id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0706.3479
David Love
David Love
Hypocomputation
34 pages
null
null
null
cs.OH
null
Hypercomputational formal theories will, clearly, be both structurally and foundationally different from the formal theories underpinning computational theories. However, many of the maps that might guide us into this strange realm have been lost. So little work has been done recently in the area of metamathematics, and so many of the previous results have been folded into other theories, that we are in danger of loosing an appreciation of the broader structure of formal theories. As an aid to those looking to develop hypercomputational theories, we will briefly survey the known landmarks both inside and outside the borders of computational theory. We will not focus in this paper on why the structure of formal theory looks the way it does. Instead we will focus on what this structure looks like, moving from hypocomputational, through traditional computational theories, and then beyond to hypercomputational theories.
[ { "version": "v1", "created": "Sat, 23 Jun 2007 21:13:43 GMT" } ]
2011-11-10T00:00:00
[ [ "Love", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0706.3480
Soheil Mohajer
Soheil Mohajer and Ali Kakhbod
Tight Bounds on the Average Length, Entropy, and Redundancy of Anti-Uniform Huffman Codes
9 pages, 2 figures
IET Communications, vol. 5, no. 9, pp. 1213-1219, 2011
null
null
cs.IT math.IT
null
In this paper we consider the class of anti-uniform Huffman codes and derive tight lower and upper bounds on the average length, entropy, and redundancy of such codes in terms of the alphabet size of the source. The Fibonacci distributions are introduced which play a fundamental role in AUH codes. It is shown that such distributions maximize the average length and the entropy of the code for a given alphabet size. Another previously known bound on the entropy for given average length follows immediately from our results.
[ { "version": "v1", "created": "Sat, 23 Jun 2007 21:18:36 GMT" } ]
2012-07-27T00:00:00
[ [ "Mohajer", "Soheil", "" ], [ "Kakhbod", "Ali", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.3502
P Vijay Kumar
Petros Elia and P. Vijay Kumar
Approximately-Universal Space-Time Codes for the Parallel, Multi-Block and Cooperative-Dynamic-Decode-and-Forward Channels
null
null
null
null
cs.IT cs.DM cs.NI math.IT
null
Explicit codes are constructed that achieve the diversity-multiplexing gain tradeoff of the cooperative-relay channel under the dynamic decode-and-forward protocol for any network size and for all numbers of transmit and receive antennas at the relays. A particularly simple code construction that makes use of the Alamouti code as a basic building block is provided for the single relay case. Along the way, we prove that space-time codes previously constructed in the literature for the block-fading and parallel channels are approximately universal, i.e., they achieve the DMT for any fading distribution. It is shown how approximate universality of these codes leads to the first DMT-optimum code construction for the general, MIMO-OFDM channel.
[ { "version": "v1", "created": "Sun, 24 Jun 2007 07:47:57 GMT" }, { "version": "v2", "created": "Fri, 13 Jul 2007 12:43:51 GMT" } ]
2007-07-13T00:00:00
[ [ "Elia", "Petros", "" ], [ "Kumar", "P. Vijay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.3523
Olivier Finkel
Dominique Lecomte (UMR 7586), Olivier Finkel (LIP)
There Exist some Omega-Powers of Any Borel Rank
To appear in the Proceedings of the 16th EACSL Annual Conference on Computer Science and Logic, CSL 2007, Lausanne, Switzerland, September 11-15, 2007, Lecture Notes in Computer Science, (c) Springer, 2007
Dans Proceedings of the 16th EACSL Annual Conference on Computer Science and Logic, CSL 2007, - 16th EACSL Annual Conference on Computer Science and Logic, CSL 2007, September 11-15, 2007, Lausanne : Suisse
null
null
cs.LO cs.CC math.LO
null
Omega-powers of finitary languages are languages of infinite words (omega-languages) in the form V^omega, where V is a finitary language over a finite alphabet X. They appear very naturally in the characterizaton of regular or context-free omega-languages. Since the set of infinite words over a finite alphabet X can be equipped with the usual Cantor topology, the question of the topological complexity of omega-powers of finitary languages naturally arises and has been posed by Niwinski (1990), Simonnet (1992) and Staiger (1997). It has been recently proved that for each integer n > 0, there exist some omega-powers of context free languages which are Pi^0_n-complete Borel sets, that there exists a context free language L such that L^omega is analytic but not Borel, and that there exists a finitary language V such that V^omega is a Borel set of infinite rank. But it was still unknown which could be the possible infinite Borel ranks of omega-powers. We fill this gap here, proving the following very surprising result which shows that omega-powers exhibit a great topological complexity: for each non-null countable ordinal alpha, there exist some Sigma^0_alpha-complete omega-powers, and some Pi^0_alpha-complete omega-powers.
[ { "version": "v1", "created": "Mon, 25 Jun 2007 16:03:36 GMT" } ]
2008-03-12T00:00:00
[ [ "Lecomte", "Dominique", "", "UMR 7586" ], [ "Finkel", "Olivier", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0706.3546
Samer Al Kiswany
Samer Al Kiswany, Matei Ripeanu, Sudharshan S. Vazhkudai, Abdullah Gharaibeh
stdchk: A Checkpoint Storage System for Desktop Grid Computing
13 pages, 8 figures
null
null
null
cs.DC
null
Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that a dedicated checkpoint storage system, optimized to operate in these environments, can offer multiple benefits: reduce the load on a traditional file system, offer high-performance through specialization, and, finally, optimize data management by taking into account checkpoint application semantics. Such a storage system can present a unifying abstraction to checkpoint operations, while hiding the fact that there are no dedicated resources to store the checkpoint data. We prototype stdchk, a checkpoint storage system that uses scavenged disk space from participating desktops to build a low-cost storage system, offering a traditional file system interface for easy integration with applications. This paper presents the stdchk architecture, key performance optimizations, support for incremental checkpointing, and increased data availability. Our evaluation confirms that the stdchk approach is viable in a desktop grid setting and offers a low cost storage system with desirable performance characteristics: high write throughput and reduced storage space and network effort to save checkpoint images.
[ { "version": "v1", "created": "Mon, 25 Jun 2007 01:24:46 GMT" }, { "version": "v2", "created": "Fri, 23 Nov 2007 20:51:06 GMT" } ]
2011-11-10T00:00:00
[ [ "Kiswany", "Samer Al", "" ], [ "Ripeanu", "Matei", "" ], [ "Vazhkudai", "Sudharshan S.", "" ], [ "Gharaibeh", "Abdullah", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.3565
Anatoly Plotnikov
Anatoly D. Plotnikov
Experimental Algorithm for the Maximum Independent Set Problem
From author's book "Discrete mathematics",3-th ed., Moscow,New knowledge,2007, 18 pages, 8 figures
Cybernetics and Systems Analysis: Volume 48, Issue 5 (2012), Page 673-680
null
null
cs.DS
null
We develop an experimental algorithm for the exact solving of the maximum independent set problem. The algorithm consecutively finds the maximal independent sets of vertices in an arbitrary undirected graph such that the next such set contains more elements than the preceding one. For this purpose, we use a technique, developed by Ford and Fulkerson for the finite partially ordered sets, in particular, their method for partition of a poset into the minimum number of chains with finding the maximum antichain. In the process of solving, a special digraph is constructed, and a conjecture is formulated concerning properties of such digraph. This allows to offer of the solution algorithm. Its theoretical estimation of running time equals to is $O(n^{8})$, where $n$ is the number of graph vertices. The offered algorithm was tested by a program on random graphs. The testing the confirms correctness of the algorithm.
[ { "version": "v1", "created": "Mon, 25 Jun 2007 06:45:49 GMT" }, { "version": "v2", "created": "Mon, 2 Jul 2007 02:16:12 GMT" } ]
2016-03-02T00:00:00
[ [ "Plotnikov", "Anatoly D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0706.3639
Marcus Hutter
Shane Legg and Marcus Hutter
A Collection of Definitions of Intelligence
12 LaTeX pages
Frontiers in Artificial Intelligence and Applications, Vol.157 (2007) 17-24
null
IDSIA-07-07
cs.AI
null
This paper is a survey of a large number of informal definitions of ``intelligence'' that the authors have collected over the years. Naturally, compiling a complete list would be impossible as many definitions of intelligence are buried deep inside articles and books. Nevertheless, the 70-odd definitions presented here are, to the authors' knowledge, the largest and most well referenced collection there is.
[ { "version": "v1", "created": "Mon, 25 Jun 2007 13:40:56 GMT" } ]
2007-06-26T00:00:00
[ [ "Legg", "Shane", "" ], [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0706.3679
Yann Guermeur
Yann Guermeur (LORIA)
Scale-sensitive Psi-dimensions: the Capacity Measures for Classifiers Taking Values in R^Q
null
ASMDA 2007 (2007) 1-8
null
null
cs.LG
null
Bounds on the risk play a crucial role in statistical learning theory. They usually involve as capacity measure of the model studied the VC dimension or one of its extensions. In classification, such "VC dimensions" exist for models taking values in {0, 1}, {1,..., Q} and R. We introduce the generalizations appropriate for the missing case, the one of models with values in R^Q. This provides us with a new guaranteed risk for M-SVMs which appears superior to the existing one.
[ { "version": "v1", "created": "Mon, 25 Jun 2007 17:28:57 GMT" } ]
2007-06-26T00:00:00
[ [ "Guermeur", "Yann", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0706.3710
Shivratna Srinivasan
Shivratna Giri Srinivasan and Mahesh K. Varanasi
Optimal Constellations for the Low SNR Noncoherent MIMO Block Rayleigh Fading Channel
52 pages, to appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reliable communication over the discrete-input/continuous-output noncoherent multiple-input multiple-output (MIMO) Rayleigh block fading channel is considered when the signal-to-noise ratio (SNR) per degree of freedom is low. Two key problems are posed and solved to obtain the optimum discrete input. In both problems, the average and peak power per space-time slot of the input constellation are constrained. In the first one, the peak power to average power ratio (PPAPR) of the input constellation is held fixed, while in the second problem, the peak power is fixed independently of the average power. In the first PPAPR-constrained problem, the mutual information, which grows as O(SNR^2), is maximized up to second order in SNR. In the second peak-constrained problem, where the mutual information behaves as O(SNR), the structure of constellations that are optimal up to first order, or equivalently, that minimize energy/bit, are explicitly characterized. Furthermore, among constellations that are first-order optimal, those that maximize the mutual information up to second order, or equivalently, the wideband slope, are characterized. In both PPAPR-constrained and peak-constrained problems, the optimal constellations are obtained in closed-form as solutions to non-convex optimizations, and interestingly, they are found to be identical. Due to its special structure, the common solution is referred to as Space Time Orthogonal Rank one Modulation, or STORM. In both problems, it is seen that STORM provides a sharp characterization of the behavior of noncoherent MIMO capacity.
[ { "version": "v1", "created": "Mon, 25 Jun 2007 20:40:45 GMT" }, { "version": "v2", "created": "Wed, 27 Jun 2007 00:40:49 GMT" }, { "version": "v3", "created": "Mon, 22 Sep 2008 13:08:09 GMT" } ]
2008-09-22T00:00:00
[ [ "Srinivasan", "Shivratna Giri", "" ], [ "Varanasi", "Mahesh K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.3723
Tobias Ganzow
Tobias Ganzow and Sasha Rubin
Order-Invariant MSO is Stronger than Counting MSO in the Finite
Revised version contributed to STACS 2008
Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)
null
null
cs.LO
null
We compare the expressiveness of two extensions of monadic second-order logic (MSO) over the class of finite structures. The first, counting monadic second-order logic (CMSO), extends MSO with first-order modulo-counting quantifiers, allowing the expression of queries like ``the number of elements in the structure is even''. The second extension allows the use of an additional binary predicate, not contained in the signature of the queried structure, that must be interpreted as an arbitrary linear order on its universe, obtaining order-invariant MSO. While it is straightforward that every CMSO formula can be translated into an equivalent order-invariant MSO formula, the converse had not yet been settled. Courcelle showed that for restricted classes of structures both order-invariant MSO and CMSO are equally expressive, but conjectured that, in general, order-invariant MSO is stronger than CMSO. We affirm this conjecture by presenting a class of structures that is order-invariantly definable in MSO but not definable in CMSO.
[ { "version": "v1", "created": "Tue, 26 Jun 2007 12:16:18 GMT" }, { "version": "v2", "created": "Thu, 20 Mar 2008 16:48:20 GMT" } ]
2008-03-20T00:00:00
[ [ "Ganzow", "Tobias", "" ], [ "Rubin", "Sasha", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0706.3750
Federico Ardila
Federico Ardila and Elitza Maneva
Pruning Processes and a New Characterization of Convex Geometries
14 pages, 3 figures; the exposition has changed significantly from previous version
null
null
null
math.CO cs.DM math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a new characterization of convex geometries via a multivariate version of an identity that was originally proved by Maneva, Mossel and Wainwright for certain combinatorial objects arising in the context of the k-SAT problem. We thus highlight the connection between various characterizations of convex geometries and a family of removal processes studied in the literature on random structures.
[ { "version": "v1", "created": "Tue, 26 Jun 2007 02:41:09 GMT" }, { "version": "v2", "created": "Fri, 29 Jun 2007 19:19:11 GMT" }, { "version": "v3", "created": "Fri, 2 Nov 2007 01:29:58 GMT" }, { "version": "v4", "created": "Sun, 31 Aug 2008 16:52:05 GMT" } ]
2008-08-31T00:00:00
[ [ "Ardila", "Federico", "" ], [ "Maneva", "Elitza", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0706.3752
Ruoheng Liu
Ruoheng Liu, Yingbin Liang, H. Vincent Poor, and Predrag Spasojevic
Secure Nested Codes for Type II Wiretap Channels
To appear in the Proceedings of the 2007 IEEE Information Theory Workshop on Frontiers in Coding Theory, Lake Tahoe, CA, September 2-6, 2007
null
10.1109/ITW.2007.4313097
null
cs.IT cs.CR math.IT
null
This paper considers the problem of secure coding design for a type II wiretap channel, where the main channel is noiseless and the eavesdropper channel is a general binary-input symmetric-output memoryless channel. The proposed secure error-correcting code has a nested code structure. Two secure nested coding schemes are studied for a type II Gaussian wiretap channel. The nesting is based on cosets of a good code sequence for the first scheme and on cosets of the dual of a good code sequence for the second scheme. In each case, the corresponding achievable rate-equivocation pair is derived based on the threshold behavior of good code sequences. The two secure coding schemes together establish an achievable rate-equivocation region, which almost covers the secrecy capacity-equivocation region in this case study. The proposed secure coding scheme is extended to a type II binary symmetric wiretap channel. A new achievable perfect secrecy rate, which improves upon the previously reported result by Thangaraj et al., is derived for this channel.
[ { "version": "v1", "created": "Tue, 26 Jun 2007 03:57:34 GMT" } ]
2016-11-18T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Liang", "Yingbin", "" ], [ "Poor", "H. Vincent", "" ], [ "Spasojevic", "Predrag", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.3753
Ruoheng Liu
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, and H. Vincent Poor
Multiple Access Channels with Generalized Feedback and Confidential Messages
To appear in the Proceedings of the 2007 IEEE Information Theory Workshop on Frontiers in Coding Theory, Lake Tahoe, CA, September 2-6, 2007
null
10.1109/ITW.2007.4313144
null
cs.IT math.IT
null
This paper considers the problem of secret communication over a multiple access channel with generalized feedback. Two trusted users send independent confidential messages to an intended receiver, in the presence of a passive eavesdropper. In this setting, an active cooperation between two trusted users is enabled through using channel feedback in order to improve the communication efficiency. Based on rate-splitting and decode-and-forward strategies, achievable secrecy rate regions are derived for both discrete memoryless and Gaussian channels. Results show that channel feedback improves the achievable secrecy rates.
[ { "version": "v1", "created": "Tue, 26 Jun 2007 04:07:45 GMT" } ]
2016-11-18T00:00:00
[ [ "Tang", "Xiaojun", "" ], [ "Liu", "Ruoheng", "" ], [ "Spasojevic", "Predrag", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.3768
Luca Dall'Asta
Luca Dall'Asta
Dynamic Exploration of Networks: from general principles to the traceroute process
13 pages, 6 figures
null
10.1140/epjb/e2007-00326-9
null
physics.soc-ph cond-mat.dis-nn cs.NI physics.data-an
null
Dynamical processes taking place on real networks define on them evolving subnetworks whose topology is not necessarily the same of the underlying one. We investigate the problem of determining the emerging degree distribution, focusing on a class of tree-like processes, such as those used to explore the Internet's topology. A general theory based on mean-field arguments is proposed, both for single-source and multiple-source cases, and applied to the specific example of the traceroute exploration of networks. Our results provide a qualitative improvement in the understanding of dynamical sampling and of the interplay between dynamics and topology in large networks like the Internet.
[ { "version": "v1", "created": "Tue, 26 Jun 2007 08:00:09 GMT" } ]
2009-11-13T00:00:00
[ [ "Dall'Asta", "Luca", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0706.3812
Pierre Parrend
Pierre Parrend (INRIA Rh\^one-Alpes), St\'ephane Fr\'enot (INRIA Rh\^one-Alpes)
Java Components Vulnerabilities - An Experimental Classification Targeted at the OSGi Platform
null
null
null
null
cs.CR cs.OS
null
The OSGi Platform finds a growing interest in two different applications domains: embedded systems, and applications servers. However, the security properties of this platform are hardly studied, which is likely to hinder its use in production systems. This is all the more important that the dynamic aspect of OSGi-based applications, that can be extended at runtime, make them vulnerable to malicious code injection. We therefore perform a systematic audit of the OSGi platform so as to build a vulnerability catalog that intends to reference OSGi Vulnerabilities originating in the Core Specification, and in behaviors related to the use of the Java language. Standard Services are not considered. To support this audit, a Semi-formal Vulnerability Pattern is defined, that enables to uniquely characterize fundamental properties for each vulnerability, to include verbose description in the pattern, to reference known security protections, and to track the implementation status of the proof-of-concept OSGi Bundles that exploit the vulnerability. Based on the analysis of the catalog, a robust OSGi Platform is built, and recommendations are made to enhance the OSGi Specifications.
[ { "version": "v1", "created": "Tue, 26 Jun 2007 12:36:37 GMT" }, { "version": "v2", "created": "Wed, 27 Jun 2007 08:03:05 GMT" }, { "version": "v3", "created": "Fri, 27 Jul 2007 13:50:46 GMT" } ]
2011-11-10T00:00:00
[ [ "Parrend", "Pierre", "", "INRIA Rhône-Alpes" ], [ "Frénot", "Stéphane", "", "INRIA\n Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0706.3834
Andrea Abrardo
A. Abrardo
Design of optimal convolutional codes for joint decoding of correlated sources in wireless sensor networks
regular paper, 24 pages 10 figures
null
null
null
cs.IT math.IT
null
We consider a wireless sensors network scenario where two nodes detect correlated sources and deliver them to a central collector via a wireless link. Differently from the Slepian-Wolf approach to distributed source coding, in the proposed scenario the sensing nodes do not perform any pre-compression of the sensed data. Original data are instead independently encoded by means of low-complexity convolutional codes. The decoder performs joint decoding with the aim of exploiting the inherent correlation between the transmitted sources. Complexity at the decoder is kept low thanks to the use of an iterative joint decoding scheme, where the output of each decoder is fed to the other decoder's input as a-priori information. For such scheme, we derive a novel analytical framework for evaluating an upper bound of joint-detection packet error probability and for deriving the optimum coding scheme. Experimental results confirm the validity of the analytical framework, and show that recursive codes allow a noticeable performance gain with respect to non-recursive coding schemes. Moreover, the proposed recursive coding scheme allows to approach the ideal Slepian-Wolf scheme performance in AWGN channel, and to clearly outperform it over fading channels on account of diversity gain due to correlation of information.
[ { "version": "v1", "created": "Tue, 26 Jun 2007 14:08:22 GMT" } ]
2007-07-13T00:00:00
[ [ "Abrardo", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.3846
Man-On Pun
Man-On Pun, Visa Koivunen and H. Vincent Poor
Opportunistic Scheduling and Beamforming for MIMO-SDMA Downlink Systems with Linear Combining
To appear in the Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Athens, Greece, September 3 - 7, 2007
null
10.1109/PIMRC.2007.4394179
null
cs.IT math.IT
null
Opportunistic scheduling and beamforming schemes are proposed for multiuser MIMO-SDMA downlink systems with linear combining in this work. Signals received from all antennas of each mobile terminal (MT) are linearly combined to improve the {\em effective} signal-to-noise-interference ratios (SINRs). By exploiting limited feedback on the effective SINRs, the base station (BS) schedules simultaneous data transmission on multiple beams to the MTs with the largest effective SINRs. Utilizing the extreme value theory, we derive the asymptotic system throughputs and scaling laws for the proposed scheduling and beamforming schemes with different linear combining techniques. Computer simulations confirm that the proposed schemes can substantially improve the system throughput.
[ { "version": "v1", "created": "Tue, 26 Jun 2007 15:33:32 GMT" } ]
2016-11-18T00:00:00
[ [ "Pun", "Man-On", "" ], [ "Koivunen", "Visa", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.3848
Vlady Ravelomanana
Jean Cardinal (ULB), Vlady Ravelomanana (LIPN), Mario Valencia-Pabon (LIPN)
Minimum Sum Edge Colorings of Multicycles
null
null
null
null
cs.DM
null
In the minimum sum edge coloring problem, we aim to assign natural numbers to edges of a graph, so that adjacent edges receive different numbers, and the sum of the numbers assigned to the edges is minimum. The {\em chromatic edge strength} of a graph is the minimum number of colors required in a minimum sum edge coloring of this graph. We study the case of multicycles, defined as cycles with parallel edges, and give a closed-form expression for the chromatic edge strength of a multicycle, thereby extending a theorem due to Berge. It is shown that the minimum sum can be achieved with a number of colors equal to the chromatic index. We also propose simple algorithms for finding a minimum sum edge coloring of a multicycle. Finally, these results are generalized to a large family of minimum cost coloring problems.
[ { "version": "v1", "created": "Tue, 26 Jun 2007 14:43:15 GMT" }, { "version": "v2", "created": "Tue, 22 Jan 2008 13:36:41 GMT" } ]
2008-01-22T00:00:00
[ [ "Cardinal", "Jean", "", "ULB" ], [ "Ravelomanana", "Vlady", "", "LIPN" ], [ "Valencia-Pabon", "Mario", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0706.3856
Jean-Luc Marichal
Jean-Luc Marichal, Pierre Mathonet
Approximations of Lovasz extensions and their induced interaction index
19 pages
Discrete Applied Mathematics 156 (1) (2008) 11-24
null
null
math.CO cs.DM
null
The Lovasz extension of a pseudo-Boolean function $f : \{0,1\}^n \to R$ is defined on each simplex of the standard triangulation of $[0,1]^n$ as the unique affine function $\hat f : [0,1]^n \to R$ that interpolates $f$ at the $n+1$ vertices of the simplex. Its degree is that of the unique multilinear polynomial that expresses $f$. In this paper we investigate the least squares approximation problem of an arbitrary Lovasz extension $\hat f$ by Lovasz extensions of (at most) a specified degree. We derive explicit expressions of these approximations. The corresponding approximation problem for pseudo-Boolean functions was investigated by Hammer and Holzman (1992) and then solved explicitly by Grabisch, Marichal, and Roubens (2000), giving rise to an alternative definition of Banzhaf interaction index. Similarly we introduce a new interaction index from approximations of $\hat f$ and we present some of its properties. It turns out that its corresponding power index identifies with the power index introduced by Grabisch and Labreuche (2001).
[ { "version": "v1", "created": "Tue, 26 Jun 2007 15:14:06 GMT" } ]
2010-11-19T00:00:00
[ [ "Marichal", "Jean-Luc", "" ], [ "Mathonet", "Pierre", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0706.3865
John Tomlin
Ralphe Wiggins and John A. Tomlin
Bid Optimization for Internet Graphical Ad Auction Systems via Special Ordered Sets
null
null
null
YR-2007-004
cs.DM
null
This paper describes an optimization model for setting bid levels for certain types of advertisements on web pages. This model is non-convex, but we are able to obtain optimal or near-optimal solutions rapidly using branch and cut open-source software. The financial benefits obtained using the prototype system have been substantial.
[ { "version": "v1", "created": "Tue, 26 Jun 2007 15:59:42 GMT" } ]
2007-06-27T00:00:00
[ [ "Wiggins", "Ralphe", "" ], [ "Tomlin", "John A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0706.3984
Ali Mesbah
Engin Bozdag, Ali Mesbah, Arie van Deursen
A Comparison of Push and Pull Techniques for Ajax
Conference: WSE 2007
null
null
null
cs.SE cs.PF
null
Ajax applications are designed to have high user interactivity and low user-perceived latency. Real-time dynamic web data such as news headlines, stock tickers, and auction updates need to be propagated to the users as soon as possible. However, Ajax still suffers from the limitations of the Web's request/response architecture which prevents servers from pushing real-time dynamic web data. Such applications usually use a pull style to obtain the latest updates, where the client actively requests the changes based on a predefined interval. It is possible to overcome this limitation by adopting a push style of interaction where the server broadcasts data when a change occurs on the server side. Both these options have their own trade-offs. This paper explores the fundamental limits of browser-based applications and analyzes push solutions for Ajax technology. It also shows the results of an empirical study comparing push and pull.
[ { "version": "v1", "created": "Wed, 27 Jun 2007 09:14:40 GMT" }, { "version": "v2", "created": "Thu, 16 Aug 2007 11:53:37 GMT" } ]
2007-08-16T00:00:00
[ [ "Bozdag", "Engin", "" ], [ "Mesbah", "Ali", "" ], [ "van Deursen", "Arie", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0706.4004
Ahmed Ait Ali
Ahmed Ait Ali (CRAN), Fabien Michaut (CRAN), Francis Lepage (CRAN)
End-to-End Available Bandwidth Measurement Tools : A Comparative Evaluation of Performances
null
IPS-MoMe 2006 IEEE /ACM International workshop on Internet Performance, Simulation, Monitoring and Measurement, Autriche (27/02/2005) 13
null
null
cs.NI
null
In recent years, there has been a strong interest in measuring the available bandwidth of network paths. Several methods and techniques have been proposed and various measurement tools have been developed and evaluated. However, there have been few comparative studies with regards to the actual performance of these tools. This paper presents a study of available bandwidth measurement techniques and undertakes a comparative analysis in terms of accuracy, intrusiveness and response time of active probing tools. Finally, measurement errors and the uncertainty of the tools are analysed and overall conclusions made.
[ { "version": "v1", "created": "Wed, 27 Jun 2007 11:51:36 GMT" } ]
2007-06-28T00:00:00
[ [ "Ali", "Ahmed Ait", "", "CRAN" ], [ "Michaut", "Fabien", "", "CRAN" ], [ "Lepage", "Francis", "", "CRAN" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0706.4009
Veronika Rehn-Sonigo
Anne Benoit (INRIA Rh\^one-Alpes, LIP), Veronika Rehn-Sonigo (INRIA Rh\^one-Alpes, LIP), Yves Robert (INRIA Rh\^one-Alpes, LIP)
Multi-criteria scheduling of pipeline workflows
null
null
null
null
cs.DC
null
Mapping workflow applications onto parallel platforms is a challenging problem, even for simple application patterns such as pipeline graphs. Several antagonist criteria should be optimized, such as throughput and latency (or a combination). In this paper, we study the complexity of the bi-criteria mapping problem for pipeline graphs on communication homogeneous platforms. In particular, we assess the complexity of the well-known chains-to-chains problem for different-speed processors, which turns out to be NP-hard. We provide several efficient polynomial bi-criteria heuristics, and their relative performance is evaluated through extensive simulations.
[ { "version": "v1", "created": "Wed, 27 Jun 2007 13:43:16 GMT" }, { "version": "v2", "created": "Thu, 28 Jun 2007 15:20:26 GMT" } ]
2007-06-28T00:00:00
[ [ "Benoit", "Anne", "", "INRIA Rhône-Alpes, LIP" ], [ "Rehn-Sonigo", "Veronika", "", "INRIA\n Rhône-Alpes, LIP" ], [ "Robert", "Yves", "", "INRIA Rhône-Alpes, LIP" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.4015
Franck Petit
Christian Boulinier (LaRIA), Franck Petit (LaRIA)
Self-Stabilizing Wavelets and r-Hops Coordination
null
Rapport Interne (01/04/2007)
null
null
cs.DC
null
We introduce a simple tool called the wavelet (or, r-wavelet) scheme. Wavelets deals with coordination among processes which are at most r hops away of each other. We present a selfstabilizing solution for this scheme. Our solution requires no underlying structure and works in arbritrary anonymous networks, i.e., no process identifier is required. Moreover, our solution works under any (even unfair) daemon. Next, we use the wavelet scheme to design self-stabilizing layer clocks. We show that they provide an efficient device in the design of local coordination problems at distance r, i.e., r-barrier synchronization and r-local resource allocation (LRA) such as r-local mutual exclusion (LME), r-group mutual exclusion (GME), and r-Reader/Writers. Some solutions to the r-LRA problem (e.g., r-LME) also provide transformers to transform algorithms written assuming any r-central daemon into algorithms working with any distributed daemon.
[ { "version": "v1", "created": "Wed, 27 Jun 2007 12:53:06 GMT" } ]
2007-06-28T00:00:00
[ [ "Boulinier", "Christian", "", "LaRIA" ], [ "Petit", "Franck", "", "LaRIA" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.4035
Sapon Tanachaiwiwat
Sapon Tanachaiwiwat, Ahmed Helmy
Encounter-based worms: Analysis and Defense
Submitted to a journal
null
null
null
cs.NI cs.CR
null
Encounter-based network is a frequently-disconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information disseminations. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. We propose the worm interaction approach that relies upon automated beneficial worm generation aiming to alleviate problems of worm propagations in such networks. To understand the dynamic of worm interactions and its performance, we mathematically model worm interactions based on major worm interaction factors including worm interaction types, network characteristics, and node characteristics using ordinary differential equations and analyze their effects on our proposed metrics. We validate our proposed model using extensive synthetic and trace-driven simulations. We find that, all worm interaction factors significantly affect the pattern of worm propagations. For example, immunization linearly decreases the infection of susceptible nodes while on-off behavior only impacts the duration of infection. Using realistic mobile network measurements, we find that encounters are bursty, multi-group and non-uniform. The trends from the trace-driven simulations are consistent with the model, in general. Immunization and timely deployment seem to be the most effective to counter the worm attacks in such scenarios while cooperation may help in a specific case. These findings provide insight that we hope would aid to develop counter-worm protocols in future encounter-based networks.
[ { "version": "v1", "created": "Wed, 27 Jun 2007 18:01:50 GMT" } ]
2007-06-28T00:00:00
[ [ "Tanachaiwiwat", "Sapon", "" ], [ "Helmy", "Ahmed", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0706.4038
Frederic Vivien
Matthieu Gallet (LIP, INRIA Rh\^one-Alpes), Yves Robert (LIP, INRIA Rh\^one-Alpes), Fr\'ed\'eric Vivien (LIP, INRIA Rh\^one-Alpes)
Scheduling multiple divisible loads on a linear processor network
null
null
null
null
cs.DC
null
Min, Veeravalli, and Barlas have recently proposed strategies to minimize the overall execution time of one or several divisible loads on a heterogeneous linear network, using one or more installments. We show on a very simple example that their approach does not always produce a solution and that, when it does, the solution is often suboptimal. We also show how to find an optimal schedule for any instance, once the number of installments per load is given. Then, we formally state that any optimal schedule has an infinite number of installments under a linear cost model as the one assumed in the original papers. Therefore, such a cost model cannot be used to design practical multi-installment strategies. Finally, through extensive simulations we confirmed that the best solution is always produced by the linear programming approach, while solutions of the original papers can be far away from the optimal.
[ { "version": "v1", "created": "Wed, 27 Jun 2007 14:43:13 GMT" }, { "version": "v2", "created": "Thu, 28 Jun 2007 15:02:05 GMT" } ]
2007-06-28T00:00:00
[ [ "Gallet", "Matthieu", "", "LIP, INRIA Rhône-Alpes" ], [ "Robert", "Yves", "", "LIP, INRIA\n Rhône-Alpes" ], [ "Vivien", "Frédéric", "", "LIP, INRIA Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.4044
Lutz Schr\"oder
Lutz Schr\"oder and Dirk Pattinson
PSPACE Bounds for Rank-1 Modal Logics
null
ACM Transactions on Computational Logic 10 (2:13), pp. 1-33, 2009
10.1145/1462179.1462185
Imperial College TR 2007/4
cs.LO cs.CC
null
For lack of general algorithmic methods that apply to wide classes of logics, establishing a complexity bound for a given modal logic is often a laborious task. The present work is a step towards a general theory of the complexity of modal logics. Our main result is that all rank-1 logics enjoy a shallow model property and thus are, under mild assumptions on the format of their axiomatisation, in PSPACE. This leads to a unified derivation of tight PSPACE-bounds for a number of logics including K, KD, coalition logic, graded modal logic, majority logic, and probabilistic modal logic. Our generic algorithm moreover finds tableau proofs that witness pleasant proof-theoretic properties including a weak subformula property. This generality is made possible by a coalgebraic semantics, which conveniently abstracts from the details of a given model class and thus allows covering a broad range of logics in a uniform way.
[ { "version": "v1", "created": "Wed, 27 Jun 2007 15:15:57 GMT" } ]
2011-01-18T00:00:00
[ [ "Schröder", "Lutz", "" ], [ "Pattinson", "Dirk", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0706.4048
Michael Noble S.
Michael S. Noble
Getting More From Your Multicore: Exploiting OpenMP From An Open Source Numerical Scripting Language
15 pages, 16 figures; working paper, in preparation
null
null
null
cs.DC astro-ph
null
We introduce SLIRP, a module generator for the S-Lang numerical scripting language, with a focus on its vectorization capabilities. We demonstrate how both SLIRP and S-Lang were easily adapted to exploit the inherent parallelism of high-level mathematical languages with OpenMP, allowing general users to employ tightly-coupled multiprocessors in scriptable research calculations while requiring no special knowledge of parallel programming. Motivated by examples in the ISIS astrophysical modeling & analysis tool, performance figures are presented for several machine and compiler configurations, demonstrating beneficial speedups for real-world operations.
[ { "version": "v1", "created": "Wed, 27 Jun 2007 15:21:28 GMT" } ]
2007-06-28T00:00:00
[ [ "Noble", "Michael S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, null ]
0706.4095
Ilya Kapovich
Ilya Kapovich and Paul Schupp
Some Quantitative Aspects of Fractional Computability
null
null
null
null
math.GR cs.CC
null
Motivated by results on generic-case complexity in group theory, we apply the ideas of effective Baire category and effective measure theory to study complexity classes of functions which are "fractionally computable" by a partial algorithm. For this purpose it is crucial to specify an allowable effective density, $\delta$, of convergence for a partial algorithm. The set $\mathcal{FC}(\delta)$ consists of all total functions $ f: \Sigma^\ast \to \{0,1 \}$ where $\Sigma$ is a finite alphabet with $|\Sigma| \ge 2$ which are "fractionally computable at density $\delta$". The space $\mathcal{FC}(\delta) $ is effectively of the second category while any fractional complexity class, defined using $\delta$ and any computable bound $\beta$ with respect to an abstract Blum complexity measure, is effectively meager. A remarkable result of Kautz and Miltersen shows that relative to an algorithmically random oracle $A$, the relativized class $\mathcal{NP}^A$ does not have effective polynomial measure zero in $\mathcal{E}^A$, the relativization of strict exponential time. We define the class $\mathcal{UFP}^A$ of all languages which are fractionally decidable in polynomial time at ``a uniform rate'' by algorithms with an oracle for $A$. We show that this class does have effective polynomial measure zero in $\mathcal{E}^A$ for every oracle $A$. Thus relaxing the requirement of polynomial time decidability to hold only for a fraction of possible inputs does not compensate for the power of nondeterminism in the case of random oracles.
[ { "version": "v1", "created": "Wed, 27 Jun 2007 20:26:19 GMT" } ]
2007-06-30T00:00:00
[ [ "Kapovich", "Ilya", "" ], [ "Schupp", "Paul", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0706.4107
Mihai Patrascu
Gianni Franceschini, S. Muthukrishnan and Mihai Patrascu
Radix Sorting With No Extra Space
Full version of paper accepted to ESA 2007. (17 pages)
null
null
null
cs.DS
null
It is well known that n integers in the range [1,n^c] can be sorted in O(n) time in the RAM model using radix sorting. More generally, integers in any range [1,U] can be sorted in O(n sqrt{loglog n}) time. However, these algorithms use O(n) words of extra memory. Is this necessary? We present a simple, stable, integer sorting algorithm for words of size O(log n), which works in O(n) time and uses only O(1) words of extra memory on a RAM model. This is the integer sorting case most useful in practice. We extend this result with same bounds to the case when the keys are read-only, which is of theoretical interest. Another interesting question is the case of arbitrary c. Here we present a black-box transformation from any RAM sorting algorithm to a sorting algorithm which uses only O(1) extra space and has the same running time. This settles the complexity of in-place sorting in terms of the complexity of sorting.
[ { "version": "v1", "created": "Wed, 27 Jun 2007 22:04:40 GMT" } ]
2007-06-29T00:00:00
[ [ "Franceschini", "Gianni", "" ], [ "Muthukrishnan", "S.", "" ], [ "Patrascu", "Mihai", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0706.4161
Maurice Margenstern
Maurice Margenstern
The Domino Problem of the Hyperbolic Plane Is Undecidable
18 pages, This is a synthesis of previous deposits
The Bulletin of EATCS, 93(Oct.), (2007), 220-237
null
null
cs.CG cs.DM
null
In this paper, we prove that the general tiling problem of the hyperbolic plane is undecidable by proving a slightly stronger version using only a regular polygon as the basic shape of the tiles. The problem was raised by a paper of Raphael Robinson in 1971, in his famous simplified proof that the general tiling problem is undecidable for the Euclidean plane, initially proved by Robert Berger in 1966.
[ { "version": "v1", "created": "Thu, 28 Jun 2007 09:16:19 GMT" } ]
2008-04-19T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0706.4170
Alessandro Mirone
Alessandro Mirone
Hilbert++ Manual
null
null
null
null
cs.OH cond-mat.str-el
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present here an installation guide, a hand-on mini-tutorial through examples, and the theoretical foundations of the Hilbert++ code.
[ { "version": "v1", "created": "Thu, 28 Jun 2007 09:09:55 GMT" }, { "version": "v2", "created": "Sun, 1 Mar 2009 09:03:37 GMT" } ]
2009-03-03T00:00:00
[ [ "Mirone", "Alessandro", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Physics", "code": "cond-mat.str-el", "description": "Quantum magnetism, non-Fermi liquids, spin liquids, quantum criticality, charge density waves, metal-insulator transitions", "span": "(Strongly Correlated Electrons)" } ]
0706.4175
Cedric Adjih
Song Yean Cho (INRIA Rocquencourt), C\'edric Adjih (INRIA Rocquencourt), Philippe Jacquet (INRIA Rocquencourt)
Heuristics for Network Coding in Wireless Networks
null
null
null
null
cs.NI
null
Multicast is a central challenge for emerging multi-hop wireless architectures such as wireless mesh networks, because of its substantial cost in terms of bandwidth. In this report, we study one specific case of multicast: broadcasting, sending data from one source to all nodes, in a multi-hop wireless network. The broadcast we focus on is based on network coding, a promising avenue for reducing cost; previous work of ours showed that the performance of network coding with simple heuristics is asymptotically optimal: each transmission is beneficial to nearly every receiver. This is for homogenous and large networks of the plan. But for small, sparse or for inhomogeneous networks, some additional heuristics are required. This report proposes such additional new heuristics (for selecting rates) for broadcasting with network coding. Our heuristics are intended to use only simple local topology information. We detail the logic of the heuristics, and with experimental results, we illustrate the behavior of the heuristics, and demonstrate their excellent performance.
[ { "version": "v1", "created": "Thu, 28 Jun 2007 09:56:50 GMT" }, { "version": "v2", "created": "Wed, 4 Jul 2007 12:24:12 GMT" } ]
2009-04-16T00:00:00
[ [ "Cho", "Song Yean", "", "INRIA Rocquencourt" ], [ "Adjih", "Cédric", "", "INRIA\n Rocquencourt" ], [ "Jacquet", "Philippe", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0706.4224
Sergey Andreyev
Sergey Andreyev
User driven applications - new design paradigm
null
null
null
null
cs.GR cs.HC
null
Programs for complicated engineering and scientific tasks always have to deal with a problem of showing numerous graphical results. The limits of the screen space and often opposite requirements from different users are the cause of the infinite discussions between designers and users, but the source of this ongoing conflict is not in the level of interface design, but in the basic principle of current graphical output: user may change some views and details, but in general the output view is absolutely defined and fixed by the developer. Author was working for several years on the algorithm that will allow eliminating this problem thus allowing stepping from designer-driven applications to user-driven. Such type of applications in which user is deciding what, when and how to show on the screen, is the dream of scientists and engineers working on the analysis of the most complicated tasks. The new paradigm is based on movable and resizable graphics, and such type of graphics can be widely used not only for scientific and engineering applications.
[ { "version": "v1", "created": "Thu, 28 Jun 2007 13:19:04 GMT" } ]
2007-06-29T00:00:00
[ [ "Andreyev", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0706.4298
Christian Boulinier
Christian Boulinier (LaRIA)
Unison as a Self-Stabilizing Wave Stream Algorithm in Asynchronous Anonymous Networks
null
Rapport de recherche. (28/06/2007)
null
null
cs.DC
null
How to pass from local to global scales in anonymous networks? How to organize a selfstabilizing propagation of information with feedback. From the Angluin impossibility results, we cannot elect a leader in a general anonymous network. Thus, it is impossible to build a rooted spanning tree. Many problems can only be solved by probabilistic methods. In this paper we show how to use Unison to design a self-stabilizing barrier synchronization in an anonymous network. We show that the commuication structure of this barrier synchronization designs a self-stabilizing wave-stream, or pipelining wave, in anonymous networks. We introduce two variants of Wave: the strong waves and the wavelets. A strong wave can be used to solve the idempotent r-operator parametrized computation problem. A wavelet deals with k-distance computation. We show how to use Unison to design a self-stabilizing wave stream, a self-stabilizing strong wave stream and a self-stabilizing wavelet stream.
[ { "version": "v1", "created": "Thu, 28 Jun 2007 18:51:36 GMT" } ]
2007-06-29T00:00:00
[ [ "Boulinier", "Christian", "", "LaRIA" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.4323
Khalil Djelloul
Khalil Djelloul, Thi-bich-hanh Dao and Thom Fruehwirth
Theory of Finite or Infinite Trees Revisited
null
null
null
null
cs.LO cs.AI
null
We present in this paper a first-order axiomatization of an extended theory $T$ of finite or infinite trees, built on a signature containing an infinite set of function symbols and a relation $\fini(t)$ which enables to distinguish between finite or infinite trees. We show that $T$ has at least one model and prove its completeness by giving not only a decision procedure, but a full first-order constraint solver which gives clear and explicit solutions for any first-order constraint satisfaction problem in $T$. The solver is given in the form of 16 rewriting rules which transform any first-order constraint $\phi$ into an equivalent disjunction $\phi$ of simple formulas such that $\phi$ is either the formula $\true$ or the formula $\false$ or a formula having at least one free variable, being equivalent neither to $\true$ nor to $\false$ and where the solutions of the free variables are expressed in a clear and explicit way. The correctness of our rules implies the completeness of $T$. We also describe an implementation of our algorithm in CHR (Constraint Handling Rules) and compare the performance with an implementation in C++ and that of a recent decision procedure for decomposable theories.
[ { "version": "v1", "created": "Thu, 28 Jun 2007 21:18:19 GMT" } ]
2007-07-02T00:00:00
[ [ "Djelloul", "Khalil", "" ], [ "Dao", "Thi-bich-hanh", "" ], [ "Fruehwirth", "Thom", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0706.4375
Thierry Hamon
Thierry Hamon (LIPN), Adeline Nazarenko (LIPN), Thierry Poibeau (LIPN), Sophie Aubin (LIPN), Julien Derivi\`ere (LIPN)
A Robust Linguistic Platform for Efficient and Domain specific Web Content Analysis
null
Proceedings of RIAO 2007 (30/05/2007)
null
null
cs.AI
null
Web semantic access in specific domains calls for specialized search engines with enhanced semantic querying and indexing capacities, which pertain both to information retrieval (IR) and to information extraction (IE). A rich linguistic analysis is required either to identify the relevant semantic units to index and weight them according to linguistic specific statistical distribution, or as the basis of an information extraction process. Recent developments make Natural Language Processing (NLP) techniques reliable enough to process large collections of documents and to enrich them with semantic annotations. This paper focuses on the design and the development of a text processing platform, Ogmios, which has been developed in the ALVIS project. The Ogmios platform exploits existing NLP modules and resources, which may be tuned to specific domains and produces linguistically annotated documents. We show how the three constraints of genericity, domain semantic awareness and performance can be handled all together.
[ { "version": "v1", "created": "Fri, 29 Jun 2007 08:58:02 GMT" } ]
2007-07-02T00:00:00
[ [ "Hamon", "Thierry", "", "LIPN" ], [ "Nazarenko", "Adeline", "", "LIPN" ], [ "Poibeau", "Thierry", "", "LIPN" ], [ "Aubin", "Sophie", "", "LIPN" ], [ "Derivière", "Julien", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0706.4440
Craig Alan Feinstein
Craig Alan Feinstein
2-State 3-Symbol Universal Turing Machines Do Not Exist
1 page
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this brief note, we give a simple information-theoretic proof that 2-state 3-symbol universal Turing machines cannot possibly exist, unless one loosens the definition of "universal".
[ { "version": "v1", "created": "Fri, 29 Jun 2007 16:47:40 GMT" }, { "version": "v2", "created": "Thu, 5 Jul 2007 15:16:11 GMT" }, { "version": "v3", "created": "Mon, 27 Aug 2007 19:17:08 GMT" }, { "version": "v4", "created": "Thu, 30 Aug 2007 19:55:30 GMT" }, { "version": "v5", "created": "Fri, 9 Dec 2011 18:34:17 GMT" } ]
2011-12-12T00:00:00
[ [ "Feinstein", "Craig Alan", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0707.0050
Nicolas Bonneau
Nicolas Bonneau, M\'erouane Debbah, Eitan Altman, Are Hj{\o}rungnes
Non-atomic Games for Multi-User Systems
17 pages, 4 figures, submitted to IEEE JSAC Special Issue on ``Game Theory in Communication Systems''
null
10.1109/JSAC.2008.080903
null
cs.IT cs.GT math.IT
null
In this contribution, the performance of a multi-user system is analyzed in the context of frequency selective fading channels. Using game theoretic tools, a useful framework is provided in order to determine the optimal power allocation when users know only their own channel (while perfect channel state information is assumed at the base station). We consider the realistic case of frequency selective channels for uplink CDMA. This scenario illustrates the case of decentralized schemes, where limited information on the network is available at the terminal. Various receivers are considered, namely the Matched filter, the MMSE filter and the optimum filter. The goal of this paper is to derive simple expressions for the non-cooperative Nash equilibrium as the number of mobiles becomes large and the spreading length increases. To that end two asymptotic methodologies are combined. The first is asymptotic random matrix theory which allows us to obtain explicit expressions of the impact of all other mobiles on any given tagged mobile. The second is the theory of non-atomic games which computes good approximations of the Nash equilibrium as the number of mobiles grows.
[ { "version": "v1", "created": "Sat, 30 Jun 2007 09:53:16 GMT" } ]
2016-11-18T00:00:00
[ [ "Bonneau", "Nicolas", "" ], [ "Debbah", "Mérouane", "" ], [ "Altman", "Eitan", "" ], [ "Hjørungnes", "Are", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0181
Yuriy Bunyak
Yu. Bunyak and O. Bunyak
Location and Spectral Estimation of Weak Wave Packets on Noise Background
7 pages, 8 figures. Extended version of presentation in the conferences IMTC-2007
null
null
null
cs.CE
null
The method of location and spectral estimation of weak signals on a noise background is being considered. The method is based on the optimized on order and noise dispersion autoregressive model of a sought signal. A new approach of model order determination is being offered. Available estimation of the noise dispersion is close to the real one. The optimized model allows to define function of empirical data spectral and dynamic features changes. The analysis of the signal as dynamic invariant in respect of the linear shift transformation yields the function of model consistency. Use of these both functions enables to detect short-time and nonstationary wave packets at signal to noise ratio as from -20 dB and above.
[ { "version": "v1", "created": "Mon, 2 Jul 2007 09:47:33 GMT" } ]
2007-07-03T00:00:00
[ [ "Bunyak", "Yu.", "" ], [ "Bunyak", "O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0707.0234
Ketan Rajawat
Ketan Rajawat and Adrish Banerjee
Selection Relaying at Low Signal to Noise Ratios
null
null
null
null
cs.IT math.IT
null
Performance of cooperative diversity schemes at Low Signal to Noise Ratios (LSNR) was recently studied by Avestimehr et. al. [1] who emphasized the importance of diversity gain over multiplexing gain at low SNRs. It has also been pointed out that continuous energy transfer to the channel is necessary for achieving the max-flow min-cut bound at LSNR. Motivated by this we propose the use of Selection Decode and Forward (SDF) at LSNR and analyze its performance in terms of the outage probability. We also propose an energy optimization scheme which further brings down the outage probability.
[ { "version": "v1", "created": "Mon, 2 Jul 2007 14:08:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Rajawat", "Ketan", "" ], [ "Banerjee", "Adrish", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0282
Igor Razgon
Igor Razgon and Barry O'Sullivan
Directed Feedback Vertex Set is Fixed-Parameter Tractable
14 pages
null
null
null
cs.DS cs.CC
null
We resolve positively a long standing open question regarding the fixed-parameter tractability of the parameterized Directed Feedback Vertex Set problem. In particular, we propose an algorithm which solves this problem in $O(8^kk!*poly(n))$.
[ { "version": "v1", "created": "Mon, 2 Jul 2007 17:56:53 GMT" } ]
2007-07-03T00:00:00
[ [ "Razgon", "Igor", "" ], [ "O'Sullivan", "Barry", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0707.0285
Edwin Hammerich
Edwin Hammerich
A Generalized Sampling Theorem for Frequency Localized Signals
20 pages, extended version of talk at International Workshop on Sampling Theory and Applications SampTA07, Thessaloniki, Greece, June 1-5, 2007. Submitted to Sampl. Theory Signal Image Process
Sampl. Theory Signal Image Process., Vol. 8, No. 2, May 2009, pp. 127-146
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A generalized sampling theorem for frequency localized signals is presented. The generalization in the proposed model of sampling is twofold: (1) It applies to various prefilters effecting a "soft" bandlimitation, (2) an approximate reconstruction from sample values rather than a perfect one is obtained (though the former might be "practically perfect" in many cases). For an arbitrary finite-energy signal the frequency localization is performed by a prefilter realizing a crosscorrelation with a function of prescribed properties. The range of the filter, the so-called localization space, is described in some detail. Regular sampling is applied and a reconstruction formula is given. For the reconstruction error a general error estimate is derived and connections between a critical sampling interval and notions of "soft bandwidth" for the prefilter are indicated. Examples based on the sinc-function, Gaussian functions and B-splines are discussed.
[ { "version": "v1", "created": "Mon, 2 Jul 2007 18:40:29 GMT" }, { "version": "v2", "created": "Wed, 15 Apr 2009 19:48:31 GMT" } ]
2009-08-30T00:00:00
[ [ "Hammerich", "Edwin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0323
Syed Jafar
Viveck R. Cadambe, Syed A. Jafar
Interference Alignment and the Degrees of Freedom for the K User Interference Channel
30 pages. Revision extends the 3 user proof to K users
null
null
null
cs.IT math.IT
null
While the best known outerbound for the K user interference channel states that there cannot be more than K/2 degrees of freedom, it has been conjectured that in general the constant interference channel with any number of users has only one degree of freedom. In this paper, we explore the spatial degrees of freedom per orthogonal time and frequency dimension for the K user wireless interference channel where the channel coefficients take distinct values across frequency slots but are fixed in time. We answer five closely related questions. First, we show that K/2 degrees of freedom can be achieved by channel design, i.e. if the nodes are allowed to choose the best constant, finite and nonzero channel coefficient values. Second, we show that if channel coefficients can not be controlled by the nodes but are selected by nature, i.e., randomly drawn from a continuous distribution, the total number of spatial degrees of freedom for the K user interference channel is almost surely K/2 per orthogonal time and frequency dimension. Thus, only half the spatial degrees of freedom are lost due to distributed processing of transmitted and received signals on the interference channel. Third, we show that interference alignment and zero forcing suffice to achieve all the degrees of freedom in all cases. Fourth, we show that the degrees of freedom $D$ directly lead to an $\mathcal{O}(1)$ capacity characterization of the form $C(SNR)=D\log(1+SNR)+\mathcal{O}(1)$ for the multiple access channel, the broadcast channel, the 2 user interference channel, the 2 user MIMO X channel and the 3 user interference channel with M>1 antennas at each node. Fifth, we characterize the degree of freedom benefits from cognitive sharing of messages on the 3 user interference channel.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 15:26:19 GMT" }, { "version": "v2", "created": "Wed, 11 Jul 2007 01:28:41 GMT" } ]
2007-07-13T00:00:00
[ [ "Cadambe", "Viveck R.", "" ], [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0336
Erhan Bayraktar
Erhan Bayraktar
Pricing Options on Defaultable Stocks
Key Words: Option pricing, multiscale perturbation methods, defaultable stocks, stochastic intensity of default, implied volatility skew
null
null
null
cs.CE
null
In this note, we develop stock option price approximations for a model which takes both the risk o default and the stochastic volatility into account. We also let the intensity of defaults be influenced by the volatility. We show that it might be possible to infer the risk neutral default intensity from the stock option prices. Our option price approximation has a rich implied volatility surface structure and fits the data implied volatility well. Our calibration exercise shows that an effective hazard rate from bonds issued by a company can be used to explain the implied volatility skew of the implied volatility of the option prices issued by the same company.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 03:28:35 GMT" }, { "version": "v2", "created": "Fri, 21 Dec 2007 01:08:18 GMT" } ]
2007-12-21T00:00:00
[ [ "Bayraktar", "Erhan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0707.0365
Jean-Christophe Dubacq
Heithem Abbes (UTIC), Christophe C\'erin (LIPN), Jean-Christophe Dubacq (LIPN), Mohamed Jemni (UTIC)
Performance Analysis of Publish/Subscribe Systems
null
Rapport Interne LIPN (15/05/2007)
null
null
cs.DC
null
The Desktop Grid offers solutions to overcome several challenges and to answer increasingly needs of scientific computing. Its technology consists mainly in exploiting resources, geographically dispersed, to treat complex applications needing big power of calculation and/or important storage capacity. However, as resources number increases, the need for scalability, self-organisation, dynamic reconfigurations, decentralisation and performance becomes more and more essential. Since such properties are exhibited by P2P systems, the convergence of grid computing and P2P computing seems natural. In this context, this paper evaluates the scalability and performance of P2P tools for discovering and registering services. Three protocols are used for this purpose: Bonjour, Avahi and Free-Pastry. We have studied the behaviour of theses protocols related to two criteria: the elapsed time for registrations services and the needed time to discover new services. Our aim is to analyse these results in order to choose the best protocol we can use in order to create a decentralised middleware for desktop grid.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 09:02:45 GMT" } ]
2007-07-04T00:00:00
[ [ "Abbes", "Heithem", "", "UTIC" ], [ "Cérin", "Christophe", "", "LIPN" ], [ "Dubacq", "Jean-Christophe", "", "LIPN" ], [ "Jemni", "Mohamed", "", "UTIC" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0707.0397
Shijun Xiang jack-xiang
Shijun Xiang and Jiwu Huang
Robust Audio Watermarking Against the D/A and A/D conversions
Pages 29
null
null
null
cs.CR cs.MM
null
Audio watermarking has played an important role in multimedia security. In many applications using audio watermarking, D/A and A/D conversions (denoted by DA/AD in this paper) are often involved. In previous works, however, the robustness issue of audio watermarking against the DA/AD conversions has not drawn sufficient attention yet. In our extensive investigation, it has been found that the degradation of a watermarked audio signal caused by the DA/AD conversions manifests itself mainly in terms of wave magnitude distortion and linear temporal scaling, making the watermark extraction failed. Accordingly, a DWT-based audio watermarking algorithm robust against the DA/AD conversions is proposed in this paper. To resist the magnitude distortion, the relative energy relationships among different groups of the DWT coefficients in the low-frequency sub-band are utilized in watermark embedding by adaptively controlling the embedding strength. Furthermore, the resynchronization is designed to cope with the linear temporal scaling. The time-frequency localization characteristics of DWT are exploited to save the computational load in the resynchronization. Consequently, the proposed audio watermarking algorithm is robust against the DA/AD conversions, other common audio processing manipulations, and the attacks in StirMark Benchmark for Audio, which has been verified by experiments.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 11:49:03 GMT" } ]
2007-07-04T00:00:00
[ [ "Xiang", "Shijun", "" ], [ "Huang", "Jiwu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0707.0421
Riccardo Dondi
Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi
The $k$-anonymity Problem is Hard
21 pages, A short version of this paper has been accepted in FCT 2009 - 17th International Symposium on Fundamentals of Computation Theory
null
null
null
cs.DB cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization recently proposed is the k-anonymity. This approach requires that the rows in a table are clustered in sets of size at least k and that all the rows in a cluster become the same tuple, after the suppression of some records. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is known to be NP-hard when the values are over a ternary alphabet, k = 3 and the rows length is unbounded. In this paper we give a lower bound on the approximation factor that any polynomial-time algorithm can achive on two restrictions of the problem,namely (i) when the records values are over a binary alphabet and k = 3, and (ii) when the records have length at most 8 and k = 4, showing that these restrictions of the problem are APX-hard.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 14:17:49 GMT" }, { "version": "v2", "created": "Tue, 2 Jun 2009 16:40:37 GMT" } ]
2009-06-02T00:00:00
[ [ "Bonizzoni", "Paola", "" ], [ "Della Vedova", "Gianluca", "" ], [ "Dondi", "Riccardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0707.0430
Branislav Rovan
Peter Ga\v{z}i, Branislav Rovan
Assisted Problem Solving and Decompositions of Finite Automata
14 pages
null
null
null
cs.CC
null
A study of assisted problem solving formalized via decompositions of deterministic finite automata is initiated. The landscape of new types of decompositions of finite automata this study uncovered is presented. Languages with various degrees of decomposability between undecomposable and perfectly decomposable are shown to exist.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 14:54:53 GMT" } ]
2007-07-04T00:00:00
[ [ "Gaži", "Peter", "" ], [ "Rovan", "Branislav", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0707.0454
George Amariucai
George T. Amariucai, Shuangqing Wei and Rajgopal Kannan
Optimal Strategies for Gaussian Jamming in Block-Fading Channels under Delay and Power Constraints
Submitted to IEEE Trans. Inform. Theory, June 03, 2007, for review, This paper has been withdrawn by the authors. A more recent ane more elaborate version is available at arXiv:0808.3418
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Without assuming any knowledge on source's codebook and its output signals, we formulate a Gaussian jamming problem in block fading channels as a two-player zero sum game. The outage probability is adopted as an objective function, over which transmitter aims at minimization and jammer aims at maximization by selecting their power control strategies. Optimal power control strategies for each player are obtained under both short-term and long-term power constraints. For the latter case, we first prove the non-existence of a Nash equilibrium, and then provide a complete solution for both maxmin and minimax problems. Numerical results demonstrate a sharp difference between the outage probabilities of the minimax and maxmin solutions.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 16:09:37 GMT" }, { "version": "v2", "created": "Mon, 28 Sep 2009 15:53:34 GMT" } ]
2009-09-28T00:00:00
[ [ "Amariucai", "George T.", "" ], [ "Wei", "Shuangqing", "" ], [ "Kannan", "Rajgopal", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0459
Petar Popovski
Petar Popovski and Hiroyuki Yomo
Physical Network Coding in Two-Way Wireless Relay Channels
null
Proc. of IEEE International Conference on Communications (ICC), Glasgow, Scotland, 2007
null
null
cs.IT cs.NI math.IT
null
It has recently been recognized that the wireless networks represent a fertile ground for devising communication modes based on network coding. A particularly suitable application of the network coding arises for the two--way relay channels, where two nodes communicate with each other assisted by using a third, relay node. Such a scenario enables application of \emph{physical network coding}, where the network coding is either done (a) jointly with the channel coding or (b) through physical combining of the communication flows over the multiple access channel. In this paper we first group the existing schemes for physical network coding into two generic schemes, termed 3--step and 2--step scheme, respectively. We investigate the conditions for maximization of the two--way rate for each individual scheme: (1) the Decode--and--Forward (DF) 3--step schemes (2) three different schemes with two steps: Amplify--and--Forward (AF), JDF and Denoise--and--Forward (DNF). While the DNF scheme has a potential to offer the best two--way rate, the most interesting result of the paper is that, for some SNR configurations of the source--relay links, JDF yields identical maximal two--way rate as the upper bound on the rate for DNF.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 16:40:41 GMT" } ]
2007-07-13T00:00:00
[ [ "Popovski", "Petar", "" ], [ "Yomo", "Hiroyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0463
Yuanning Yu
Yuanning Yu, Athina P. Petropulu, H. Vincent Poor and Visa Koivunen
Blind Estimation of Multiple Carrier Frequency Offsets
To appear in the Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Athens, Greece, September 3-7, 2007
null
10.1109/PIMRC.2007.4394103
null
cs.IT math.IT
null
Multiple carrier-frequency offsets (CFO) arise in a distributed antenna system, where data are transmitted simultaneously from multiple antennas. In such systems the received signal contains multiple CFOs due to mismatch between the local oscillators of transmitters and receiver. This results in a time-varying rotation of the data constellation, which needs to be compensated for at the receiver before symbol recovery. This paper proposes a new approach for blind CFO estimation and symbol recovery. The received base-band signal is over-sampled, and its polyphase components are used to formulate a virtual Multiple-Input Multiple-Output (MIMO) problem. By applying blind MIMO system estimation techniques, the system response is estimated and used to subsequently transform the multiple CFOs estimation problem into many independent single CFO estimation problems. Furthermore, an initial estimate of the CFO is obtained from the phase of the MIMO system response. The Cramer-Rao Lower bound is also derived, and the large sample performance of the proposed estimator is compared to the bound.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 16:58:43 GMT" } ]
2016-11-18T00:00:00
[ [ "Yu", "Yuanning", "" ], [ "Petropulu", "Athina P.", "" ], [ "Poor", "H. Vincent", "" ], [ "Koivunen", "Visa", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0476
Nihar Jindal
Nihar Jindal, Steven Weber, Jeffrey G. Andrews
Fractional Power Control for Decentralized Wireless Networks
16 pages, in revision for IEEE Trans. on Wireless Communication
null
10.1109/T-WC.2008.071439
null
cs.IT math.IT
null
We consider a new approach to power control in decentralized wireless networks, termed fractional power control (FPC). Transmission power is chosen as the current channel quality raised to an exponent -s, where s is a constant between 0 and 1. The choices s = 1 and s = 0 correspond to the familiar cases of channel inversion and constant power transmission, respectively. Choosing s in (0,1) allows all intermediate policies between these two extremes to be evaluated, and we see that usually neither extreme is ideal. We derive closed-form approximations for the outage probability relative to a target SINR in a decentralized (ad hoc or unlicensed) network as well as for the resulting transmission capacity, which is the number of users/m^2 that can achieve this SINR on average. Using these approximations, which are quite accurate over typical system parameter values, we prove that using an exponent of 1/2 minimizes the outage probability, meaning that the inverse square root of the channel strength is a sensible transmit power scaling for networks with a relatively low density of interferers. We also show numerically that this choice of s is robust to a wide range of variations in the network parameters. Intuitively, s=1/2 balances between helping disadvantaged users while making sure they do not flood the network with interference.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 18:54:05 GMT" }, { "version": "v2", "created": "Mon, 28 Apr 2008 14:44:07 GMT" } ]
2016-11-18T00:00:00
[ [ "Jindal", "Nihar", "" ], [ "Weber", "Steven", "" ], [ "Andrews", "Jeffrey G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0479
Hamidreza Farmanbar
Hamidreza Farmanbar and Amir K. Khandani
Precoding for the AWGN Channel with Discrete Interference
5 pages, 3 figures, presented at ISIT 2007. In section 2, a new upper bound is obtained for the cardinality of the auxiliary random variable in the Shannon's capacity formula for the channel with causal side information at the encoder
null
null
UW-ECE-2006-24
cs.IT math.IT
null
For a state-dependent DMC with input alphabet $\mathcal{X}$ and state alphabet $\mathcal{S}$ where the i.i.d. state sequence is known causally at the transmitter, it is shown that by using at most $|\mathcal{X}||\mathcal{S}|-|\mathcal{S}|+1$ out of $|\mathcal{X}|^{|\mathcal{S}|}$ input symbols of the Shannon's \emph{associated} channel, the capacity is achievable. As an example of state-dependent channels with side information at the transmitter, $M$-ary signal transmission over AWGN channel with additive $Q$-ary interference where the sequence of i.i.d. interference symbols is known causally at the transmitter is considered. For the special case where the Gaussian noise power is zero, a sufficient condition, which is independent of interference, is given for the capacity to be $\log_2 M$ bits per channel use. The problem of maximization of the transmission rate under the constraint that the channel input given any current interference symbol is uniformly distributed over the channel input alphabet is investigated. For this setting, the general structure of a communication system with optimal precoding is proposed.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 18:59:11 GMT" } ]
2007-07-13T00:00:00
[ [ "Farmanbar", "Hamidreza", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0498
Roy Murphy Dr
Roy E. Murphy
The Role of Time in the Creation of Knowledge
Adaptive Processes
null
null
null
cs.LG cs.AI cs.IT math.IT
null
This paper I assume that in humans the creation of knowledge depends on a discrete time, or stage, sequential decision-making process subjected to a stochastic, information transmitting environment. For each time-stage, this environment randomly transmits Shannon type information-packets to the decision-maker, who examines each of them for relevancy and then determines his optimal choices. Using this set of relevant information-packets, the decision-maker adapts, over time, to the stochastic nature of his environment, and optimizes the subjective expected rate-of-growth of knowledge. The decision-maker's optimal actions, lead to a decision function that involves, over time, his view of the subjective entropy of the environmental process and other important parameters at each time-stage of the process. Using this model of human behavior, one could create psychometric experiments using computer simulation and real decision-makers, to play programmed games to measure the resulting human performance.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 20:43:43 GMT" } ]
2007-07-13T00:00:00
[ [ "Murphy", "Roy E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0500
Wenjun Li Ms.
Wenjun Li, Yanbing Zhang and Huaiyu Dai
Location-Aided Fast Distributed Consensus in Wireless Networks
44 pages, 14 figures. Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2010.2081030
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing works on distributed consensus explore linear iterations based on reversible Markov chains, which contribute to the slow convergence of the algorithms. It has been observed that by overcoming the diffusive behavior of reversible chains, certain nonreversible chains lifted from reversible ones mix substantially faster than the original chains. In this paper, we investigate the idea of accelerating distributed consensus via lifting Markov chains, and propose a class of Location-Aided Distributed Averaging (LADA) algorithms for wireless networks, where nodes' coarse location information is used to construct nonreversible chains that facilitate distributed computing and cooperative processing. First, two general pseudo-algorithms are presented to illustrate the notion of distributed averaging through chain-lifting. These pseudo-algorithms are then respectively instantiated through one LADA algorithm on grid networks, and one on general wireless networks. For a $k\times k$ grid network, the proposed LADA algorithm achieves an $\epsilon$-averaging time of $O(k\log(\epsilon^{-1}))$. Based on this algorithm, in a wireless network with transmission range $r$, an $\epsilon$-averaging time of $O(r^{-1}\log(\epsilon^{-1}))$ can be attained through a centralized algorithm. Subsequently, we present a fully-distributed LADA algorithm for wireless networks, which utilizes only the direction information of neighbors to construct nonreversible chains. It is shown that this distributed LADA algorithm achieves the same scaling law in averaging time as the centralized scheme. Finally, we propose a cluster-based LADA (C-LADA) algorithm, which, requiring no central coordination, provides the additional benefit of reduced message complexity compared with the distributed LADA algorithm.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 20:47:08 GMT" }, { "version": "v2", "created": "Mon, 21 Jul 2008 23:54:00 GMT" }, { "version": "v3", "created": "Mon, 23 Mar 2009 23:40:57 GMT" } ]
2016-11-18T00:00:00
[ [ "Li", "Wenjun", "" ], [ "Zhang", "Yanbing", "" ], [ "Dai", "Huaiyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0514
Matthew Cargo
Matthew Charles Cargo
Phase space methods and psychoacoustic models in lossy transform coding
null
null
null
null
cs.IT cs.SD math.IT
null
I present a method for lossy transform coding of digital audio that uses the Weyl symbol calculus for constructing the encoding and decoding transformation. The method establishes a direct connection between a time-frequency representation of the signal dependent threshold of masked noise and the encode/decode pair. The formalism also offers a time-frequency measure of perceptual entropy.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 22:41:11 GMT" } ]
2007-07-13T00:00:00
[ [ "Cargo", "Matthew Charles", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0546
Juli\'an Mestre
Juli\'an Mestre
Weighted Popular Matchings
14 pages, 3 figures. A preliminary version appeared in the Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP)
null
null
null
cs.DS
null
We study the problem of assigning jobs to applicants. Each applicant has a weight and provides a preference list ranking a subset of the jobs. A matching M is popular if there is no other matching M' such that the weight of the applicants who prefer M' over M exceeds the weight of those who prefer M over M'. This paper gives efficient algorithms to find a popular matching if one exists.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 06:55:43 GMT" } ]
2007-07-05T00:00:00
[ [ "Mestre", "Julián", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0707.0548
Sebastien Verel
Michael Defoin Platel (I3S), Sebastien Verel (I3S), Manuel Clergue (I3S), Philippe Collard (I3S)
From Royal Road to Epistatic Road for Variable Length Evolution Algorithm
null
Lecture notes in computer science (Lect. notes comput. sci.) ISSN 0302-9743 (27/10/2003) 3-14
null
null
cs.NE
null
Although there are some real world applications where the use of variable length representation (VLR) in Evolutionary Algorithm is natural and suitable, an academic framework is lacking for such representations. In this work we propose a family of tunable fitness landscapes based on VLR of genotypes. The fitness landscapes we propose possess a tunable degree of both neutrality and epistasis; they are inspired, on the one hand by the Royal Road fitness landscapes, and the other hand by the NK fitness landscapes. So these landscapes offer a scale of continuity from Royal Road functions, with neutrality and no epistasis, to landscapes with a large amount of epistasis and no redundancy. To gain insight into these fitness landscapes, we first use standard tools such as adaptive walks and correlation length. Second, we evaluate the performances of evolutionary algorithms on these landscapes for various values of the neutral and the epistatic parameters; the results allow us to correlate the performances with the expected degrees of neutrality and epistasis.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 06:57:52 GMT" } ]
2007-07-05T00:00:00
[ [ "Platel", "Michael Defoin", "", "I3S" ], [ "Verel", "Sebastien", "", "I3S" ], [ "Clergue", "Manuel", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0707.0556
Roberto Amadio
Roberto Amadio (PPS), Mehdi Dogguy (PPS)
Determinacy in a synchronous pi-calculus
To appear in the book `From semantics to computer science: essays in honor of Gilles Kahn', Cambridge University Press
From semantics to computer science: essays in honor of Gilles Kahn, Y. Bertot et al. (Ed.) (2009) 1-27
null
null
cs.LO
null
The S-pi-calculus is a synchronous pi-calculus which is based on the SL model. The latter is a relaxation of the Esterel model where the reaction to the absence of a signal within an instant can only happen at the next instant. In the present work, we present and characterise a compositional semantics of the S-pi-calculus based on suitable notions of labelled transition system and bisimulation. Based on this semantic framework, we explore the notion of determinacy and the related one of (local) confluence.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 08:12:17 GMT" }, { "version": "v2", "created": "Mon, 11 Feb 2008 18:58:19 GMT" } ]
2010-07-01T00:00:00
[ [ "Amadio", "Roberto", "", "PPS" ], [ "Dogguy", "Mehdi", "", "PPS" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.0562
Stefan G\"oller
Stefan G\"oller and Dirk Nowotka
On a Non-Context-Free Extension of PDL
null
null
null
null
cs.LO
null
Over the last 25 years, a lot of work has been done on seeking for decidable non-regular extensions of Propositional Dynamic Logic (PDL). Only recently, an expressive extension of PDL, allowing visibly pushdown automata (VPAs) as a formalism to describe programs, was introduced and proven to have a satisfiability problem complete for deterministic double exponential time. Lately, the VPA formalism was extended to so called k-phase multi-stack visibly pushdown automata (k-MVPAs). Similarly to VPAs, it has been shown that the language of k-MVPAs have desirable effective closure properties and that the emptiness problem is decidable. On the occasion of introducing k-MVPAs, it has been asked whether the extension of PDL with k-MVPAs still leads to a decidable logic. This question is answered negatively here. We prove that already for the extension of PDL with 2-phase MVPAs with two stacks satisfiability becomes \Sigma_1^1-complete.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 09:33:21 GMT" }, { "version": "v2", "created": "Wed, 18 Jul 2007 10:11:01 GMT" } ]
2007-07-18T00:00:00
[ [ "Göller", "Stefan", "" ], [ "Nowotka", "Dirk", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.0568
Gesualdo Scutari
Gesualdo Scutari, D.P. Palomar, S. Barbarossa
Optimal Linear Precoding Strategies for Wideband Non-Cooperative Systems based on Game Theory-Part I: Nash Equilibria
Paper submitted to IEEE Transactions on Signal Processing, September 22, 2005. Revised March 14, 2007. Accepted June 5, 2007. To be published on IEEE Transactions on Signal Processing, 2007. To appear on IEEE Transactions on Signal Processing, 2007
null
10.1109/TSP.2007.907807
null
cs.IT cs.GT math.IT
null
In this two-parts paper we propose a decentralized strategy, based on a game-theoretic formulation, to find out the optimal precoding/multiplexing matrices for a multipoint-to-multipoint communication system composed of a set of wideband links sharing the same physical resources, i.e., time and bandwidth. We assume, as optimality criterion, the achievement of a Nash equilibrium and consider two alternative optimization problems: 1) the competitive maximization of mutual information on each link, given constraints on the transmit power and on the spectral mask imposed by the radio spectrum regulatory bodies; and 2) the competitive maximization of the transmission rate, using finite order constellations, under the same constraints as above, plus a constraint on the average error probability. In Part I of the paper, we start by showing that the solution set of both noncooperative games is always nonempty and contains only pure strategies. Then, we prove that the optimal precoding/multiplexing scheme for both games leads to a channel diagonalizing structure, so that both matrix-valued problems can be recast in a simpler unified vector power control game, with no performance penalty. Thus, we study this simpler game and derive sufficient conditions ensuring the uniqueness of the Nash equilibrium. Interestingly, although derived under stronger constraints, incorporating for example spectral mask constraints, our uniqueness conditions have broader validity than previously known conditions. Finally, we assess the goodness of the proposed decentralized strategy by comparing its performance with the performance of a Pareto-optimal centralized scheme. To reach the Nash equilibria of the game, in Part II, we propose alternative distributed algorithms, along with their convergence conditions.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 10:33:25 GMT" } ]
2009-11-13T00:00:00
[ [ "Scutari", "Gesualdo", "" ], [ "Palomar", "D. P.", "" ], [ "Barbarossa", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0610
Joseph O'Rourke
Joseph O'Rourke
Unfolding Orthogonal Terrains
7 pages, 7 figures, 5 references. First revision adds Figure 7, and improves Figure 6. Second revision further improves Figure 7, and adds one clarifying sentence. Third corrects label in Figure 7. Fourth revision corrects a sentence in the conclusion about the class of shapes now known to be grid-unfoldable
null
null
Smith Technical Report 084
cs.CG
null
It is shown that every orthogonal terrain, i.e., an orthogonal (right-angled) polyhedron based on a rectangle that meets every vertical line in a segment, has a grid unfolding: its surface may be unfolded to a single non-overlapping piece by cutting along grid edges defined by coordinate planes through every vertex.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 15:04:33 GMT" }, { "version": "v2", "created": "Thu, 5 Jul 2007 18:11:20 GMT" }, { "version": "v3", "created": "Fri, 6 Jul 2007 12:39:04 GMT" }, { "version": "v4", "created": "Thu, 12 Jul 2007 13:16:38 GMT" } ]
2007-07-12T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0707.0641
Sebastien Verel
S\'ebastien Verel (I3S), Philippe Collard (I3S), Manuel Clergue (I3S)
Where are Bottlenecks in NK Fitness Landscapes?
null
Evolutionary Computation, 2003. CEC'03 (08/12/2003) 273--280
10.1109/CEC.2003.1299585
null
cs.NE
null
Usually the offspring-parent fitness correlation is used to visualize and analyze some caracteristics of fitness landscapes such as evolvability. In this paper, we introduce a more general representation of this correlation, the Fitness Cloud (FC). We use the bottleneck metaphor to emphasise fitness levels in landscape that cause local search process to slow down. For a local search heuristic such as hill-climbing or simulated annealing, FC allows to visualize bottleneck and neutrality of landscapes. To confirm the relevance of the FC representation we show where the bottlenecks are in the well-know NK fitness landscape and also how to use neutrality information from the FC to combine some neutral operator with local search heuristic.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 15:30:54 GMT" } ]
2007-07-05T00:00:00
[ [ "Verel", "Sébastien", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ], [ "Clergue", "Manuel", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0707.0643
Sebastien Verel
S\'ebastien Verel (I3S), Philippe Collard (I3S), Manuel Clergue (I3S)
Scuba Search : when selection meets innovation
null
Evolutionary Computation, 2004. CEC2004 (23/06/2004) 924 - 931
10.1109/CEC.2004.1330960
null
cs.NE
null
We proposed a new search heuristic using the scuba diving metaphor. This approach is based on the concept of evolvability and tends to exploit neutrality in fitness landscape. Despite the fact that natural evolution does not directly select for evolvability, the basic idea behind the scuba search heuristic is to explicitly push the evolvability to increase. The search process switches between two phases: Conquest-of-the-Waters and Invasion-of-the-Land. A comparative study of the new algorithm and standard local search heuristics on the NKq-landscapes has shown advantage and limit of the scuba search. To enlighten qualitative differences between neutral search processes, the space is changed into a connected graph to visualize the pathways that the search is likely to follow.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 15:36:35 GMT" } ]
2007-07-05T00:00:00
[ [ "Verel", "Sébastien", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ], [ "Clergue", "Manuel", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0707.0644
Ali Akhavi
Ali Akhavi (GREYC), C\'eline Moreira (GREYC)
Another view of the Gaussian algorithm
null
Proceedings of Latin'04 (04/2004) 474--487
null
null
cs.DS cs.DM
null
We introduce here a rewrite system in the group of unimodular matrices, \emph{i.e.}, matrices with integer entries and with determinant equal to $\pm 1$. We use this rewrite system to precisely characterize the mechanism of the Gaussian algorithm, that finds shortest vectors in a two--dimensional lattice given by any basis. Putting together the algorithmic of lattice reduction and the rewrite system theory, we propose a new worst--case analysis of the Gaussian algorithm. There is already an optimal worst--case bound for some variant of the Gaussian algorithm due to Vall\'ee \cite {ValGaussRevisit}. She used essentially geometric considerations. Our analysis generalizes her result to the case of the usual Gaussian algorithm. An interesting point in our work is its possible (but not easy) generalization to the same problem in higher dimensions, in order to exhibit a tight upper-bound for the number of iterations of LLL--like reduction algorithms in the worst case. Moreover, our method seems to work for analyzing other families of algorithms. As an illustration, the analysis of sorting algorithms are briefly developed in the last section of the paper.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 15:37:15 GMT" } ]
2007-07-05T00:00:00
[ [ "Akhavi", "Ali", "", "GREYC" ], [ "Moreira", "Céline", "", "GREYC" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.0648
Viswanath Nagarajan
Anupam Gupta, MohammadTaghi Hajiaghayi, Viswanath Nagarajan, R. Ravi
Dial a Ride from k-forest
Preliminary version in Proc. European Symposium on Algorithms, 2007
null
null
null
cs.DS
null
The k-forest problem is a common generalization of both the k-MST and the dense-$k$-subgraph problems. Formally, given a metric space on $n$ vertices $V$, with $m$ demand pairs $\subseteq V \times V$ and a ``target'' $k\le m$, the goal is to find a minimum cost subgraph that connects at least $k$ demand pairs. In this paper, we give an $O(\min\{\sqrt{n},\sqrt{k}\})$-approximation algorithm for $k$-forest, improving on the previous best ratio of $O(n^{2/3}\log n)$ by Segev & Segev. We then apply our algorithm for k-forest to obtain approximation algorithms for several Dial-a-Ride problems. The basic Dial-a-Ride problem is the following: given an $n$ point metric space with $m$ objects each with its own source and destination, and a vehicle capable of carrying at most $k$ objects at any time, find the minimum length tour that uses this vehicle to move each object from its source to destination. We prove that an $\alpha$-approximation algorithm for the $k$-forest problem implies an $O(\alpha\cdot\log^2n)$-approximation algorithm for Dial-a-Ride. Using our results for $k$-forest, we get an $O(\min\{\sqrt{n},\sqrt{k}\}\cdot\log^2 n)$- approximation algorithm for Dial-a-Ride. The only previous result known for Dial-a-Ride was an $O(\sqrt{k}\log n)$-approximation by Charikar & Raghavachari; our results give a different proof of a similar approximation guarantee--in fact, when the vehicle capacity $k$ is large, we give a slight improvement on their results.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 16:08:40 GMT" } ]
2007-07-05T00:00:00
[ [ "Gupta", "Anupam", "" ], [ "Hajiaghayi", "MohammadTaghi", "" ], [ "Nagarajan", "Viswanath", "" ], [ "Ravi", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0707.0649
Albert Guill\'en i F\`abregas
Albert Guillen i Fabregas and Emanuele Viterbo
Sphere Lower Bound for Rotated Lattice Constellations in Fading Channels
accepted for publication at the IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
null
We study the error probability performance of rotated lattice constellations in frequency-flat Nakagami-$m$ block-fading channels. In particular, we use the sphere lower bound on the underlying infinite lattice as a performance benchmark. We show that the sphere lower bound has full diversity. We observe that optimally rotated lattices with largest known minimum product distance perform very close to the lower bound, while the ensemble of random rotations is shown to lack diversity and perform far from it.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 15:56:03 GMT" } ]
2007-07-13T00:00:00
[ [ "Fabregas", "Albert Guillen i", "" ], [ "Viterbo", "Emanuele", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0652
Sebastien Verel
Philippe Collard (I3S), S\'ebastien Verel (I3S), Manuel Clergue (I3S)
How to use the Scuba Diving metaphor to solve problem with neutrality ?
null
ECAI'2004 (27/08/2004) 166-170
null
null
cs.NE
null
We proposed a new search heuristic using the scuba diving metaphor. This approach is based on the concept of evolvability and tends to exploit neutrality which exists in many real-world problems. Despite the fact that natural evolution does not directly select for evolvability, the basic idea behind the scuba search heuristic is to explicitly push evolvability to increase. A comparative study of the scuba algorithm and standard local search heuristics has shown the advantage and the limitation of the scuba search. In order to tune neutrality, we use the NKq fitness landscapes and a family of travelling salesman problems (TSP) where cities are randomly placed on a lattice and where travel distance between cities is computed with the Manhattan metric. In this last problem the amount of neutrality varies with the city concentration on the grid ; assuming the concentration below one, this TSP reasonably remains a NP-hard problem.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 16:12:17 GMT" } ]
2007-07-05T00:00:00
[ [ "Collard", "Philippe", "", "I3S" ], [ "Verel", "Sébastien", "", "I3S" ], [ "Clergue", "Manuel", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0707.0701
Alexandre d'Aspremont
Ronny Luss, Alexandre d'Aspremont
Clustering and Feature Selection using Sparse Principal Component Analysis
More experiments
null
null
null
cs.AI cs.LG cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the application of sparse principal component analysis (PCA) to clustering and feature selection problems. Sparse PCA seeks sparse factors, or linear combinations of the data variables, explaining a maximum amount of variance in the data while having only a limited number of nonzero coefficients. PCA is often used as a simple clustering technique and sparse factors allow us here to interpret the clusters in terms of a reduced set of variables. We begin with a brief introduction and motivation on sparse PCA and detail our implementation of the algorithm in d'Aspremont et al. (2005). We then apply these results to some classic clustering and feature selection problems arising in biology.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 21:53:11 GMT" }, { "version": "v2", "created": "Wed, 8 Oct 2008 18:41:53 GMT" } ]
2008-10-08T00:00:00
[ [ "Luss", "Ronny", "" ], [ "d'Aspremont", "Alexandre", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0707.0704
Alexandre d'Aspremont
Onureena Banerjee, Laurent El Ghaoui, Alexandre d'Aspremont
Model Selection Through Sparse Maximum Likelihood Estimation
null
null
null
null
cs.AI cs.LG
null
We consider the problem of estimating the parameters of a Gaussian or binary distribution in such a way that the resulting undirected graphical model is sparse. Our approach is to solve a maximum likelihood problem with an added l_1-norm penalty term. The problem as formulated is convex but the memory requirements and complexity of existing interior point methods are prohibitive for problems with more than tens of nodes. We present two new algorithms for solving problems with at least a thousand nodes in the Gaussian case. Our first algorithm uses block coordinate descent, and can be interpreted as recursive l_1-norm penalized regression. Our second algorithm, based on Nesterov's first order method, yields a complexity estimate with a better dependence on problem size than existing interior point methods. Using a log determinant relaxation of the log partition function (Wainwright & Jordan (2006)), we show that these same algorithms can be used to solve an approximate sparse maximum likelihood problem for the binary case. We test our algorithms on synthetic data, as well as on gene expression and senate voting records data.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 22:13:42 GMT" } ]
2007-07-06T00:00:00
[ [ "Banerjee", "Onureena", "" ], [ "Ghaoui", "Laurent El", "" ], [ "d'Aspremont", "Alexandre", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0707.0705
Alexandre d'Aspremont
Alexandre d'Aspremont, Francis Bach, Laurent El Ghaoui
Optimal Solutions for Sparse Principal Component Analysis
Revised journal version. More efficient optimality conditions and new examples in subset selection and sparse recovery. Original version is in ICML proceedings
null
null
null
cs.AI cs.LG
null
Given a sample covariance matrix, we examine the problem of maximizing the variance explained by a linear combination of the input variables while constraining the number of nonzero coefficients in this combination. This is known as sparse principal component analysis and has a wide array of applications in machine learning and engineering. We formulate a new semidefinite relaxation to this problem and derive a greedy algorithm that computes a full set of good solutions for all target numbers of non zero coefficients, with total complexity O(n^3), where n is the number of variables. We then use the same relaxation to derive sufficient conditions for global optimality of a solution, which can be tested in O(n^3) per pattern. We discuss applications in subset selection and sparse recovery and show on artificial examples and biological data that our algorithm does provide globally optimal solutions in many cases.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 22:28:28 GMT" }, { "version": "v2", "created": "Fri, 3 Aug 2007 22:30:22 GMT" }, { "version": "v3", "created": "Fri, 24 Aug 2007 00:49:31 GMT" }, { "version": "v4", "created": "Fri, 9 Nov 2007 17:27:11 GMT" } ]
2011-11-10T00:00:00
[ [ "d'Aspremont", "Alexandre", "" ], [ "Bach", "Francis", "" ], [ "Ghaoui", "Laurent El", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0707.0724
Damien Chablat
Daniel Kanaan (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Workspace Analysis of the Parallel Module of the VERNE Machine
null
Problems of Mechanics 25, 4 (01/12/2006) 26-42
null
null
cs.RO physics.class-ph
null
The paper addresses geometric aspects of a spatial three-degree-of-freedom parallel module, which is the parallel module of a hybrid serial-parallel 5-axis machine tool. This parallel module consists of a moving platform that is connected to a fixed base by three non-identical legs. Each leg is made up of one prismatic and two pairs of spherical joint, which are connected in a way that the combined effects of the three legs lead to an over-constrained mechanism with complex motion. This motion is defined as a simultaneous combination of rotation and translation. A method for computing the complete workspace of the VERNE parallel module for various tool lengths is presented. An algorithm describing this method is also introduced.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 06:43:49 GMT" } ]
2007-07-06T00:00:00
[ [ "Kanaan", "Daniel", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0707.0740
Richard McClatchey
A. Ali, A. Anjum, J. Bunn, F. Khan, R.McClatchey, H. Newman, C. Steenberg, M. Thomas, Ian Willers
A Multi Interface Grid Discovery System
2 pages, 4 figures. Presented at the Grid 2006 conference, Barcelona Spain
null
null
null
cs.DC
null
Discovery Systems (DS) can be considered as entry points for global loosely coupled distributed systems. An efficient Discovery System in essence increases the performance, reliability and decision making capability of distributed systems. With the rapid increase in scale of distributed applications, existing solutions for discovery systems are fast becoming either obsolete or incapable of handling such complexity. They are particularly ineffective when handling service lifetimes and providing up-to-date information, poor at enabling dynamic service access and they can also impose unwanted restrictions on interfaces to widely available information repositories. In this paper we present essential the design characteristics, an implementation and a performance analysis for a discovery system capable of overcoming these deficiencies in large, globally distributed environments.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 09:22:45 GMT" } ]
2007-07-06T00:00:00
[ [ "Ali", "A.", "" ], [ "Anjum", "A.", "" ], [ "Bunn", "J.", "" ], [ "Khan", "F.", "" ], [ "McClatchey", "R.", "" ], [ "Newman", "H.", "" ], [ "Steenberg", "C.", "" ], [ "Thomas", "M.", "" ], [ "Willers", "Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0707.0742
Richard McClatchey
A. Ali, A. Anjum, T. Azim, J. Bunn, A. Ikram, R. McClatchey, H. Newman, C. Steenberg, M. Thomas, I. Willers
Mobile Computing in Physics Analysis - An Indicator for eScience
8 pages, 7 figures. Presented at the 3rd Int Conf on Mobile Computing & Ubiquitous Networking (ICMU06. London October 2006
null
null
null
cs.DC
null
This paper presents the design and implementation of a Grid-enabled physics analysis environment for handheld and other resource-limited computing devices as one example of the use of mobile devices in eScience. Handheld devices offer great potential because they provide ubiquitous access to data and round-the-clock connectivity over wireless links. Our solution aims to provide users of handheld devices the capability to launch heavy computational tasks on computational and data Grids, monitor the jobs status during execution, and retrieve results after job completion. Users carry their jobs on their handheld devices in the form of executables (and associated libraries). Users can transparently view the status of their jobs and get back their outputs without having to know where they are being executed. In this way, our system is able to act as a high-throughput computing environment where devices ranging from powerful desktop machines to small handhelds can employ the power of the Grid. The results shown in this paper are readily applicable to the wider eScience community.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 09:32:29 GMT" } ]
2007-07-06T00:00:00
[ [ "Ali", "A.", "" ], [ "Anjum", "A.", "" ], [ "Azim", "T.", "" ], [ "Bunn", "J.", "" ], [ "Ikram", "A.", "" ], [ "McClatchey", "R.", "" ], [ "Newman", "H.", "" ], [ "Steenberg", "C.", "" ], [ "Thomas", "M.", "" ], [ "Willers", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0707.0743
Richard McClatchey
A. Anjum, R. McClatchey, H. Stockinger, A. Ali, I. Willers, M. Thomas, M. Sagheer, K. Hasham, O. Alvi
DIANA Scheduling Hierarchies for Optimizing Bulk Job Scheduling
8 pages, 9 figures. Presented at the 2nd IEEE Int Conference on eScience & Grid Computing. Amsterdam Netherlands, December 2006
null
10.1109/E-SCIENCE.2006.261173
null
cs.DC
null
The use of meta-schedulers for resource management in large-scale distributed systems often leads to a hierarchy of schedulers. In this paper, we discuss why existing meta-scheduling hierarchies are sometimes not sufficient for Grid systems due to their inability to re-organise jobs already scheduled locally. Such a job re-organisation is required to adapt to evolving loads which are common in heavily used Grid infrastructures. We propose a peer-to-peer scheduling model and evaluate it using case studies and mathematical modelling. We detail the DIANA (Data Intensive and Network Aware) scheduling algorithm and its queue management system for coping with the load distribution and for supporting bulk job scheduling. We demonstrate that such a system is beneficial for dynamic, distributed and self-organizing resource management and can assist in optimizing load or job distribution in complex Grid infrastructures.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 09:36:18 GMT" } ]
2016-11-17T00:00:00
[ [ "Anjum", "A.", "" ], [ "McClatchey", "R.", "" ], [ "Stockinger", "H.", "" ], [ "Ali", "A.", "" ], [ "Willers", "I.", "" ], [ "Thomas", "M.", "" ], [ "Sagheer", "M.", "" ], [ "Hasham", "K.", "" ], [ "Alvi", "O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0707.0744
Inge Bethke
Jan Bergstra, Inge Bethke and Mark Burgess
A process algebra based framework for promise theory
9 pages, 4 figures
null
null
PRG0701
cs.LO
null
We present a process algebra based approach to formalize the interactions of computing devices such as the representation of policies and the resolution of conflicts. As an example we specify how promises may be used in coming to an agreement regarding a simple though practical transportation problem.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 09:39:14 GMT" } ]
2007-07-06T00:00:00
[ [ "Bergstra", "Jan", "" ], [ "Bethke", "Inge", "" ], [ "Burgess", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.0745
Richard McClatchey
K. Munir, M. Odeh, R. McClatchey, S. Khan, I. Habib
Semantic Information Retrieval from Distributed Heterogeneous Data Sources
6 pages, 3 figures. Presented at the 4th International Workshop on Frontiers of Information Technology -- FIT 2006. Islamabad, Pakistan December 2006
null
null
null
cs.DB
null
Information retrieval from distributed heterogeneous data sources remains a challenging issue. As the number of data sources increases more intelligent retrieval techniques, focusing on information content and semantics, are required. Currently ontologies are being widely used for managing semantic knowledge, especially in the field of bioinformatics. In this paper we describe an ontology assisted system that allows users to query distributed heterogeneous data sources by hiding details like location, information structure, access pattern and semantic structure of the data. Our goal is to provide an integrated view on biomedical information sources for the Health-e-Child project with the aim to overcome the lack of sufficient semantic-based reformulation techniques for querying distributed data sources. In particular, this paper examines the problem of query reformulation across biomedical data sources, based on merged ontologies and the underlying heterogeneous descriptions of the respective data sources.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 09:40:19 GMT" } ]
2007-07-06T00:00:00
[ [ "Munir", "K.", "" ], [ "Odeh", "M.", "" ], [ "McClatchey", "R.", "" ], [ "Khan", "S.", "" ], [ "Habib", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0707.0748
Richard McClatchey
F. Estrella, T. Hauer, R. McClatchey, M. Odeh, D Rogulin, T. Solomonides
Experiences of Engineering Grid-Based Medical Software
18 pages, 2 tables, 5 figures. In press International Journal of Medical Informatics. Elsevier publishers
null
null
null
cs.DC
null
Objectives: Grid-based technologies are emerging as potential solutions for managing and collaborating distributed resources in the biomedical domain. Few examples exist, however, of successful implementations of Grid-enabled medical systems and even fewer have been deployed for evaluation in practice. The objective of this paper is to evaluate the use in clinical practice of a Grid-based imaging prototype and to establish directions for engineering future medical Grid developments and their subsequent deployment. Method: The MammoGrid project has deployed a prototype system for clinicians using the Grid as its information infrastructure. To assist in the specification of the system requirements (and for the first time in healthgrid applications), use-case modelling has been carried out in close collaboration with clinicians and radiologists who had no prior experience of this modelling technique. A critical qualitative and, where possible, quantitative analysis of the MammoGrid prototype is presented leading to a set of recommendations from the delivery of the first deployed Grid-based medical imaging application. Results: We report critically on the application of software engineering techniques in the specification and implementation of the MammoGrid project and show that use-case modelling is a suitable vehicle for representing medical requirements and for communicating effectively with the clinical community. This paper also discusses the practical advantages and limitations of applying the Grid to real-life clinical applications and presents the consequent lessons learned.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 10:06:41 GMT" } ]
2007-07-06T00:00:00
[ [ "Estrella", "F.", "" ], [ "Hauer", "T.", "" ], [ "McClatchey", "R.", "" ], [ "Odeh", "M.", "" ], [ "Rogulin", "D", "" ], [ "Solomonides", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0707.0761
Richard McClatchey
David Manset, Herve Verjus, Richard McClatchey
Managing Separation of Concerns in Grid Applications Through Architectural Model Transformations
4 pages, 2 figures. Presented at the First European Conference on Software Architectures (ECSA 2007). Madrid, Spain September 24-26, 2007
null
null
null
cs.SE cs.DC
null
Grids enable the aggregation, virtualization and sharing of massive heterogeneous and geographically dispersed resources, using files, applications and storage devices, to solve computation and data intensive problems, across institutions and countries via temporary collaborations called virtual organizations (VO). Most implementations result in complex superposition of software layers, often delivering low quality of service and quality of applications. As a consequence, Grid-based applications design and development is increasingly complex, and the use of most classical engineering practices is unsuccessful. Not only is the development of such applications a time-consuming, error prone and expensive task, but also the resulting applications are often hard-coded for specific Grid configurations, platforms and infra-structures. Having neither guidelines nor rules in the design of a Grid-based application is a paradox since there are many existing architectural approaches for distributed computing, which could ease and promote rigorous engineering methods based on the re-use of software components. It is our belief that ad-hoc and semi-formal engineer-ing approaches, in current use, are insufficient to tackle tomorrows Grid develop-ments requirements. Because Grid-based applications address multi-disciplinary and complex domains (health, military, scientific computation), their engineering requires rigor and control. This paper therefore advocates a formal model-driven engineering process and corresponding design framework and tools for building the next generation of Grids.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 11:10:03 GMT" } ]
2007-07-06T00:00:00
[ [ "Manset", "David", "" ], [ "Verjus", "Herve", "" ], [ "McClatchey", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0707.0762
Richard McClatchey
Irfan Habib, Kamran Soomro, Ashiq Anjum, Richard McClatchey, Arshad Ali, Peter Bloodsworth
PhantomOS: A Next Generation Grid Operating System
8 pages, 6 figures. Presented at the UK eScience All Hands Meeting 2007 (AHM07). Nottingham, UK. September 2007
null
null
null
cs.DC
null
Grid Computing has made substantial advances in the past decade; these are primarily due to the adoption of standardized Grid middleware. However Grid computing has not yet become pervasive because of some barriers that we believe have been caused by the adoption of middleware centric approaches. These barriers include: scant support for major types of applications such as interactive applications; lack of flexible, autonomic and scalable Grid architectures; lack of plug-and-play Grid computing and, most importantly, no straightforward way to setup and administer Grids. PhantomOS is a project which aims to address many of these barriers. Its goal is the creation of a user friendly pervasive Grid computing platform that facilitates the rapid deployment and easy maintenance of Grids whilst providing support for major types of applications on Grids of almost any topology. In this paper we present the detailed system architecture and an overview of its implementation.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 11:14:45 GMT" } ]
2007-07-06T00:00:00
[ [ "Habib", "Irfan", "" ], [ "Soomro", "Kamran", "" ], [ "Anjum", "Ashiq", "" ], [ "McClatchey", "Richard", "" ], [ "Ali", "Arshad", "" ], [ "Bloodsworth", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0707.0763
Richard McClatchey
Ashiq Anjum, Peter Bloodsworth, Andrew Branson, Tamas Hauer, Richard McClatchey, Kamran Munir, Dmitry Rogulin, Jetendr Shamdasani
The Requirements for Ontologies in Medical Data Integration: A Case Study
6 pages, 1 figure. Presented at the 11th International Database Engineering & Applications Symposium (Ideas2007). Banff, Canada September 2007
null
null
null
cs.DB
null
Evidence-based medicine is critically dependent on three sources of information: a medical knowledge base, the patients medical record and knowledge of available resources, including where appropriate, clinical protocols. Patient data is often scattered in a variety of databases and may, in a distributed model, be held across several disparate repositories. Consequently addressing the needs of an evidence-based medicine community presents issues of biomedical data integration, clinical interpretation and knowledge management. This paper outlines how the Health-e-Child project has approached the challenge of requirements specification for (bio-) medical data integration, from the level of cellular data, through disease to that of patient and population. The approach is illuminated through the requirements elicitation and analysis of Juvenile Idiopathic Arthritis (JIA), one of three diseases being studied in the EC-funded Health-e-Child project.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 11:21:39 GMT" } ]
2007-07-06T00:00:00
[ [ "Anjum", "Ashiq", "" ], [ "Bloodsworth", "Peter", "" ], [ "Branson", "Andrew", "" ], [ "Hauer", "Tamas", "" ], [ "McClatchey", "Richard", "" ], [ "Munir", "Kamran", "" ], [ "Rogulin", "Dmitry", "" ], [ "Shamdasani", "Jetendr", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0707.0764
Branko Dragovich
Branko Dragovich and Alexandra Dragovich
p-Adic Degeneracy of the Genetic Code
11 pages, 1 table. Published in the Proceedings of '4th Summer School in Modern Mathematcal Physics', September 2006, Belgrade (Serbia)
SFIN XX A1 (2007) 179-188
null
null
q-bio.GN cs.IT math.IT physics.bio-ph
null
Degeneracy of the genetic code is a biological way to minimize effects of the undesirable mutation changes. Degeneration has a natural description on the 5-adic space of 64 codons $\mathcal{C}_5 (64) = \{n_0 + n_1 5 + n_2 5^2 : n_i = 1, 2, 3, 4 \} ,$ where $n_i$ are digits related to nucleotides as follows: C = 1, A = 2, T = U = 3, G = 4. The smallest 5-adic distance between codons joins them into 16 quadruplets, which under 2-adic distance decay into 32 doublets. p-Adically close codons are assigned to one of 20 amino acids, which are building blocks of proteins, or code termination of protein synthesis. We shown that genetic code multiplets are made of the p-adic nearest codons.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 11:40:53 GMT" } ]
2007-07-16T00:00:00
[ [ "Dragovich", "Branko", "" ], [ "Dragovich", "Alexandra", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "physics.bio-ph", "description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.", "span": "(Biological Physics)" } ]
0707.0785
Matthieu Picantin
Matthieu Picantin (LIAFA)
Garside monoids vs divisibility monoids
null
null
null
null
math.GR cs.DM
null
Divisibility monoids (resp. Garside monoids) are a natural algebraic generalization of Mazurkiewicz trace monoids (resp. spherical Artin monoids), namely monoids in which the distributivity of the underlying lattices (resp. the existence of common multiples) is kept as an hypothesis, but the relations between the generators are not supposed to necessarily be commutations (resp. be of Coxeter type). Here, we show that the quasi-center of these monoids can be studied and described similarly, and then we exhibit the intersection between the two classes of monoids.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 13:53:18 GMT" } ]
2007-07-06T00:00:00
[ [ "Picantin", "Matthieu", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.0796
Alessandro Nordio
A. Nordio, C.-F. Chiasserini, E. Viterbo
Performance of Linear Field Reconstruction Techniques with Noise and Uncertain Sensor Locations
null
null
10.1109/TSP.2008.924865
null
cs.OH
null
We consider a wireless sensor network, sampling a bandlimited field, described by a limited number of harmonics. Sensor nodes are irregularly deployed over the area of interest or subject to random motion; in addition sensors measurements are affected by noise. Our goal is to obtain a high quality reconstruction of the field, with the mean square error (MSE) of the estimate as performance metric. In particular, we analytically derive the performance of several reconstruction/estimation techniques based on linear filtering. For each technique, we obtain the MSE, as well as its asymptotic expression in the case where the field number of harmonics and the number of sensors grow to infinity, while their ratio is kept constant. Through numerical simulations, we show the validity of the asymptotic analysis, even for a small number of sensors. We provide some novel guidelines for the design of sensor networks when many parameters, such as field bandwidth, number of sensors, reconstruction quality, sensor motion characteristics, and noise level of the measures, have to be traded off.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 14:58:24 GMT" } ]
2009-11-13T00:00:00
[ [ "Nordio", "A.", "" ], [ "Chiasserini", "C. -F.", "" ], [ "Viterbo", "E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0707.0799
Xinjia Chen
Xinjia Chen, Kemin Zhou and Jorge Aravena
A New Family of Unitary Space-Time Codes with a Fast Parallel Sphere Decoder Algorithm
66 pages, 7 figures
IEEE Transactions on Information Theory, vol. 52, pp. 115-140, January 2006
null
null
cs.IT math.IT
null
In this paper we propose a new design criterion and a new class of unitary signal constellations for differential space-time modulation for multiple-antenna systems over Rayleigh flat-fading channels with unknown fading coefficients. Extensive simulations show that the new codes have significantly better performance than existing codes. We have compared the performance of our codes with differential detection schemes using orthogonal design, Cayley differential codes, fixed-point-free group codes and product of groups and for the same bit error rate, our codes allow smaller signal to noise ratio by as much as 10 dB. The design of the new codes is accomplished in a systematic way through the optimization of a performance index that closely describes the bit error rate as a function of the signal to noise ratio. The new performance index is computationally simple and we have derived analytical expressions for its gradient with respect to constellation parameters. Decoding of the proposed constellations is reduced to a set of one-dimensional closest point problems that we solve using parallel sphere decoder algorithms. This decoding strategy can also improve efficiency of existing codes.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 19:01:53 GMT" } ]
2008-05-12T00:00:00
[ [ "Chen", "Xinjia", "" ], [ "Zhou", "Kemin", "" ], [ "Aravena", "Jorge", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0802
Patricia Reynier
Dinu Coltuc, Jean-Marc Chassery (GIPSA-lab)
Very fast watermarking by reversible contrast mapping
null
IEEE Signal Processing Letters 14, 4 (04/2007) pp 255-258
10.1109/LSP.2006.884895
null
cs.MM cs.CR cs.CV cs.IT math.IT
null
Reversible contrast mapping (RCM) is a simple integer transform that applies to pairs of pixels. For some pairs of pixels, RCM is invertible, even if the least significant bits (LSBs) of the transformed pixels are lost. The data space occupied by the LSBs is suitable for data hiding. The embedded information bit-rates of the proposed spatial domain reversible watermarking scheme are close to the highest bit-rates reported so far. The scheme does not need additional data compression, and, in terms of mathematical complexity, it appears to be the lowest complexity one proposed up to now. A very fast lookup table implementation is proposed. Robustness against cropping can be ensured as well.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 15:11:24 GMT" } ]
2009-11-13T00:00:00
[ [ "Coltuc", "Dinu", "", "GIPSA-lab" ], [ "Chassery", "Jean-Marc", "", "GIPSA-lab" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0805
Xinjia Chen
Xinjia Chen
A New Generalization of Chebyshev Inequality for Random Vectors
7 pages, 1 figure; added some references
null
null
null
math.ST cs.LG math.PR stat.AP stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we derive a new generalization of Chebyshev inequality for random vectors. We demonstrate that the new generalization is much less conservative than the classical generalization.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 15:28:05 GMT" }, { "version": "v2", "created": "Fri, 24 Jun 2011 15:08:17 GMT" } ]
2013-11-05T00:00:00
[ [ "Chen", "Xinjia", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0707.0808
Patrick C. McGuire
Alexandra Bartolo, Patrick C. McGuire, Kenneth P. Camilleri, Christopher Spiteri, Jonathan C. Borg, Philip J. Farrugia, Jens Ormo, Javier Gomez-Elvira, Jose Antonio Rodriguez-Manfredi, Enrique Diaz-Martinez, Helge Ritter, Robert Haschke, Markus Oesker, Joerg Ontrup
The Cyborg Astrobiologist: Porting from a wearable computer to the Astrobiology Phone-cam
15 pages, 4 figures, accepted for publication in the International Journal of Astrobiology
International Journal of Astrobiology, vol. 6, issue 4, pp. 255-261 (2007)
10.1017/S1473550407003862
null
cs.CV astro-ph cs.AI cs.CE cs.HC cs.NI cs.RO cs.SE
null
We have used a simple camera phone to significantly improve an `exploration system' for astrobiology and geology. This camera phone will make it much easier to develop and test computer-vision algorithms for future planetary exploration. We envision that the `Astrobiology Phone-cam' exploration system can be fruitfully used in other problem domains as well.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 15:19:37 GMT" } ]
2010-01-08T00:00:00
[ [ "Bartolo", "Alexandra", "" ], [ "McGuire", "Patrick C.", "" ], [ "Camilleri", "Kenneth P.", "" ], [ "Spiteri", "Christopher", "" ], [ "Borg", "Jonathan C.", "" ], [ "Farrugia", "Philip J.", "" ], [ "Ormo", "Jens", "" ], [ "Gomez-Elvira", "Javier", "" ], [ "Rodriguez-Manfredi", "Jose Antonio", "" ], [ "Diaz-Martinez", "Enrique", "" ], [ "Ritter", "Helge", "" ], [ "Haschke", "Robert", "" ], [ "Oesker", "Markus", "" ], [ "Ontrup", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, null, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0707.0860
Mohammad Asad Rehman Chaudhry
Salim Y. El Rouayheb, Mohammad Asad R. Chaudhry, and Alex Sprintson
On the Minimum Number of Transmissions in Single-Hop Wireless Coding Networks
6 pages
null
null
null
cs.IT cs.NI math.IT
null
The advent of network coding presents promising opportunities in many areas of communication and networking. It has been recently shown that network coding technique can significantly increase the overall throughput of wireless networks by taking advantage of their broadcast nature. In wireless networks, each transmitted packet is broadcasted within a certain area and can be overheard by the neighboring nodes. When a node needs to transmit packets, it employs the opportunistic coding approach that uses the knowledge of what the node's neighbors have heard in order to reduce the number of transmissions. With this approach, each transmitted packet is a linear combination of the original packets over a certain finite field. In this paper, we focus on the fundamental problem of finding the optimal encoding for the broadcasted packets that minimizes the overall number of transmissions. We show that this problem is NP-complete over GF(2) and establish several fundamental properties of the optimal solution. We also propose a simple heuristic solution for the problem based on graph coloring and present some empirical results for random settings.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 19:58:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Rouayheb", "Salim Y. El", "" ], [ "Chaudhry", "Mohammad Asad R.", "" ], [ "Sprintson", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0862
Richard McClatchey
Richard McClatchey, Ashiq Anjum, Heinz Stockinger, Arshad Ali, Ian Willers, Michael Thomas
Scheduling in Data Intensive and Network Aware (DIANA) Grid Environments
22 pages, 14 figures. Early draft of paper to be submitted to Journal of Grid Computing
null
null
null
cs.DC
null
In Grids scheduling decisions are often made on the basis of jobs being either data or computation intensive: in data intensive situations jobs may be pushed to the data and in computation intensive situations data may be pulled to the jobs. This kind of scheduling, in which there is no consideration of network characteristics, can lead to performance degradation in a Grid environment and may result in large processing queues and job execution delays due to site overloads. In this paper we describe a Data Intensive and Network Aware (DIANA) meta-scheduling approach, which takes into account data, processing power and network characteristics when making scheduling decisions across multiple sites. Through a practical implementation on a Grid testbed, we demonstrate that queue and execution times of data-intensive jobs can be significantly improved when we introduce our proposed DIANA scheduler. The basic scheduling decisions are dictated by a weighting factor for each potential target location which is a calculated function of network characteristics, processing cycles and data location and size. The job scheduler provides a global ranking of the computing resources and then selects an optimal one on the basis of this overall access and execution cost. The DIANA approach considers the Grid as a combination of active network elements and takes network characteristics as a first class criterion in the scheduling decision matrix along with computation and data. The scheduler can then make informed decisions by taking into account the changing state of the network, locality and size of the data and the pool of available processing cycles.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 19:46:51 GMT" } ]
2007-07-06T00:00:00
[ [ "McClatchey", "Richard", "" ], [ "Anjum", "Ashiq", "" ], [ "Stockinger", "Heinz", "" ], [ "Ali", "Arshad", "" ], [ "Willers", "Ian", "" ], [ "Thomas", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0707.0871
Gesualdo Scutari
Gesualdo Scutari, Daniel P. Palomar, and Sergio Barbarossa
Optimal Linear Precoding Strategies for Wideband Non-Cooperative Systems based on Game Theory-Part II: Algorithms
Paper submitted to IEEE Transactions on Signal Processing, February 22, 2006. Revised March 26, 2007. Accepted June 5, 2007. To appear on IEEE Transactions on Signal Processing, 2007
null
10.1109/TSP.2007.907808
null
cs.IT cs.GT math.IT
null
In this two-part paper, we address the problem of finding the optimal precoding/multiplexing scheme for a set of non-cooperative links sharing the same physical resources, e.g., time and bandwidth. We consider two alternative optimization problems: P.1) the maximization of mutual information on each link, given constraints on the transmit power and spectral mask; and P.2) the maximization of the transmission rate on each link, using finite order constellations, under the same constraints as in P.1, plus a constraint on the maximum average error probability on each link. Aiming at finding decentralized strategies, we adopted as optimality criterion the achievement of a Nash equilibrium and thus we formulated both problems P.1 and P.2 as strategic noncooperative (matrix-valued) games. In Part I of this two-part paper, after deriving the optimal structure of the linear transceivers for both games, we provided a unified set of sufficient conditions that guarantee the uniqueness of the Nash equilibrium. In this Part II, we focus on the achievement of the equilibrium and propose alternative distributed iterative algorithms that solve both games. Specifically, the new proposed algorithms are the following: 1) the sequential and simultaneous iterative waterfilling based algorithms, incorporating spectral mask constraints; 2) the sequential and simultaneous gradient projection based algorithms, establishing an interesting link with variational inequality problems. Our main contribution is to provide sufficient conditions for the global convergence of all the proposed algorithms which, although derived under stronger constraints, incorporating for example spectral mask constraints, have a broader validity than the convergence conditions known in the current literature for the sequential iterative waterfilling algorithm.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 20:15:04 GMT" } ]
2009-11-13T00:00:00
[ [ "Scutari", "Gesualdo", "" ], [ "Palomar", "Daniel P.", "" ], [ "Barbarossa", "Sergio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0878
Xinjia Chen
Xinjia Chen, Jorge Aravena and Kemin Zhou
Risk Analysis in Robust Control -- Making the Case for Probabilistic Robust Control
22 pages, 2 figures
Proceedings of American Control Conference, pp. 1533-1538, Portland, June 2005.
null
null
math.OC cs.SY math.ST stat.TH
null
This paper offers a critical view of the "worst-case" approach that is the cornerstone of robust control design. It is our contention that a blind acceptance of worst-case scenarios may lead to designs that are actually more dangerous than designs based on probabilistic techniques with a built-in risk factor. The real issue is one of modeling. If one accepts that no mathematical model of uncertainties is perfect then a probabilistic approach can lead to more reliable control even if it cannot guarantee stability for all possible cases. Our presentation is based on case analysis. We first establish that worst-case is not necessarily "all-encompassing." In fact, we show that for some uncertain control problems to have a conventional robust control solution it is necessary to make assumptions that leave out some feasible cases. Once we establish that point, we argue that it is not uncommon for the risk of unaccounted cases in worst-case design to be greater than that of the accepted risk in a probabilistic approach. With an example, we quantify the risks and show that worst-case can be significantly more risky. Finally, we join our analysis with existing results on computational complexity and probabilistic robustness to argue that the deterministic worst-case analysis is not necessarily the better tool.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 21:09:00 GMT" } ]
2013-11-05T00:00:00
[ [ "Chen", "Xinjia", "" ], [ "Aravena", "Jorge", "" ], [ "Zhou", "Kemin", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0707.0890
Martin Bunder
M. W. Bunder and W. M. J.Dekkers
Are there Hilbert-style Pure Type Systems?
Accepted in Logical Methods in Computer Science
Logical Methods in Computer Science, Volume 4, Issue 1 (January 7, 2008) lmcs:839
10.2168/LMCS-4(1:1)2008
null
cs.LO
null
For many a natural deduction style logic there is a Hilbert-style logic that is equivalent to it in that it has the same theorems (i.e. valid judgements with empty contexts). For intuitionistic logic, the axioms of the equivalent Hilbert-style logic can be propositions which are also known as the types of the combinators I, K and S. Hilbert-style versions of illative combinatory logic have formulations with axioms that are actual type statements for I, K and S. As pure type systems (PTSs)are, in a sense, equivalent to systems of illative combinatory logic, it might be thought that Hilbert-style PTSs (HPTSs) could be based in a similar way. This paper shows that some PTSs have very trivial equivalent HPTSs, with only the axioms as theorems and that for many PTSs no equivalent HPTS can exist. Most commonly used PTSs belong to these two classes. For some PTSs however, including lambda* and the PTS at the basis of the proof assistant Coq, there is a nontrivial equivalent HPTS, with axioms that are type statements for I, K and S.
[ { "version": "v1", "created": "Fri, 6 Jul 2007 00:22:59 GMT" }, { "version": "v2", "created": "Mon, 7 Jan 2008 09:36:01 GMT" } ]
2015-07-01T00:00:00
[ [ "Bunder", "M. W.", "" ], [ "Dekkers", "W. M. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.0891
Philip Fellman
Philip V. Fellman
The Nash Equilibrium Revisited: Chaos and Complexity Hidden in Simplicity
13 Pages, 5th International Conference on Complex Systems
InterJournal Complex Systems, 1013, 2004. http://www.interjournal.org/
null
null
cs.GT cs.CC
null
The Nash Equilibrium is a much discussed, deceptively complex, method for the analysis of non-cooperative games. If one reads many of the commonly available definitions the description of the Nash Equilibrium is deceptively simple in appearance. Modern research has discovered a number of new and important complex properties of the Nash Equilibrium, some of which remain as contemporary conundrums of extraordinary difficulty and complexity. Among the recently discovered features which the Nash Equilibrium exhibits under various conditions are heteroclinic Hamiltonian dynamics, a very complex asymptotic structure in the context of two-player bi-matrix games and a number of computationally complex or computationally intractable features in other settings. This paper reviews those findings and then suggests how they may inform various market prediction strategies.
[ { "version": "v1", "created": "Fri, 6 Jul 2007 00:55:01 GMT" } ]
2007-07-09T00:00:00
[ [ "Fellman", "Philip V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0707.0895
Damian H. Zanette
Damian H. Zanette
Segmentation and Context of Literary and Musical Sequences
To appear in Complex Systems
null
null
null
cs.CL physics.data-an
null
We test a segmentation algorithm, based on the calculation of the Jensen-Shannon divergence between probability distributions, to two symbolic sequences of literary and musical origin. The first sequence represents the successive appearance of characters in a theatrical play, and the second represents the succession of tones from the twelve-tone scale in a keyboard sonata. The algorithm divides the sequences into segments of maximal compositional divergence between them. For the play, these segments are related to changes in the frequency of appearance of different characters and in the geographical setting of the action. For the sonata, the segments correspond to tonal domains and reveal in detail the characteristic tonal progression of such kind of musical composition.
[ { "version": "v1", "created": "Fri, 6 Jul 2007 01:45:05 GMT" } ]
2007-07-09T00:00:00
[ [ "Zanette", "Damian H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0707.0909
Jarmo Lund\'en
Jarmo Lund\'en, Visa Koivunen, Anu Huttunen, H. Vincent Poor
Spectrum Sensing in Cognitive Radios Based on Multiple Cyclic Frequencies
To appear in the Proceedings of the Second International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), Orlando, FL, USA, July 31-August 3, 2007
null
null
null
cs.IT math.IT
null
Cognitive radios sense the radio spectrum in order to find unused frequency bands and use them in an agile manner. Transmission by the primary user must be detected reliably even in the low signal-to-noise ratio (SNR) regime and in the face of shadowing and fading. Communication signals are typically cyclostationary, and have many periodic statistical properties related to the symbol rate, the coding and modulation schemes as well as the guard periods, for example. These properties can be exploited in designing a detector, and for distinguishing between the primary and secondary users' signals. In this paper, a generalized likelihood ratio test (GLRT) for detecting the presence of cyclostationarity using multiple cyclic frequencies is proposed. Distributed decision making is employed by combining the quantized local test statistics from many secondary users. User cooperation allows for mitigating the effects of shadowing and provides a larger footprint for the cognitive radio system. Simulation examples demonstrate the resulting performance gains in the low SNR regime and the benefits of cooperative detection.
[ { "version": "v1", "created": "Fri, 6 Jul 2007 07:06:16 GMT" } ]
2007-07-13T00:00:00
[ [ "Lundén", "Jarmo", "" ], [ "Koivunen", "Visa", "" ], [ "Huttunen", "Anu", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0926
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis)
Theorem proving support in programming language semantics
Propos\'e pour publication dans l'ouvrage \`a la m\'emoire de Gilles Kahn
null
null
null
cs.LO cs.PL
null
We describe several views of the semantics of a simple programming language as formal documents in the calculus of inductive constructions that can be verified by the Coq proof system. Covered aspects are natural semantics, denotational semantics, axiomatic semantics, and abstract interpretation. Descriptions as recursive functions are also provided whenever suitable, thus yielding a a verification condition generator and a static analyser that can be run inside the theorem prover for use in reflective proofs. Extraction of an interpreter from the denotational semantics is also described. All different aspects are formally proved sound with respect to the natural semantics specification.
[ { "version": "v1", "created": "Fri, 6 Jul 2007 08:55:26 GMT" }, { "version": "v2", "created": "Tue, 10 Jul 2007 08:09:49 GMT" } ]
2007-07-10T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0707.0969
Yingbin Liang
Yingbin Liang, Venugopal V. Veeravalli, H. Vincent Poor
Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution
To appear in the IEEE Transactions on Information Theory - Special Issue on Models, Theory and Codes for Relaying and Cooperation in Communication Networks, Vol. 53, No. 10, October 2007
null
null
null
cs.IT math.IT
null
As a basic information-theoretic model for fading relay channels, the parallel relay channel is first studied, for which lower and upper bounds on the capacity are derived. For the parallel relay channel with degraded subchannels, the capacity is established, and is further demonstrated via the Gaussian case, for which the synchronized and asynchronized capacities are obtained. The capacity achieving power allocation at the source and relay nodes among the subchannels is characterized. The fading relay channel is then studied, for which resource allocations that maximize the achievable rates are obtained for both the full-duplex and half-duplex cases. Capacities are established for fading relay channels that satisfy certain conditions.
[ { "version": "v1", "created": "Fri, 6 Jul 2007 13:48:54 GMT" } ]
2007-07-13T00:00:00
[ [ "Liang", "Yingbin", "" ], [ "Veeravalli", "Venugopal V.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.0978
Nadia Fawaz
Nadia Fawaz (1), David Gesbert (1), Merouane Debbah (2) ((1) Eurecom Institute, (2) Supelec)
When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network
7 pages, 7 figures
null
null
null
cs.IT math.IT
null
We develop and analyze new cooperative strategies for ad hoc networks that are more spectrally efficient than classical DF cooperative protocols. Using analog network coding, our strategies preserve the practical half-duplex assumption but relax the orthogonality constraint. The introduction of interference due to non-orthogonality is mitigated thanks to precoding, in particular Dirty Paper coding. Combined with smart power allocation, our cooperation strategies allow to save time and lead to more efficient use of bandwidth and to improved network throughput with respect to classical RDF/PDF.
[ { "version": "v1", "created": "Fri, 6 Jul 2007 19:56:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Fawaz", "Nadia", "" ], [ "Gesbert", "David", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]