncommon for the risk of
unaccounted cases in worst-case design to be greater than that of the accepted
risk in a probabilistic approach. With an example, we quantify the risks and
show that worst-case can be significantly more risky. Finally, we join our
analysis with existing results on computational complexity and probabilistic
robustness to argue that the deterministic worst-case analysis is not
necessarily the better tool.
| [
{
"version": "v1",
"created": "Thu, 5 Jul 2007 21:09:00 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Chen",
"Xinjia",
""
],
[
"Aravena",
"Jorge",
""
],
[
"Zhou",
"Kemin",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0707.0890 | Martin Bunder | M. W. Bunder and W. M. J.Dekkers | Are there Hilbert-style Pure Type Systems? | Accepted in Logical Methods in Computer Science | Logical Methods in Computer Science, Volume 4, Issue 1 (January 7,
2008) lmcs:839 | 10.2168/LMCS-4(1:1)2008 | null | cs.LO | null | For many a natural deduction style logic there is a Hilbert-style logic that
is equivalent to it in that it has the same theorems (i.e. valid judgements
with empty contexts). For intuitionistic logic, the axioms of the equivalent
Hilbert-style logic can be propositions which are also known as the types of
the combinators I, K and S. Hilbert-style versions of illative combinatory
logic have formulations with axioms that are actual type statements for I, K
and S. As pure type systems (PTSs)are, in a sense, equivalent to systems of
illative combinatory logic, it might be thought that Hilbert-style PTSs (HPTSs)
could be based in a similar way. This paper shows that some PTSs have very
trivial equivalent HPTSs, with only the axioms as theorems and that for many
PTSs no equivalent HPTS can exist. Most commonly used PTSs belong to these two
classes. For some PTSs however, including lambda* and the PTS at the basis of
the proof assistant Coq, there is a nontrivial equivalent HPTS, with axioms
that are type statements for I, K and S.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2007 00:22:59 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Jan 2008 09:36:01 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Bunder",
"M. W.",
""
],
[
"Dekkers",
"W. M. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.0891 | Philip Fellman | Philip V. Fellman | The Nash Equilibrium Revisited: Chaos and Complexity Hidden in
Simplicity | 13 Pages, 5th International Conference on Complex Systems | InterJournal Complex Systems, 1013, 2004.
http://www.interjournal.org/ | null | null | cs.GT cs.CC | null | The Nash Equilibrium is a much discussed, deceptively complex, method for the
analysis of non-cooperative games. If one reads many of the commonly available
definitions the description of the Nash Equilibrium is deceptively simple in
appearance. Modern research has discovered a number of new and important
complex properties of the Nash Equilibrium, some of which remain as
contemporary conundrums of extraordinary difficulty and complexity. Among the
recently discovered features which the Nash Equilibrium exhibits under various
conditions are heteroclinic Hamiltonian dynamics, a very complex asymptotic
structure in the context of two-player bi-matrix games and a number of
computationally complex or computationally intractable features in other
settings. This paper reviews those findings and then suggests how they may
inform various market prediction strategies.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2007 00:55:01 GMT"
}
] | 2007-07-09T00:00:00 | [
[
"Fellman",
"Philip V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0707.0895 | Damian H. Zanette | Damian H. Zanette | Segmentation and Context of Literary and Musical Sequences | To appear in Complex Systems | null | null | null | cs.CL physics.data-an | null | We test a segmentation algorithm, based on the calculation of the
Jensen-Shannon divergence between probability distributions, to two symbolic
sequences of literary and musical origin. The first sequence represents the
successive appearance of characters in a theatrical play, and the second
represents the succession of tones from the twelve-tone scale in a keyboard
sonata. The algorithm divides the sequences into segments of maximal
compositional divergence between them. For the play, these segments are related
to changes in the frequency of appearance of different characters and in the
geographical setting of the action. For the sonata, the segments correspond to
tonal domains and reveal in detail the characteristic tonal progression of such
kind of musical composition.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2007 01:45:05 GMT"
}
] | 2007-07-09T00:00:00 | [
[
"Zanette",
"Damian H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0707.0909 | Jarmo Lund\'en | Jarmo Lund\'en, Visa Koivunen, Anu Huttunen, H. Vincent Poor | Spectrum Sensing in Cognitive Radios Based on Multiple Cyclic
Frequencies | To appear in the Proceedings of the Second International Conference
on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom),
Orlando, FL, USA, July 31-August 3, 2007 | null | null | null | cs.IT math.IT | null | Cognitive radios sense the radio spectrum in order to find unused frequency
bands and use them in an agile manner. Transmission by the primary user must be
detected reliably even in the low signal-to-noise ratio (SNR) regime and in the
face of shadowing and fading. Communication signals are typically
cyclostationary, and have many periodic statistical properties related to the
symbol rate, the coding and modulation schemes as well as the guard periods,
for example. These properties can be exploited in designing a detector, and for
distinguishing between the primary and secondary users' signals. In this paper,
a generalized likelihood ratio test (GLRT) for detecting the presence of
cyclostationarity using multiple cyclic frequencies is proposed. Distributed
decision making is employed by combining the quantized local test statistics
from many secondary users. User cooperation allows for mitigating the effects
of shadowing and provides a larger footprint for the cognitive radio system.
Simulation examples demonstrate the resulting performance gains in the low SNR
regime and the benefits of cooperative detection.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2007 07:06:16 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Lundén",
"Jarmo",
""
],
[
"Koivunen",
"Visa",
""
],
[
"Huttunen",
"Anu",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0926 | Yves Bertot | Yves Bertot (INRIA Sophia Antipolis) | Theorem proving support in programming language semantics | Propos\'e pour publication dans l'ouvrage \`a la m\'emoire de Gilles
Kahn | null | null | null | cs.LO cs.PL | null | We describe several views of the semantics of a simple programming language
as formal documents in the calculus of inductive constructions that can be
verified by the Coq proof system. Covered aspects are natural semantics,
denotational semantics, axiomatic semantics, and abstract interpretation.
Descriptions as recursive functions are also provided whenever suitable, thus
yielding a a verification condition generator and a static analyser that can be
run inside the theorem prover for use in reflective proofs. Extraction of an
interpreter from the denotational semantics is also described. All different
aspects are formally proved sound with respect to the natural semantics
specification.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2007 08:55:26 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Jul 2007 08:09:49 GMT"
}
] | 2007-07-10T00:00:00 | [
[
"Bertot",
"Yves",
"",
"INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0707.0969 | Yingbin Liang | Yingbin Liang, Venugopal V. Veeravalli, H. Vincent Poor | Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution | To appear in the IEEE Transactions on Information Theory - Special
Issue on Models, Theory and Codes for Relaying and Cooperation in
Communication Networks, Vol. 53, No. 10, October 2007 | null | null | null | cs.IT math.IT | null | As a basic information-theoretic model for fading relay channels, the
parallel relay channel is first studied, for which lower and upper bounds on
the capacity are derived. For the parallel relay channel with degraded
subchannels, the capacity is established, and is further demonstrated via the
Gaussian case, for which the synchronized and asynchronized capacities are
obtained. The capacity achieving power allocation at the source and relay nodes
among the subchannels is characterized. The fading relay channel is then
studied, for which resource allocations that maximize the achievable rates are
obtained for both the full-duplex and half-duplex cases. Capacities are
established for fading relay channels that satisfy certain conditions.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2007 13:48:54 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Liang",
"Yingbin",
""
],
[
"Veeravalli",
"Venugopal V.",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.0978 | Nadia Fawaz | Nadia Fawaz (1), David Gesbert (1), Merouane Debbah (2) ((1) Eurecom
Institute, (2) Supelec) | When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc
Network | 7 pages, 7 figures | null | null | null | cs.IT math.IT | null | We develop and analyze new cooperative strategies for ad hoc networks that
are more spectrally efficient than classical DF cooperative protocols. Using
analog network coding, our strategies preserve the practical half-duplex
assumption but relax the orthogonality constraint. The introduction of
interference due to non-orthogonality is mitigated thanks to precoding, in
particular Dirty Paper coding. Combined with smart power allocation, our
cooperation strategies allow to save time and lead to more efficient use of
bandwidth and to improved network throughput with respect to classical RDF/PDF.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2007 19:56:44 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Fawaz",
"Nadia",
""
],
[
"Gesbert",
"David",
""
],
[
"Debbah",
"Merouane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits