id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0901.1762
Ki-Moon Lee
Ki-Moon Lee, Hayder Radha, and Beom-Jin Kim
A Tight Estimate for Decoding Error-Probability of LT Codes Using Kovalenko's Rank Distribution
Submitted to ISIT 2009, Seoul, Korea
null
null
null
cs.IT cs.DM math.CO math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
A new approach for estimating the Decoding Error-Probability (DEP) of LT codes with dense rows is derived by using the conditional Kovalenko's rank distribution. The estimate by the proposed approach is very close to the DEP approximated by Gaussian Elimination, and is significantly less complex. As a key application, we utilize the estimates for obtaining optimal LT codes with dense rows, whose DEP is very close to the Kovalenko's Full-Rank Limit within a desired error-bound. Experimental evidences which show the viability of the estimates are also provided.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 10:54:13 GMT" }, { "version": "v2", "created": "Mon, 19 Jan 2009 15:01:25 GMT" } ]
2009-01-19T00:00:00
[ [ "Lee", "Ki-Moon", "" ], [ "Radha", "Hayder", "" ], [ "Kim", "Beom-Jin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1782
Pietro Michiardi Dr.
Claudio Casetti, Carla-Fabiana Chiasserini, Marco Fiore, Chi-Anh La, Pietro Michiardi
A Holistic Approach to Information Distribution in Ad Hoc Networks
null
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the problem of spreading information contents in a wireless ad hoc network with mechanisms embracing the peer-to-peer paradigm. In our vision, information dissemination should satisfy the following requirements: (i) it conforms to a predefined distribution and (ii) it is evenly and fairly carried by all nodes in their turn. In this paper, we observe the dissemination effects when the information moves across nodes according to two well-known mobility models, namely random walk and random direction. Our approach is fully distributed and comes at a very low cost in terms of protocol overhead; in addition, simulation results show that the proposed solution can achieve the aforementioned goals under different network scenarios, provided that a sufficient number of information replicas are injected into the network. This observation calls for a further step: in the realistic case where the user content demand varies over time, we need a content replication/drop strategy to adapt the number of information replicas to the changes in the information query rate. We therefore devise a distributed, lightweight scheme that performs efficiently in a variety of scenarios.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 13:12:05 GMT" } ]
2009-01-14T00:00:00
[ [ "Casetti", "Claudio", "" ], [ "Chiasserini", "Carla-Fabiana", "" ], [ "Fiore", "Marco", "" ], [ "La", "Chi-Anh", "" ], [ "Michiardi", "Pietro", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0901.1821
Didier Henrion
Didier Henrion (LAAS, CTU/FEE)
Semidefinite representation of convex hulls of rational varieties
null
null
null
Rapport LAAS No. 09001
math.OC cs.SY math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using elementary duality properties of positive semidefinite moment matrices and polynomial sum-of-squares decompositions, we prove that the convex hull of rationally parameterized algebraic varieties is semidefinite representable (that is, it can be represented as a projection of an affine section of the cone of positive semidefinite matrices) in the case of (a) curves; (b) hypersurfaces parameterized by quadratics; and (c) hypersurfaces parameterized by bivariate quartics; all in an ambient space of arbitrary dimension.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 16:26:53 GMT" }, { "version": "v2", "created": "Mon, 31 May 2010 09:18:16 GMT" }, { "version": "v3", "created": "Fri, 28 Jan 2011 13:54:52 GMT" } ]
2011-01-31T00:00:00
[ [ "Henrion", "Didier", "", "LAAS, CTU/FEE" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
0901.1824
Carl Bracken
Carl Bracken, Gregor Leander
A Highly Nonlinear Differentially 4 Uniform Power Mapping That Permutes Fields of Even Degree
10 pages, submitted to Finite Fields and Their Applications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Functions with low differential uniformity can be used as the s-boxes of symmetric cryptosystems as they have good resistance to differential attacks. The AES (Advanced Encryption Standard) uses a differentially-4 uniform function called the inverse function. Any function used in a symmetric cryptosystem should be a permutation. Also, it is required that the function is highly nonlinear so that it is resistant to Matsui's linear attack. In this article we demonstrate that a highly nonlinear permutation discovered by Hans Dobbertin has differential uniformity of four and hence, with respect to differential and linear cryptanalysis, is just as suitable for use in a symmetric cryptosystem as the inverse function.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 16:37:17 GMT" } ]
2009-01-14T00:00:00
[ [ "Bracken", "Carl", "" ], [ "Leander", "Gregor", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1827
Carl Bracken
Carl Bracken, Tor Helleseth
Triple-Error-Correcting BCH-Like Codes
7 pages, submitted to ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The binary primitive triple-error-correcting BCH code is a cyclic code of minimum distance 7 with generator polynomial having zeros $\alpha$, $\alpha^3$ and $\alpha^5$ where $\alpha$ is a primitive root of unity. The zero set of the code is said to be {1,3,5}. In the 1970's Kasami showed that one can construct similar triple-error-correcting codes using zero sets consisting of different triples than the BCH codes. Furthermore, in 2000 Chang et. al. found new triples leading to triple-error-correcting codes. In this paper a new such triple is presented. In addition a new method is presented that may be of interest in finding further such triples.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 16:51:51 GMT" } ]
2009-01-14T00:00:00
[ [ "Bracken", "Carl", "" ], [ "Helleseth", "Tor", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1848
Daniel Roche
Mark Giesbrecht and Daniel S. Roche
Detecting lacunary perfect powers and computing their roots
to appear in Journal of Symbolic Computation (JSC), 2011
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider solutions to the equation f = h^r for polynomials f and h and integer r > 1. Given a polynomial f in the lacunary (also called sparse or super-sparse) representation, we first show how to determine if f can be written as h^r and, if so, to find such an r. This is a Monte Carlo randomized algorithm whose cost is polynomial in the number of non-zero terms of f and in log(deg f), i.e., polynomial in the size of the lacunary representation, and it works over GF(q)[x] (for large characteristic) as well as Q[x]. We also give two deterministic algorithms to compute the perfect root h given f and r. The first is output-sensitive (based on the sparsity of h) and works only over Q[x]. A sparsity-sensitive Newton iteration forms the basis for the second approach to computing h, which is extremely efficient and works over both GF(q)[x] (for large characteristic) and Q[x], but depends on a number-theoretic conjecture. Work of Erdos, Schinzel, Zannier, and others suggests that both of these algorithms are unconditionally polynomial-time in the lacunary size of the input polynomial f. Finally, we demonstrate the efficiency of the randomized detection algorithm and the latter perfect root computation algorithm with an implementation in the C++ library NTL.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 18:44:43 GMT" }, { "version": "v2", "created": "Fri, 3 Dec 2010 20:27:03 GMT" } ]
2015-03-13T00:00:00
[ [ "Giesbrecht", "Mark", "" ], [ "Roche", "Daniel S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0901.1849
David Doty
David Doty
Randomized Self-Assembly for Exact Shapes
Conference version accepted to FOCS 2009. Present version accepted to SIAM Journal on Computing, which adds new sections on arbitrary scaled shapes, smooth trade-off between specifying bits of n through concentrations versus hardcoded tile types, and construction that uses concentrations arbitrarily close to uniform to fix potential thermodynamic problems with model
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Working in Winfree's abstract tile assembly model, we show that a constant-size tile assembly system can be programmed through relative tile concentrations to build an n x n square with high probability, for any sufficiently large n. This answers an open question of Kao and Schweller (Randomized Self-Assembly for Approximate Shapes, ICALP 2008), who showed how to build an approximately n x n square using tile concentration programming, and asked whether the approximation could be made exact with high probability. We show how this technique can be modified to answer another question of Kao and Schweller, by showing that a constant-size tile assembly system can be programmed through tile concentrations to assemble arbitrary finite *scaled shapes*, which are shapes modified by replacing each point with a c x c block of points, for some integer c. Furthermore, we exhibit a smooth tradeoff between specifying bits of n via tile concentrations versus specifying them via hard-coded tile types, which allows tile concentration programming to be employed for specifying a fraction of the bits of "input" to a tile assembly system, under the constraint that concentrations can only be specified to a limited precision. Finally, to account for some unrealistic aspects of the tile concentration programming model, we show how to modify the construction to use only concentrations that are arbitrarily close to uniform.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 20:55:01 GMT" }, { "version": "v2", "created": "Wed, 14 Jan 2009 20:06:49 GMT" }, { "version": "v3", "created": "Fri, 27 Feb 2009 05:57:06 GMT" }, { "version": "v4", "created": "Mon, 5 Oct 2009 18:10:14 GMT" }, { "version": "v5", "created": "Mon, 5 Oct 2009 20:16:03 GMT" }, { "version": "v6", "created": "Fri, 16 Jul 2010 18:24:31 GMT" } ]
2015-03-13T00:00:00
[ [ "Doty", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0901.1853
Sidharth Jaggi
Michael Langberg, Sidharth Jaggi, and Bikash Kumar Dey
Binary Causal-Adversary Channels
8 pages, 1 figure, extended version of paper submitted to the International Symposium on Information Theory, 2009 (ISIT2009)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we consider the communication of information in the presence of a causal adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x=(x_1,...,x_n) bit-by-bit over a communication channel. The adversarial jammer can view the transmitted bits x_i one at a time, and can change up to a p-fraction of them. However, the decisions of the jammer must be made in an online or causal manner. Namely, for each bit x_i the jammer's decision on whether to corrupt it or not (and on how to change it) must depend only on x_j for j <= i. This is in contrast to the "classical" adversarial jammer which may base its decisions on its complete knowledge of x. We present a non-trivial upper bound on the amount of information that can be communicated. We show that the achievable rate can be asymptotically no greater than min{1-H(p),(1-4p)^+}. Here H(.) is the binary entropy function, and (1-4p)^+ equals 1-4p for p < 0.25, and 0 otherwise.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 19:36:28 GMT" }, { "version": "v2", "created": "Wed, 28 Jan 2009 05:36:59 GMT" } ]
2009-01-28T00:00:00
[ [ "Langberg", "Michael", "" ], [ "Jaggi", "Sidharth", "" ], [ "Dey", "Bikash Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1864
Ananthanarayanan Chockalingam
N. Srinidhi, Saif K. Mohammed, A. Chockalingam, and B. Sundar Rajan
Low-Complexity Near-ML Decoding of Large Non-Orthogonal STBCs using Reactive Tabu Search
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Non-orthogonal space-time block codes (STBC) with {\em large dimensions} are attractive because they can simultaneously achieve both high spectral efficiencies (same spectral efficiency as in V-BLAST for a given number of transmit antennas) {\em as well as} full transmit diversity. Decoding of non-orthogonal STBCs with large dimensions has been a challenge. In this paper, we present a reactive tabu search (RTS) based algorithm for decoding non-orthogonal STBCs from cyclic division algebras (CDA) having large dimensions. Under i.i.d fading and perfect channel state information at the receiver (CSIR), our simulation results show that RTS based decoding of $12\times 12$ STBC from CDA and 4-QAM with 288 real dimensions achieves $i)$ $10^{-3}$ uncoded BER at an SNR of just 0.5 dB away from SISO AWGN performance, and $ii)$ a coded BER performance close to within about 5 dB of the theoretical MIMO capacity, using rate-3/4 turbo code at a spectral efficiency of 18 bps/Hz. RTS is shown to achieve near SISO AWGN performance with less number of dimensions than with LAS algorithm (which we reported recently) at some extra complexity than LAS. We also report good BER performance of RTS when i.i.d fading and perfect CSIR assumptions are relaxed by considering a spatially correlated MIMO channel model, and by using a training based iterative RTS decoding/channel estimation scheme.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 19:20:36 GMT" } ]
2009-01-14T00:00:00
[ [ "Srinidhi", "N.", "" ], [ "Mohammed", "Saif K.", "" ], [ "Chockalingam", "A.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1866
Mahdi Cheraghchi
Mahdi Cheraghchi
Capacity Achieving Codes From Randomness Condensers
Full version. A preliminary summary of this work appears (under the title "Capacity Achieving Codes From Randomness~Conductors") in proceedings of the 2009 IEEE International Symposium on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish a general framework for construction of small ensembles of capacity achieving linear codes for a wide range of (not necessarily memoryless) discrete symmetric channels, and in particular, the binary erasure and symmetric channels. The main tool used in our constructions is the notion of randomness extractors and lossless condensers that are regarded as central tools in theoretical computer science. Same as random codes, the resulting ensembles preserve their capacity achieving properties under any change of basis. Using known explicit constructions of condensers, we obtain specific ensembles whose size is as small as polynomial in the block length. By applying our construction to Justesen's concatenation scheme (Justesen, 1972) we obtain explicit capacity achieving codes for BEC (resp., BSC) with almost linear time encoding and almost linear time (resp., quadratic time) decoding and exponentially small error probability.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 19:26:58 GMT" }, { "version": "v2", "created": "Fri, 22 Jul 2011 20:07:37 GMT" } ]
2011-07-26T00:00:00
[ [ "Cheraghchi", "Mahdi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1867
Ananthanarayanan Chockalingam
Madhekar Suneel, Pritam Som, A. Chockalingam, and B. Sundar Rajan
Belief Propagation Based Decoding of Large Non-Orthogonal STBCs
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a belief propagation (BP) based algorithm for decoding non-orthogonal space-time block codes (STBC) from cyclic division algebras (CDA) having {\em large dimensions}. The proposed approach involves message passing on Markov random field (MRF) representation of the STBC MIMO system. Adoption of BP approach to decode non-orthogonal STBCs of large dimensions has not been reported so far. Our simulation results show that the proposed BP-based decoding achieves increasingly closer to SISO AWGN performance for increased number of dimensions. In addition, it also achieves near-capacity turbo coded BER performance; for e.g., with BP decoding of $24\times 24$ STBC from CDA using BPSK (i.e., 576 real dimensions) and rate-1/2 turbo code (i.e., 12 bps/Hz spectral efficiency), coded BER performance close to within just about 2.5 dB from the theoretical MIMO capacity is achieved.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 19:33:40 GMT" } ]
2009-01-14T00:00:00
[ [ "Suneel", "Madhekar", "" ], [ "Som", "Pritam", "" ], [ "Chockalingam", "A.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1869
Ananthanarayanan Chockalingam
Saif K. Mohammed, A. Chockalingam, and B. Sundar Rajan
Low-Complexity Near-ML Decoding of Large Non-Orthogonal STBCs Using PDA
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Non-orthogonal space-time block codes (STBC) from cyclic division algebras (CDA) having large dimensions are attractive because they can simultaneously achieve both high spectral efficiencies (same spectral efficiency as in V-BLAST for a given number of transmit antennas) {\em as well as} full transmit diversity. Decoding of non-orthogonal STBCs with hundreds of dimensions has been a challenge. In this paper, we present a probabilistic data association (PDA) based algorithm for decoding non-orthogonal STBCs with large dimensions. Our simulation results show that the proposed PDA-based algorithm achieves near SISO AWGN uncoded BER as well as near-capacity coded BER (within about 5 dB of the theoretical capacity) for large non-orthogonal STBCs from CDA. We study the effect of spatial correlation on the BER, and show that the performance loss due to spatial correlation can be alleviated by providing more receive spatial dimensions. We report good BER performance when a training-based iterative decoding/channel estimation is used (instead of assuming perfect channel knowledge) in channels with large coherence times. A comparison of the performances of the PDA algorithm and the likelihood ascent search (LAS) algorithm (reported in our recent work) is also presented.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 19:45:16 GMT" } ]
2009-01-14T00:00:00
[ [ "Mohammed", "Saif K.", "" ], [ "Chockalingam", "A.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1886
Frederic Didier
Frederic Didier
Efficient erasure decoding of Reed-Solomon codes
4 pages, submitted to ISIT 2009
null
null
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a practical algorithm to decode erasures of Reed-Solomon codes over the q elements binary field in O(q \log_2^2 q) time where the constant implied by the O-notation is very small. Asymptotically fast algorithms based on fast polynomial arithmetic were already known, but even if their complexity is similar, they are mostly impractical. By comparison our algorithm uses only a few Walsh transforms and has been easily implemented.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 17:05:50 GMT" } ]
2009-01-15T00:00:00
[ [ "Didier", "Frederic", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1892
Ramji Venkataramanan
Ramji Venkataramanan and S. Sandeep Pradhan
A New Achievable Rate Region for the Discrete Memoryless Multiple-Access Channel with Noiseless Feedback
appeared in IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, vol. 57, no.12, pp. 8038-8054, Dec. 2011
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new single-letter achievable rate region is proposed for the two-user discrete memoryless multiple-access channel(MAC) with noiseless feedback. The proposed region includes the Cover-Leung rate region [1], and it is shown that the inclusion is strict. The proof uses a block-Markov superposition strategy based on the observation that the messages of the two users are correlated given the feedback. The rates of transmission are too high for each encoder to decode the other's message directly using the feedback, so they transmit correlated information in the next block to learn the message of one another. They then cooperate in the following block to resolve the residual uncertainty of the decoder. The coding scheme may be viewed as a natural generalization of the Cover-Leung scheme with a delay of one extra block and a pair of additional auxiliary random variables. We compute the proposed rate region for two different MACs and compare the results with other known rate regions for the MAC with feedback. Finally, we show how the coding scheme can be extended to obtain larger rate regions with more auxiliary random variables.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 22:02:14 GMT" }, { "version": "v2", "created": "Mon, 13 Dec 2010 23:22:41 GMT" }, { "version": "v3", "created": "Wed, 15 Dec 2010 15:11:39 GMT" }, { "version": "v4", "created": "Fri, 28 Mar 2014 15:26:22 GMT" } ]
2014-03-31T00:00:00
[ [ "Venkataramanan", "Ramji", "" ], [ "Pradhan", "S. Sandeep", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1898
Kiryung Lee
Kiryung Lee, Yoram Bresler
Efficient and Guaranteed Rank Minimization by Atomic Decomposition
submitted to ISIT 2009
null
null
null
math.NA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recht, Fazel, and Parrilo provided an analogy between rank minimization and $\ell_0$-norm minimization. Subject to the rank-restricted isometry property, nuclear norm minimization is a guaranteed algorithm for rank minimization. The resulting semidefinite formulation is a convex problem but in practice the algorithms for it do not scale well to large instances. Instead, we explore missing terms in the analogy and propose a new algorithm which is computationally efficient and also has a performance guarantee. The algorithm is based on the atomic decomposition of the matrix variable and extends the idea in the CoSaMP algorithm for $\ell_0$-norm minimization. Combined with the recent fast low rank approximation of matrices based on randomization, the proposed algorithm can efficiently handle large scale rank minimization problems.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 22:19:18 GMT" }, { "version": "v2", "created": "Fri, 1 May 2009 04:05:55 GMT" } ]
2009-05-01T00:00:00
[ [ "Lee", "Kiryung", "" ], [ "Bresler", "Yoram", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1900
Maxim Raginsky
Rebecca M. Willett and Maxim Raginsky
Performance bounds on compressed sensing with Poisson noise
5 pages; to appear in Proc. ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes performance bounds for compressed sensing in the presence of Poisson noise when the underlying signal, a vector of Poisson intensities, is sparse or compressible (admits a sparse approximation). The signal-independent and bounded noise models used in the literature to analyze the performance of compressed sensing do not accurately model the effects of Poisson noise. However, Poisson noise is an appropriate noise model for a variety of applications, including low-light imaging, where sensing hardware is large or expensive, and limiting the number of measurements collected is important. In this paper, we describe how a feasible positivity-preserving sensing matrix can be constructed, and then analyze the performance of a compressed sensing reconstruction approach for Poisson data that minimizes an objective function consisting of a negative Poisson log likelihood term and a penalty term which could be used as a measure of signal sparsity.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 22:35:48 GMT" }, { "version": "v2", "created": "Fri, 27 Feb 2009 17:51:11 GMT" }, { "version": "v3", "created": "Thu, 30 Apr 2009 15:22:25 GMT" } ]
2009-04-30T00:00:00
[ [ "Willett", "Rebecca M.", "" ], [ "Raginsky", "Maxim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1904
Maxim Raginsky
Maxim Raginsky
Joint universal lossy coding and identification of stationary mixing sources with general alphabets
16 pages, 1 figure; accepted to IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2015987
null
cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of joint universal variable-rate lossy coding and identification for parametric classes of stationary $\beta$-mixing sources with general (Polish) alphabets. Compression performance is measured in terms of Lagrangians, while identification performance is measured by the variational distance between the true source and the estimated source. Provided that the sources are mixing at a sufficiently fast rate and satisfy certain smoothness and Vapnik-Chervonenkis learnability conditions, it is shown that, for bounded metric distortions, there exist universal schemes for joint lossy compression and identification whose Lagrangian redundancies converge to zero as $\sqrt{V_n \log n /n}$ as the block length $n$ tends to infinity, where $V_n$ is the Vapnik-Chervonenkis dimension of a certain class of decision regions defined by the $n$-dimensional marginal distributions of the sources; furthermore, for each $n$, the decoder can identify $n$-dimensional marginal of the active source up to a ball of radius $O(\sqrt{V_n\log n/n})$ in variational distance, eventually with probability one. The results are supplemented by several examples of parametric sources satisfying the regularity conditions.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 22:55:52 GMT" } ]
2016-11-15T00:00:00
[ [ "Raginsky", "Maxim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1905
Maxim Raginsky
Maxim Raginsky
Achievability results for statistical learning under communication constraints
5 pages; to appear in Proc. ISIT 2009
null
null
null
cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of statistical learning is to construct an accurate predictor of a random variable as a function of a correlated random variable on the basis of an i.i.d. training sample from their joint distribution. Allowable predictors are constrained to lie in some specified class, and the goal is to approach asymptotically the performance of the best predictor in the class. We consider two settings in which the learning agent only has access to rate-limited descriptions of the training data, and present information-theoretic bounds on the predictor performance achievable in the presence of these communication constraints. Our proofs do not assume any separation structure between compression and learning and rely on a new class of operational criteria specifically tailored to joint design of encoders and learning algorithms in rate-constrained settings.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 23:03:26 GMT" }, { "version": "v2", "created": "Thu, 30 Apr 2009 15:31:14 GMT" } ]
2009-04-30T00:00:00
[ [ "Raginsky", "Maxim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1906
Jan Cie\'sli\'nski L.
Jan L. Cieslinski, Boguslaw Ratkiewicz
How to improve the accuracy of the discrete gradient method in the one-dimensional case
7 pages plus 7 figures
null
10.1103/PhysRevE.81.016704
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new numerical scheme for one dimensional dynamical systems. This is a modification of the discrete gradient method and keeps its advantages, including the stability and the conservation of the energy integral. However, its accuracy is higher by several orders of magnitude.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 23:16:12 GMT" } ]
2015-05-13T00:00:00
[ [ "Cieslinski", "Jan L.", "" ], [ "Ratkiewicz", "Boguslaw", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0901.1908
Pat Morin
Sebastien Collette, Vida Dujmovic, John Iacono, Stefan Langerman, and Pat Morin
Entropy, Triangulation, and Point Location in Planar Subdivisions
19 pages, 4 figures, lots of formulas
ACM Transactions on Algorithms (TALG), Volume 8 Issue 3, July 2012 Article No. 29
10.1145/2229163.2229173
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A data structure is presented for point location in connected planar subdivisions when the distribution of queries is known in advance. The data structure has an expected query time that is within a constant factor of optimal. More specifically, an algorithm is presented that preprocesses a connected planar subdivision G of size n and a query distribution D to produce a point location data structure for G. The expected number of point-line comparisons performed by this data structure, when the queries are distributed according to D, is H + O(H^{2/3}+1) where H=H(G,D) is a lower bound on the expected number of point-line comparisons performed by any linear decision tree for point location in G under the query distribution D. The preprocessing algorithm runs in O(n log n) time and produces a data structure of size O(n). These results are obtained by creating a Steiner triangulation of G that has near-minimum entropy.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 23:39:46 GMT" } ]
2013-03-12T00:00:00
[ [ "Collette", "Sebastien", "" ], [ "Dujmovic", "Vida", "" ], [ "Iacono", "John", "" ], [ "Langerman", "Stefan", "" ], [ "Morin", "Pat", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0901.1924
Zhen-hai Jing
Zhenhai Jing, Baoming Bai, Xiao Ma, Ying Li
Interference Avoidance Game in the Gaussian Interference Channel: Sub-Optimal and Optimal Schemes
18 pages, 3 figures
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
This paper considers a distributed interference avoidance problem employing frequency assignment in the Gaussian interference channel (IC). We divide the common channel into several subchannels and each user chooses the subchannel with less amount of interference from other users as the transmit channel. This mechanism named interference avoidance in this paper can be modeled as a competitive game model. And a completely autonomous distributed iterative algorithm called Tdistributed interference avoidance algorithm (DIA) is adopted to achieve the Nash equilibriumT (NE) of the game. Due to the self-optimum, DIA is a sub-optimal algorithm. Therefore, through introducing an optimal compensation into the competitive game model, we successfully develop a compensation-based game model to approximate the optimal interference avoidance problem. Moreover, an optimal algorithm called iterative optimal interference avoidance algorithm (IOIA) is proposed to reach the optimality of the interference avoidance scheme. We analyze the implementation complexities of the two algorithms. We also give the proof on the convergence of the proposed algorithms. The performance upper bound and lower bound are also derived for the proposed algorithms. The simulation results show that IOIA does reach the optimality under condition of interference avoidance mechanism.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 03:41:37 GMT" }, { "version": "v2", "created": "Mon, 16 Mar 2009 10:01:51 GMT" }, { "version": "v3", "created": "Sat, 23 May 2009 02:32:57 GMT" }, { "version": "v4", "created": "Mon, 22 Mar 2010 09:10:28 GMT" } ]
2010-03-23T00:00:00
[ [ "Jing", "Zhenhai", "" ], [ "Bai", "Baoming", "" ], [ "Ma", "Xiao", "" ], [ "Li", "Ying", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1936
Rayyan Jaber
Rayyan G. Jaber and Jeffrey G. Andrews
A Lower Bound on the Capacity of Wireless Erasure Networks with Random Node Locations
null
null
null
null
cs.IT cs.NI math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a lower bound on the capacity of wireless ad hoc erasure networks is derived in closed form in the canonical case where $n$ nodes are uniformly and independently distributed in the unit area square. The bound holds almost surely and is asymptotically tight. We assume all nodes have fixed transmit power and hence two nodes should be within a specified distance $r_n$ of each other to overcome noise. In this context, interference determines outages, so we model each transmitter-receiver pair as an erasure channel with a broadcast constraint, i.e. each node can transmit only one signal across all its outgoing links. A lower bound of $\Theta(n r_n)$ for the capacity of this class of networks is derived. If the broadcast constraint is relaxed and each node can send distinct signals on distinct outgoing links, we show that the gain is a function of $r_n$ and the link erasure probabilities, and is at most a constant if the link erasure probabilities grow sufficiently large with $n$. Finally, the case where the erasure probabilities are themselves random variables, for example due to randomness in geometry or channels, is analyzed. We prove somewhat surprisingly that in this setting, variability in erasure probabilities increases network capacity.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 07:29:55 GMT" } ]
2009-01-15T00:00:00
[ [ "Jaber", "Rayyan G.", "" ], [ "Andrews", "Jeffrey G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0901.1945
Michel Fliess
Michel Fliess (LIX, INRIA Saclay - Ile de France), C\'edric Join (INRIA Saclay - Ile de France, CRAN)
A mathematical proof of the existence of trends in financial time series
null
Systems Theory: Modelling, Analysis and Control (2009) 43-62
null
null
q-fin.ST cs.CE math.CA math.PR q-fin.CP stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are settling a longstanding quarrel in quantitative finance by proving the existence of trends in financial time series thanks to a theorem due to P. Cartier and Y. Perrin, which is expressed in the language of nonstandard analysis (Integration over finite sets, F. & M. Diener (Eds): Nonstandard Analysis in Practice, Springer, 1995, pp. 195--204). Those trends, which might coexist with some altered random walk paradigm and efficient market hypothesis, seem nevertheless difficult to reconcile with the celebrated Black-Scholes model. They are estimated via recent techniques stemming from control and signal theory. Several quite convincing computer simulations on the forecast of various financial quantities are depicted. We conclude by discussing the r\^ole of probability theory.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 07:47:18 GMT" } ]
2009-06-01T00:00:00
[ [ "Fliess", "Michel", "", "LIX, INRIA Saclay - Ile de France" ], [ "Join", "Cédric", "", "INRIA Saclay - Ile de France, CRAN" ] ]
[ { "class": "Quantitative Finance", "code": "q-fin.ST", "description": "Statistical, econometric and econophysics analyses with applications to financial markets and economic data", "span": "(Statistical Finance)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Quantitative Finance", "code": "q-fin.CP", "description": "Computational methods, including Monte Carlo, PDE, lattice and other numerical methods with applications to financial modeling", "span": "(Computational Finance)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0901.1954
Hien Ngo Quoc
Hien Quoc Ngo, Tony Q.S. Quek and Hyundong Shin
Two-Way Relay Channels: Error Exponents and Resource Allocation
30 pages, 9 figures, submitted to IEEE Transactions on Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a two-way relay network, two terminals exchange information over a shared wireless half-duplex channel with the help of a relay. Due to its fundamental and practical importance, there has been an increasing interest in this channel. However, surprisingly, there has been little work that characterizes the fundamental tradeoff between the communication reliability and transmission rate across all signal-to-noise ratios. In this paper, we consider amplify-and-forward (AF) two-way relaying due to its simplicity. We first derive the random coding error exponent for the link in each direction. From the exponent expression, the capacity and cutoff rate for each link are also deduced. We then put forth the notion of the bottleneck error exponent, which is the worst exponent decay between the two links, to give us insight into the fundamental tradeoff between the rate pair and information-exchange reliability of the two terminals. As applications of the error exponent analysis, we present two optimal resource allocations to maximize the bottleneck error exponent: i) the optimal rate allocation under a sum-rate constraint and its closed-form quasi-optimal solution that requires only knowledge of the capacity and cutoff rate of each link; and ii) the optimal power allocation under a total power constraint, which is formulated as a quasi-convex optimization problem. Numerical results verify our analysis and the effectiveness of the optimal rate and power allocations in maximizing the bottleneck error exponent.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 09:03:06 GMT" }, { "version": "v2", "created": "Tue, 24 Feb 2009 04:37:16 GMT" } ]
2009-02-24T00:00:00
[ [ "Ngo", "Hien Quoc", "" ], [ "Quek", "Tony Q. S.", "" ], [ "Shin", "Hyundong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1964
Jungwon Lee
Jungwon Lee, Dimitris Toumpakaris, Hui-Ling Lou
Optimal Detector for Channels with Non-Gaussian Interference
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The detection problem in the Gaussian interference channel is addressed, when transmitters employ non-Gaussian schemes designed for the single-user Gaussian channel. A structure consisting of a separate symbol-by-symbol detector and a hard decoder is considered. Given this structure, an optimal detector is presented that is compared to an interferenceunaware conventional detector, an interference-aware successive interference cancellation (SIC) detector, and a minimum-distance detector. It is demonstrated analytically and by simulation that the optimal detector outperforms both the conventional and the SIC detector, and that it attains decreasing symbol error rates even in the presence of strong interference. Moreover, the minimum-distance detector performs almost as well as the optimal detector in most scenarios and is significantly less complex.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 09:44:27 GMT" }, { "version": "v2", "created": "Thu, 9 Jul 2009 17:33:25 GMT" } ]
2009-07-09T00:00:00
[ [ "Lee", "Jungwon", "" ], [ "Toumpakaris", "Dimitris", "" ], [ "Lou", "Hui-Ling", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1971
Min-Zheng Shieh
Min-Zheng Shieh and Shi-Chun Tsai
Decoding Frequency Permutation Arrays under Infinite norm
Submitted to ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A frequency permutation array (FPA) of length $n=m\lambda$ and distance $d$ is a set of permutations on a multiset over $m$ symbols, where each symbol appears exactly $\lambda$ times and the distance between any two elements in the array is at least $d$. FPA generalizes the notion of permutation array. In this paper, under the distance metric $\ell_\infty$-norm, we first prove lower and upper bounds on the size of FPA. Then we give a construction of FPA with efficient encoding and decoding capabilities. Moreover, we show our design is locally decodable, i.e., we can decode a message bit by reading at most $\lambda+1$ symbols, which has an interesting application for private information retrieval.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 10:59:53 GMT" } ]
2009-01-15T00:00:00
[ [ "Shieh", "Min-Zheng", "" ], [ "Tsai", "Shi-Chun", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.1988
Yasutada Oohama
Yasutada Oohama
Many-Help-One Problem for Gaussian Sources with a Tree Structure on their Correlation
17 pages, 4 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the separate coding problem for $L+1$ correlated Gaussian memoryless sources. We deal with the case where $L$ separately encoded data of sources work as side information at the decoder for the reconstruction of the remaining source. The determination problem of the rate distortion region for this system is the so called many-help-one problem and has been known as a highly challenging problem. The author determined the rate distortion region in the case where the $L$ sources working as partial side information are conditionally independent if the remaining source we wish to reconstruct is given. This condition on the correlation is called the CI condition. In this paper we extend the author's previous result to the case where $L+1$ sources satisfy a kind of tree structure on their correlation. We call this tree structure of information sources the TS condition, which contains the CI condition as a special case. In this paper we derive an explicit outer bound of the rate distortion region when information sources satisfy the TS condition. We further derive an explicit sufficient condtion for this outer bound to be tight. In particular, we determine the sum rate part of the rate distortion region for the case where information sources satisfy the TS condition. For some class of Gaussian sources with the TS condition we derive an explicit recursive formula of this sum rate part.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 12:54:12 GMT" }, { "version": "v2", "created": "Sun, 5 Apr 2009 06:35:28 GMT" } ]
2009-04-05T00:00:00
[ [ "Oohama", "Yasutada", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2042
Eduard Jorswieck
Eduard Jorswieck and Martin Mittelbach
Average Capacity Analysis of Continuous-Time Frequency-Selective Rayleigh Fading Channels with Correlated Scattering Using Majorization
5 pages, 3 figures, submitted to ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Correlated scattering occurs naturally in frequency-selective fading channels and its impact on the performance needs to be understood. In particular, we answer the question whether the uncorrelated scattering model leads to an optimistic or pessimistic estimation of the actual average capacity. In the paper, we use majorization for functions to show that the average rate with perfectly informed receiver is largest for uncorrelated scattering if the transmitter is uninformed. If the transmitter knows the channel statistics, it can exploit this knowledge. We show that for small SNR, the behavior is opposite, uncorrelated scattering leads to a lower bound on the average capacity. Finally, we provide an example of the theoretical results for an attenuated Ornstein-Uhlenbeck process including illustrations.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 15:29:35 GMT" }, { "version": "v2", "created": "Mon, 19 Jan 2009 11:20:43 GMT" } ]
2009-01-19T00:00:00
[ [ "Jorswieck", "Eduard", "" ], [ "Mittelbach", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2062
Yanling Chen
Yanling Chen and Han Vinck
Notes on Reed-Muller Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the Reed-Muller (RM) codes. For the first order RM code, we prove that it is unique in the sense that any linear code with the same length, dimension and minimum distance must be the first order RM code; For the second order RM code, we give a constructive linear sub-code family for the case when m is even. This is an extension of Corollary 17 of Ch. 15 in the coding book by MacWilliams and Sloane. Furthermore, we show that the specified sub-codes of length <= 256 have minimum distance equal to the upper bound or the best known lower bound for all linear codes of the same length and dimension. As another interesting result, we derive an additive commutative group of the symplectic matrices with full rank.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 16:47:41 GMT" }, { "version": "v2", "created": "Thu, 30 Apr 2009 14:40:19 GMT" } ]
2009-04-30T00:00:00
[ [ "Chen", "Yanling", "" ], [ "Vinck", "Han", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2068
Ji\v{r}\'i Srba
Ji\v{r}\'i Srba
Beyond Language Equivalence on Visibly Pushdown Automata
Final version of paper, accepted by LMCS
Logical Methods in Computer Science, Volume 5, Issue 1 (January 26, 2009) lmcs:756
10.2168/LMCS-5(1:2)2009
null
cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study (bi)simulation-like preorder/equivalence checking on the class of visibly pushdown automata and its natural subclasses visibly BPA (Basic Process Algebra) and visibly one-counter automata. We describe generic methods for proving complexity upper and lower bounds for a number of studied preorders and equivalences like simulation, completed simulation, ready simulation, 2-nested simulation preorders/equivalences and bisimulation equivalence. Our main results are that all the mentioned equivalences and preorders are EXPTIME-complete on visibly pushdown automata, PSPACE-complete on visibly one-counter automata and P-complete on visibly BPA. Our PSPACE lower bound for visibly one-counter automata improves also the previously known DP-hardness results for ordinary one-counter automata and one-counter nets. Finally, we study regularity checking problems for visibly pushdown automata and show that they can be decided in polynomial time.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 17:28:17 GMT" }, { "version": "v2", "created": "Mon, 26 Jan 2009 10:16:05 GMT" } ]
2015-07-01T00:00:00
[ [ "Srba", "Jiří", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0901.2069
Edmund Kirwan
Edmund Kirwan
Encapsulation theory: the transformation equations of absolute information hiding
31 pages, 7 figures
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes how the maximum potential number of edges of an encapsulated graph varies as the graph is transformed, that is, as nodes are created and modified. The equations governing these changes of maximum potential number of edges caused by the transformations are derived and briefly analysed.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 17:28:18 GMT" } ]
2009-01-15T00:00:00
[ [ "Kirwan", "Edmund", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0901.2082
Salman Avestimehr
Salman Avestimehr, Giuseppe Caire, David Tse
On Source-Channel Separation in Networks
This paper has been withdrawn
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 18:29:11 GMT" }, { "version": "v2", "created": "Thu, 15 Jan 2009 05:25:39 GMT" } ]
2009-01-15T00:00:00
[ [ "Avestimehr", "Salman", "" ], [ "Caire", "Giuseppe", "" ], [ "Tse", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2090
Lucile Sassatelli
Lucile Sassatelli, Shashi Kiran Chilappagari, Bane Vasic, David Declercq
Two-Bit Message Passing Decoders for LDPC Codes Over the Binary Symmetric Channel
submitted to IEEE Transactions on Communications
null
10.1109/ISIT.2009.5205790
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider quantized decoding of LDPC codes on the binary symmetric channel. The binary message passing algorithms, while allowing extremely fast hardware implementation, are not very attractive from the perspective of performance. More complex decoders such as the ones based on belief propagation exhibit superior performance but lead to slower decoders. The approach in this paper is to consider message passing decoders that have larger message alphabet (thereby providing performance improvement) as well as low complexity (thereby ensuring fast decoding). We propose a class of message-passing decoders whose messages are represented by two bits. The thresholds for various decoders in this class are derived using density evolution. The problem of correcting a fixed number of errors assumes significance in the error floor region. For a specific decoder, the sufficient conditions for correcting all patterns with up to three errors are derived. By comparing these conditions and thresholds to the similar ones when Gallager B decoder is used, we emphasize the advantage of decoding on a higher number of bits, even if the channel observation is still one bit.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 18:59:53 GMT" }, { "version": "v2", "created": "Fri, 27 Feb 2009 16:39:08 GMT" }, { "version": "v3", "created": "Sat, 7 Mar 2009 01:46:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Sassatelli", "Lucile", "" ], [ "Chilappagari", "Shashi Kiran", "" ], [ "Vasic", "Bane", "" ], [ "Declercq", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2094
Rohit Negi
Yaron Rachlin, Rohit Negi, Pradeep Khosla
The Sensing Capacity of Sensor Networks
Submitted to IEEE Transactions on Information Theory, November 2006
null
10.1109/TIT.2010.2103733
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper demonstrates fundamental limits of sensor networks for detection problems where the number of hypotheses is exponentially large. Such problems characterize many important applications including detection and classification of targets in a geographical area using a network of sensors, and detecting complex substances with a chemical sensor array. We refer to such applications as largescale detection problems. Using the insight that these problems share fundamental similarities with the problem of communicating over a noisy channel, we define a quantity called the sensing capacity and lower bound it for a number of sensor network models. The sensing capacity expression differs significantly from the channel capacity due to the fact that a fixed sensor configuration encodes all states of the environment. As a result, codewords are dependent and non-identically distributed. The sensing capacity provides a bound on the minimal number of sensors required to detect the state of an environment to within a desired accuracy. The results differ significantly from classical detection theory, and provide an ntriguing connection between sensor networks and communications. In addition, we discuss the insight that sensing capacity provides for the problem of sensor selection.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 19:17:29 GMT" } ]
2016-11-17T00:00:00
[ [ "Rachlin", "Yaron", "" ], [ "Negi", "Rohit", "" ], [ "Khosla", "Pradeep", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2120
Mahdi Cheraghchi
Mahdi Cheraghchi, Frederic Didier, Amin Shokrollahi
Invertible Extractors and Wiretap Protocols
Full version. A preliminary summary of this work appears (under the same title) in proceedings of the 2009 IEEE International Symposium on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A wiretap protocol is a pair of randomized encoding and decoding functions such that knowledge of a bounded fraction of the encoding of a message reveals essentially no information about the message, while knowledge of the entire encoding reveals the message using the decoder. In this paper we study the notion of efficiently invertible extractors and show that a wiretap protocol can be constructed from such an extractor. We will then construct invertible extractors for symbol-fixing, affine, and general sources and apply them to create wiretap protocols with asymptotically optimal trade-offs between their rate (ratio of the length of the message versus its encoding) and resilience (ratio of the observed positions of the encoding and the length of the encoding). We will then apply our results to create wiretap protocols for challenging communication problems, such as active intruders who change portions of the encoding, network coding, and intruders observing arbitrary boolean functions of the encoding. As a by-product of our constructions we obtain new explicit extractors for a restricted family of affine sources over large fields (that in particular generalizes the notion of symbol-fixing sources) which is of independent interest. These extractors are able to extract the entire source entropy with zero error. Keywords: Wiretap Channel, Extractors, Network Coding, Active Intrusion, Exposure Resilient Cryptography.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 21:21:05 GMT" }, { "version": "v2", "created": "Fri, 22 Jul 2011 20:21:34 GMT" } ]
2011-07-26T00:00:00
[ [ "Cheraghchi", "Mahdi", "" ], [ "Didier", "Frederic", "" ], [ "Shokrollahi", "Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2130
Lenka Zdeborova
Florent Krzakala and Lenka Zdeborov\'a
Hiding Quiet Solutions in Random Constraint Satisfaction Problems
4 pages, 3 figures
Phys. Rev. Lett. 102, 238701 (2009)
10.1103/PhysRevLett.102.238701
null
cond-mat.stat-mech cond-mat.dis-nn cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study constraint satisfaction problems on the so-called 'planted' random ensemble. We show that for a certain class of problems, e.g. graph coloring, many of the properties of the usual random ensemble are quantitatively identical in the planted random ensemble. We study the structural phase transitions, and the easy/hard/easy pattern in the average computational complexity. We also discuss the finite temperature phase diagram, finding a close connection with the liquid/glass/solid phenomenology.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 21:47:05 GMT" }, { "version": "v2", "created": "Wed, 27 May 2009 18:32:00 GMT" } ]
2009-06-13T00:00:00
[ [ "Krzakala", "Florent", "" ], [ "Zdeborová", "Lenka", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0901.2140
David Elkouss Coronas
David Elkouss, Anthony Leverrier, Romain All\'eaume, Joseph Boutros
Efficient reconciliation protocol for discrete-variable quantum key distribution
null
null
10.1109/ISIT.2009.5205475
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reconciliation is an essential part of any secret-key agreement protocol and hence of a Quantum Key Distribution (QKD) protocol, where two legitimate parties are given correlated data and want to agree on a common string in the presence of an adversary, while revealing a minimum amount of information. In this paper, we show that for discrete-variable QKD protocols, this problem can be advantageously solved with Low Density Parity Check (LDPC) codes optimized for the BSC. In particular, we demonstrate that our method leads to a significant improvement of the achievable secret key rate, with respect to earlier interactive reconciliation methods used in QKD.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 23:07:59 GMT" } ]
2011-04-01T00:00:00
[ [ "Elkouss", "David", "" ], [ "Leverrier", "Anthony", "" ], [ "Alléaume", "Romain", "" ], [ "Boutros", "Joseph", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0901.2143
Christopher Chang
Christopher S. Chang, Matthew A. Klimesh
Coding for Parallel Links to Maximize Expected Decodable-Message Value
7 pages, submitted to ISIT2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Future communication scenarios for NASA spacecraft may involve multiple communication links and relay nodes, so that there is essentially a network in which there may be multiple paths from a sender to a destination. The availability of individual links may be uncertain. In this paper, scenarios are considered in which the goal is to maximize a payoff that assigns weight based on the worth of data and the probability of successful transmission. Ideally, the choice of what information to send over the various links will provide protection of high value data when many links are unavailable, yet result in communication of significant additional data when most links are available. Here the focus is on the simple network of multiple parallel links, where the links have known capacities and outage probabilities. Given a set of simple inter-link codes, linear programming can be used to find the optimal timesharing strategy among these codes. Some observations are made about the problem of determining all potentially useful codes, and techniques to assist in such determination are presented.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 23:20:04 GMT" } ]
2009-01-16T00:00:00
[ [ "Chang", "Christopher S.", "" ], [ "Klimesh", "Matthew A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2147
Mahdi Cheraghchi
Ehsan Ardestanizadeh, Mahdi Cheraghchi, Amin Shokrollahi
Bit Precision Analysis for Compressed Sensing
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the stability of some reconstruction algorithms for compressed sensing in terms of the bit precision. Considering the fact that practical digital systems deal with discretized signals, we motivate the importance of the total number of accurate bits needed from the measurement outcomes in addition to the number of measurements. It is shown that if one uses a $2k \times n$ Vandermonde matrix with roots on the unit circle as the measurement matrix, $O(\ell + k \log(n/k))$ bits of precision per measurement are sufficient to reconstruct a $k$-sparse signal $x \in \R^n$ with dynamic range (i.e., the absolute ratio between the largest and the smallest nonzero coefficients) at most $2^\ell$ within $\ell$ bits of precision, hence identifying its correct support. Finally, we obtain an upper bound on the total number of required bits when the measurement matrix satisfies a restricted isometry property, which is in particular the case for random Fourier and Gaussian matrices. For very sparse signals, the upper bound on the number of required bits for Vandermonde matrices is shown to be better than this general upper bound.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 00:05:07 GMT" } ]
2009-01-16T00:00:00
[ [ "Ardestanizadeh", "Ehsan", "" ], [ "Cheraghchi", "Mahdi", "" ], [ "Shokrollahi", "Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2151
Bogdan Danila
Yudong Sun, Bogdan Danila, Kresimir Josic, and Kevin E. Bassler
Improved community structure detection using a modified fine tuning strategy
6 pages, 3 figures, 1 table
null
10.1209/0295-5075/86/28004
null
cs.CY cond-mat.stat-mech cs.DS physics.comp-ph physics.soc-ph q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The community structure of a complex network can be determined by finding the partitioning of its nodes that maximizes modularity. Many of the proposed algorithms for doing this work by recursively bisecting the network. We show that this unduely constrains their results, leading to a bias in the size of the communities they find and limiting their effectivness. To solve this problem, we propose adding a step to the existing algorithms that does not increase the order of their computational complexity. We show that, if this step is combined with a commonly used method, the identified constraint and resulting bias are removed, and its ability to find the optimal partitioning is improved. The effectiveness of this combined algorithm is also demonstrated by using it on real-world example networks. For a number of these examples, it achieves the best results of any known algorithm.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 00:40:26 GMT" } ]
2015-05-13T00:00:00
[ [ "Sun", "Yudong", "" ], [ "Danila", "Bogdan", "" ], [ "Josic", "Kresimir", "" ], [ "Bassler", "Kevin E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0901.2160
RadhaKrishna Ganti
Radha Krishna Ganti and Martin Haenggi
Analysis of Uncoordinated Opportunistic Two-Hop Wireless Ad Hoc Systems
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a time-slotted two-hop wireless system in which the sources transmit to the relays in the even time slots (first hop) and the relays forward the packets to the destinations in the odd time slots (second hop). Each source may connect to multiple relays in the first hop. In the presence of interference and without tight coordination of the relays, it is not clear which relays should transmit the packet. We propose four decentralized methods of relay selection, some based on location information and others based on the received signal strength (RSS). We provide a complete analytical characterization of these methods using tools from stochastic geometry. We use simulation results to compare these methods in terms of end-to-end success probability.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 01:50:55 GMT" } ]
2009-01-16T00:00:00
[ [ "Ganti", "Radha Krishna", "" ], [ "Haenggi", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2164
Vinayak Nagpal
Vinayak Nagpal, Sameer Pawar, David Tse, Borivoje Nikolic
Cooperative Multiplexing in the Multiple Antenna Half Duplex Relay Channel
5 pages, 5 figures submitted to ISIT 2009
Information Theory, 2009. ISIT 2009. IEEE International Symposium on, vol., no., pp.1438-1442, June 28 2009-July 3 2009
10.1109/ISIT.2009.5205885
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cooperation between terminals has been proposed to improve the reliability and throughput of wireless communication. While recent work has shown that relay cooperation provides increased diversity, increased multiplexing gain over that offered by direct link has largely been unexplored. In this work we show that cooperative multiplexing gain can be achieved by using a half duplex relay. We capture relative distances between terminals in the high SNR diversity multiplexing tradeoff (DMT) framework. The DMT performance is then characterized for a network having a single antenna half-duplex relay between a single-antenna source and two-antenna destination. Our results show that the achievable multiplexing gain using cooperation can be greater than that of the direct link and is a function of the relative distance between source and relay compared to the destination. Moreover, for multiplexing gains less than 1, a simple scheme of the relay listening 1/3 of the time and transmitting 2/3 of the time can achieve the 2 by 2 MIMO DMT.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 02:16:05 GMT" } ]
2009-09-10T00:00:00
[ [ "Nagpal", "Vinayak", "" ], [ "Pawar", "Sameer", "" ], [ "Tse", "David", "" ], [ "Nikolic", "Borivoje", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2166
Alwen Tiu
Alwen Tiu
A Trace Based Bisimulation for the Spi Calculus
This is a revised and extended version of a conference paper presented at APLAS 2007
null
null
null
cs.CR cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A notion of open bisimulation is formulated for the spi calculus, an extension of the pi-calculus with cryptographic primitives. In this formulation, open bisimulation is indexed by pairs of symbolic traces, which represent the history of interactions between the environment with the pairs of processes being checked for bisimilarity. The use of symbolic traces allows for a symbolic treatment of bound input in bisimulation checking which avoids quantification over input values. Open bisimilarity is shown to be sound with respect to testing equivalence, and futher, it is shown to be an equivalence relation on processes and a congruence relation on finite processes. As far as we know, this is the first formulation of open bisimulation for the spi calculus for which the congruence result is proved.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 02:21:19 GMT" } ]
2009-01-16T00:00:00
[ [ "Tiu", "Alwen", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0901.2192
Hongsong Shi
Hongsong Shi, Shaoquan Jiang, Rei Safavi-Naini, Mohammed Ashraful Tuhin
On Optimal Secure Message Transmission by Public Discussion
An extended abstract of the older version was published in ISIT'09. The new version is polished in the writing style while some new results are also added
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a secure message transmission (SMT) scenario a sender wants to send a message in a private and reliable way to a receiver. Sender and receiver are connected by $n$ vertex disjoint paths, referred to as wires, $t$ of which can be controlled by an adaptive adversary with unlimited computational resources. In Eurocrypt 2008, Garay and Ostrovsky considered an SMT scenario where sender and receiver have access to a public discussion channel and showed that secure and reliable communication is possible when $n \geq t+1$. In this paper we will show that a secure protocol requires at least 3 rounds of communication and 2 rounds invocation of the public channel and hence give a complete answer to the open question raised by Garay and Ostrovsky. We also describe a round optimal protocol that has \emph{constant} transmission rate over the public channel.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 07:01:24 GMT" }, { "version": "v2", "created": "Sun, 8 Nov 2009 04:15:07 GMT" } ]
2009-11-08T00:00:00
[ [ "Shi", "Hongsong", "" ], [ "Jiang", "Shaoquan", "" ], [ "Safavi-Naini", "Rei", "" ], [ "Tuhin", "Mohammed Ashraful", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2194
Rui Zhang
Rui Zhang and John Cioffi
Iterative Spectrum Shaping with Opportunistic Multiuser Detection
7 figures, 24 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies a new decentralized resource allocation strategy, named iterative spectrum shaping (ISS), for the multi-carrier-based multiuser communication system, where two coexisting users independently and sequentially update transmit power allocations over parallel subcarriers to maximize their individual transmit rates. Unlike the conventional iterative water-filling (IWF) algorithm that applies the single-user detection (SD) at each user's receiver by treating the interference from the other user as additional noise, the proposed ISS algorithm applies multiuser detection techniques to decode both the desired user's and interference user's messages if it is feasible, thus termed as opportunistic multiuser detection (OMD). Two encoding methods are considered for ISS: One is carrier independent encoding where independent codewords are modulated by different subcarriers for which different decoding methods can be applied; the other is carrier joint encoding where a single codeword is modulated by all the subcarriers for which a single decoder is applied. For each encoding method, this paper presents the associated optimal user power and rate allocation strategy at each iteration of transmit adaptation. It is shown that under many circumstances the proposed ISS algorithm employing OMD is able to achieve substantial throughput gains over the conventional IWF algorithm employing SD for decentralized spectrum sharing. Applications of ISS in cognitive radio communication systems are also discussed.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 08:10:36 GMT" } ]
2009-01-16T00:00:00
[ [ "Zhang", "Rui", "" ], [ "Cioffi", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2198
Bikash Kumar Dey
Brijesh Kumar Rai and Bikash Kumar Dey
Feasible alphabets for communicating the sum of sources over a network
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider directed acyclic {\em sum-networks} with $m$ sources and $n$ terminals where the sources generate symbols from an arbitrary alphabet field $F$, and the terminals need to recover the sum of the sources over $F$. We show that for any co-finite set of primes, there is a sum-network which is solvable only over fields of characteristics belonging to that set. We further construct a sum-network where a scalar solution exists over all fields other than the binary field $F_2$. We also show that a sum-network is solvable over a field if and only if its reverse network is solvable over the same field.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 08:20:25 GMT" } ]
2009-01-16T00:00:00
[ [ "Rai", "Brijesh Kumar", "" ], [ "Dey", "Bikash Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2204
Ryuhei Mori
Ryuhei Mori, Toshiyuki Tanaka, Kenta Kasai, and Kohichi Sakaniwa
Finite-Length Analysis of Irregular Expurgated LDPC Codes under Finite Number of Iterations
5 pages, 3 figures, submitted to ISIT2009; revised
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Communication over the binary erasure channel (BEC) using low-density parity-check (LDPC) codes and belief propagation (BP) decoding is considered. The average bit error probability of an irregular LDPC code ensemble after a fixed number of iterations converges to a limit, which is calculated via density evolution, as the blocklength $n$ tends to infinity. The difference between the bit error probability with blocklength $n$ and the large-blocklength limit behaves asymptotically like $\alpha/n$, where the coefficient $\alpha$ depends on the ensemble, the number of iterations and the erasure probability of the BEC\null. In [1], $\alpha$ is calculated for regular ensembles. In this paper, $\alpha$ for irregular expurgated ensembles is derived. It is demonstrated that convergence of numerical estimates of $\alpha$ to the analytic result is significantly fast for irregular unexpurgated ensembles.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 09:29:05 GMT" }, { "version": "v2", "created": "Sat, 23 May 2009 09:28:12 GMT" } ]
2009-05-23T00:00:00
[ [ "Mori", "Ryuhei", "" ], [ "Tanaka", "Toshiyuki", "" ], [ "Kasai", "Kenta", "" ], [ "Sakaniwa", "Kohichi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2207
Ryuhei Mori
Ryuhei Mori and Toshiyuki Tanaka
Performance and Construction of Polar Codes on Symmetric Binary-Input Memoryless Channels
5 pages, 3 figures, submitted to ISIT2009; revised
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Channel polarization is a method of constructing capacity achieving codes for symmetric binary-input discrete memoryless channels (B-DMCs) [1]. In the original paper, the construction complexity is exponential in the blocklength. In this paper, a new construction method for arbitrary symmetric binary memoryless channel (B-MC) with linear complexity in the blocklength is proposed. Furthermore, new upper and lower bounds of the block error probability of polar codes are derived for the BEC and the arbitrary symmetric B-MC, respectively.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 17:08:36 GMT" }, { "version": "v2", "created": "Sat, 23 May 2009 09:21:04 GMT" } ]
2009-05-23T00:00:00
[ [ "Mori", "Ryuhei", "" ], [ "Tanaka", "Toshiyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2216
Animesh Mukherjee
Animesh Mukherjee, Monojit Choudhury and Ravi Kannan
Discovering Global Patterns in Linguistic Networks through Spectral Analysis: A Case Study of the Consonant Inventories
In the proceedings of EACL 2009
null
null
null
cs.CL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent research has shown that language and the socio-cognitive phenomena associated with it can be aptly modeled and visualized through networks of linguistic entities. However, most of the existing works on linguistic networks focus only on the local properties of the networks. This study is an attempt to analyze the structure of languages via a purely structural technique, namely spectral analysis, which is ideally suited for discovering the global correlations in a network. Application of this technique to PhoNet, the co-occurrence network of consonants, not only reveals several natural linguistic principles governing the structure of the consonant inventories, but is also able to quantify their relative importance. We believe that this powerful technique can be successfully applied, in general, to study the structure of natural languages.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 10:22:28 GMT" } ]
2009-01-18T00:00:00
[ [ "Mukherjee", "Animesh", "" ], [ "Choudhury", "Monojit", "" ], [ "Kannan", "Ravi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0901.2218
Mohammad Hossein Yassaee
Mohammad Hossein Yassaee, Mohammad Reza Aref
Slepian-Wolf Coding over Cooperative Networks
5 pages, submitted to ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present sufficient conditions for multicasting a set of correlated sources over cooperative networks. We propose joint source-Wyner-Ziv encoding/sliding-window decoding scheme, in which each receiver considers an ordered partition of other nodes. Subject to this scheme, we obtain a set of feasibility constraints for each ordered partition. We consolidate the results of different ordered partitions by utilizing a result of geometrical approach to obtain the sufficient conditions. We observe that these sufficient conditions are indeed necessary conditions for Aref networks. As a consequence of the main result, we obtain an achievable rate region for networks with multicast demands. Also, we deduce an achievability result for two-way relay networks, in which two nodes want to communicate over a relay network.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 10:26:26 GMT" } ]
2009-01-16T00:00:00
[ [ "Yassaee", "Mohammad Hossein", "" ], [ "Aref", "Mohammad Reza", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2224
Alexandr Savinov
Alexandr Savinov
Concept-Oriented Model and Query Language
45 pages, 18 figures, Submitted to ACM Transactions on Database Systems (TODS)
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new approach to data modeling, called the concept-oriented model (COM), and a novel concept-oriented query language (COQL). The model is based on three principles: duality principle postulates that any element is a couple consisting of one identity and one entity, inclusion principle postulates that any element has a super-element, and order principle assumes that any element has a number of greater elements within a partially ordered set. Concept-oriented query language is based on a new data modeling construct, called concept, inclusion relation between concepts, and concept partial ordering in which greater concepts are represented by their field types. It is demonstrated how COM and COQL can be used to solve three general data modeling tasks: logical navigation, multidimensional analysis and inference. Logical navigation is based on two operations of projection and de-projection. Multidimensional analysis uses product operation for producing a cube from level concepts chosen along the chosen dimension paths. Inference is defined as a two-step procedure where input constraints are first propagated downwards using de-projection and then the constrained result is propagated upwards using projection.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 10:41:28 GMT" }, { "version": "v2", "created": "Thu, 7 May 2009 13:30:16 GMT" }, { "version": "v3", "created": "Sun, 27 Dec 2009 15:20:47 GMT" }, { "version": "v4", "created": "Mon, 2 Aug 2010 14:02:18 GMT" } ]
2010-08-03T00:00:00
[ [ "Savinov", "Alexandr", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0901.2270
Robert Morelos-Zaragoza
Robert Morelos-Zaragoza
A Plotkin-Alamouti Superposition Coding Scheme for Cooperative Broadcasting in Wireless Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with superposition coding for cooperative broadcasting in the case of two coordinated source nodes, as introduced in the seminal work of Bergmans and Cover in 1974. A scheme is introduced for two classes of destination (or relay) nodes: Close nodes and far nodes, as ranked by their spatial distances to the pair of transmitting nodes. Two linear codes are combined using the (u,u+v)-construction devised by Plotkin to construct two-level linear unequal error protection (LUEP) codes. However, instead of binary addition of subcode codewords in the source encoder, here modulated subcode sequences are combined at the destination (or relay) nodes antennae. Bergmans and Cover referred to this as over-the-air mixing. In the case of Rayleigh fading, additional diversity order as well as robustness to channel estimation errors are obtained when source nodes transmit pairs of coded sequences in accordance to Alamouti's transmit diversity scheme. We refer to this combination as a Plotkin-Alamouti scheme and study its performance over AWGN and Rayleigh fading channels with a properly partitioned QPSK constellation.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 14:17:34 GMT" } ]
2009-01-16T00:00:00
[ [ "Morelos-Zaragoza", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2310
Adam Barker
Adam Barker, Jano I. van Hemert, Richard A. Baldock, Malcolm P. Atkinson
An e-Infrastructure for Collaborative Research in Human Embryo Development
Summary of the EU-funded DGEMap project: 6 pages, 6 figures
null
null
null
cs.DC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Within the context of the EU Design Study Developmental Gene Expression Map, we identify a set of challenges when facilitating collaborative research on early human embryo development. These challenges bring forth requirements, for which we have identified solutions and technology. We summarise our solutions and demonstrate how they integrate to form an e-infrastructure to support collaborative research in this area of developmental biology.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 16:43:37 GMT" } ]
2009-01-16T00:00:00
[ [ "Barker", "Adam", "" ], [ "van Hemert", "Jano I.", "" ], [ "Baldock", "Richard A.", "" ], [ "Atkinson", "Malcolm P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0901.2321
{\L}ukasz D{\ke}bowski
{\L}ukasz D\k{e}bowski
The Redundancy of a Computable Code on a Noncomputable Distribution
5 pages; an intro to a longer article
null
null
null
stat.ML cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce new definitions of universal and superuniversal computable codes, which are based on a code's ability to approximate Kolmogorov complexity within the prescribed margin for all individual sequences from a given set. Such sets of sequences may be singled out almost surely with respect to certain probability measures. Consider a measure parameterized with a real parameter and put an arbitrary prior on the parameter. The Bayesian measure is the expectation of the parameterized measure with respect to the prior. It appears that a modified Shannon-Fano code for any computable Bayesian measure, which we call the Bayesian code, is superuniversal on a set of parameterized measure-almost all sequences for prior-almost every parameter. According to this result, in the typical setting of mathematical statistics no computable code enjoys redundancy which is ultimately much less than that of the Bayesian code. Thus we introduce another characteristic of computable codes: The catch-up time is the length of data for which the code length drops below the Kolmogorov complexity plus the prescribed margin. Some codes may have smaller catch-up times than Bayesian codes.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 17:37:23 GMT" }, { "version": "v2", "created": "Fri, 10 Apr 2009 09:23:10 GMT" } ]
2009-04-10T00:00:00
[ [ "Dębowski", "Łukasz", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2333
Jian Ni
Jian Ni and Bo Tan and R. Srikant
Q-CSMA: Queue-Length Based CSMA/CA Algorithms for Achieving Maximum Throughput and Low Delay in Wireless Networks
12 pages
IEEE/ACM Transactions on Networking, 20(3), 2012
10.1109/TNET.2011.2177101
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, it has been shown that CSMA-type random access algorithms can achieve the maximum possible throughput in ad hoc wireless networks. However, these algorithms assume an idealized continuous-time CSMA protocol where collisions can never occur. In addition, simulation results indicate that the delay performance of these algorithms can be quite bad. On the other hand, although some simple heuristics (such as distributed approximations of greedy maximal scheduling) can yield much better delay performance for a large set of arrival rates, they may only achieve a fraction of the capacity region in general. In this paper, we propose a discrete-time version of the CSMA algorithm. Central to our results is a discrete-time distributed randomized algorithm which is based on a generalization of the so-called Glauber dynamics from statistical physics, where multiple links are allowed to update their states in a single time slot. The algorithm generates collision-free transmission schedules while explicitly taking collisions into account during the control phase of the protocol, thus relaxing the perfect CSMA assumption. More importantly, the algorithm allows us to incorporate mechanisms which lead to very good delay performance while retaining the throughput-optimality property. It also resolves the hidden and exposed terminal problems associated with wireless networks.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 19:01:45 GMT" }, { "version": "v2", "created": "Fri, 13 Mar 2009 04:01:05 GMT" }, { "version": "v3", "created": "Sat, 1 Aug 2009 20:08:15 GMT" }, { "version": "v4", "created": "Wed, 16 Dec 2009 00:34:23 GMT" } ]
2019-11-13T00:00:00
[ [ "Ni", "Jian", "" ], [ "Tan", "Bo", "" ], [ "Srikant", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2349
Eduardo G. Altmann
Eduardo G. Altmann, Janet B. Pierrehumbert, and Adilson E. Motter
Beyond word frequency: Bursts, lulls, and scaling in the temporal distributions of words
null
PLoS ONE 4 (11): e7678 (2009)
10.1371/journal.pone.0007678
null
cs.CL cond-mat.dis-nn physics.data-an physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background: Zipf's discovery that word frequency distributions obey a power law established parallels between biological and physical processes, and language, laying the groundwork for a complex systems perspective on human communication. More recent research has also identified scaling regularities in the dynamics underlying the successive occurrences of events, suggesting the possibility of similar findings for language as well. Methodology/Principal Findings: By considering frequent words in USENET discussion groups and in disparate databases where the language has different levels of formality, here we show that the distributions of distances between successive occurrences of the same word display bursty deviations from a Poisson process and are well characterized by a stretched exponential (Weibull) scaling. The extent of this deviation depends strongly on semantic type -- a measure of the logicality of each word -- and less strongly on frequency. We develop a generative model of this behavior that fully determines the dynamics of word usage. Conclusions/Significance: Recurrence patterns of words are well described by a stretched exponential distribution of recurrence times, an empirical scaling that cannot be anticipated from Zipf's law. Because the use of words provides a uniquely precise and powerful lens on human thought and activity, our findings also have implications for other overt manifestations of collective human dynamics.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 21:12:12 GMT" }, { "version": "v2", "created": "Wed, 11 Nov 2009 16:07:23 GMT" } ]
2009-11-11T00:00:00
[ [ "Altmann", "Eduardo G.", "" ], [ "Pierrehumbert", "Janet B.", "" ], [ "Motter", "Adilson E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0901.2356
Nan Ma
Nan Ma, Prakash Ishwar, Piyush Gupta
Information-Theoretic Bounds for Multiround Function Computation in Collocated Networks
9 pages. A 5-page version without appendices was submitted to IEEE International Symposium on Information Theory (ISIT), 2009. This version contains complete proofs as appendices
null
10.1109/ISIT.2009.5205926
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the limits of communication efficiency for function computation in collocated networks within the framework of multi-terminal block source coding theory. With the goal of computing a desired function of sources at a sink, nodes interact with each other through a sequence of error-free, network-wide broadcasts of finite-rate messages. For any function of independent sources, we derive a computable characterization of the set of all feasible message coding rates - the rate region - in terms of single-letter information measures. We show that when computing symmetric functions of binary sources, the sink will inevitably learn certain additional information which is not demanded in computing the function. This conceptual understanding leads to new improved bounds for the minimum sum-rate. The new bounds are shown to be orderwise better than those based on cut-sets as the network scales. The scaling law of the minimum sum-rate is explored for different classes of symmetric functions and source parameters.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 21:56:09 GMT" }, { "version": "v2", "created": "Wed, 21 Jan 2009 19:53:44 GMT" }, { "version": "v3", "created": "Wed, 28 Jan 2009 16:38:06 GMT" } ]
2016-11-17T00:00:00
[ [ "Ma", "Nan", "" ], [ "Ishwar", "Prakash", "" ], [ "Gupta", "Piyush", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2367
Shirin Jalali
Shirin Jalali, Andrea Montanari, Tsachy Weissman
An Implementable Scheme for Universal Lossy Compression of Discrete Markov Sources
10 pages, 2 figures, Data Compression Conference (DCC) 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new lossy compressor for discrete sources. For coding a source sequence $x^n$, the encoder starts by assigning a certain cost to each reconstruction sequence. It then finds the reconstruction that minimizes this cost and describes it losslessly to the decoder via a universal lossless compressor. The cost of a sequence is given by a linear combination of its empirical probabilities of some order $k+1$ and its distortion relative to the source sequence. The linear structure of the cost in the empirical count matrix allows the encoder to employ a Viterbi-like algorithm for obtaining the minimizing reconstruction sequence simply. We identify a choice of coefficients for the linear combination in the cost function which ensures that the algorithm universally achieves the optimum rate-distortion performance of any Markov source in the limit of large $n$, provided $k$ is increased as $o(\log n)$.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 23:23:17 GMT" }, { "version": "v2", "created": "Sun, 18 Jan 2009 00:22:55 GMT" } ]
2009-01-19T00:00:00
[ [ "Jalali", "Shirin", "" ], [ "Montanari", "Andrea", "" ], [ "Weissman", "Tsachy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2370
Satish Babu Korada
Nadine Hussami, Satish Babu Korada, Rudiger Urbanke
Performance of Polar Codes for Channel and Source Coding
accepted in ISIT 2009, Figure 5 is different from the previous version
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes, introduced recently by Ar\i kan, are the first family of codes known to achieve capacity of symmetric channels using a low complexity successive cancellation decoder. Although these codes, combined with successive cancellation, are optimal in this respect, their finite-length performance is not record breaking. We discuss several techniques through which their finite-length performance can be improved. We also study the performance of these codes in the context of source coding, both lossless and lossy, in the single-user context as well as for distributed applications.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 14:58:11 GMT" }, { "version": "v2", "created": "Fri, 22 May 2009 16:20:03 GMT" } ]
2009-05-22T00:00:00
[ [ "Hussami", "Nadine", "" ], [ "Korada", "Satish Babu", "" ], [ "Urbanke", "Rudiger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2376
Sumio Watanabe
Sumio Watanabe
A Limit Theorem in Singular Regression Problem
16 pages
null
null
null
cs.LG
http://creativecommons.org/licenses/publicdomain/
In statistical problems, a set of parameterized probability distributions is used to estimate the true probability distribution. If Fisher information matrix at the true distribution is singular, then it has been left unknown what we can estimate about the true distribution from random samples. In this paper, we study a singular regression problem and prove a limit theorem which shows the relation between the singular regression problem and two birational invariants, a real log canonical threshold and a singular fluctuation. The obtained theorem has an important application to statistics, because it enables us to estimate the generalization error from the training error without any knowledge of the true probability distribution.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 01:00:39 GMT" } ]
2009-01-19T00:00:00
[ [ "Watanabe", "Sumio", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0901.2391
Xiangyong Zeng
Xiangyong Zeng, Lei Hu, Wenfeng Jiang, Qin Yue, Xiwang Cao
Weight Distribution of A p-ary Cyclic Code
15 pages
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For an odd prime $p$ and two positive integers $n\geq 3$ and $k$ with $\frac{n}{{\rm gcd}(n,k)}$ being odd, the paper determines the weight distribution of a $p$-ary cyclic code $\mathcal{C}$ over $\mathbb{F}_{p}$ with nonzeros $\alpha^{-1}$, $\alpha^{-(p^k+1)}$ and $\alpha^{-(p^{3k}+1)}$, where $\alpha$ is a primitive element of $\mathbb{F}_{p^n}$
[ { "version": "v1", "created": "Fri, 16 Jan 2009 04:13:45 GMT" } ]
2009-01-19T00:00:00
[ [ "Zeng", "Xiangyong", "" ], [ "Hu", "Lei", "" ], [ "Jiang", "Wenfeng", "" ], [ "Yue", "Qin", "" ], [ "Cao", "Xiwang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2396
Ozgun Bursalioglu
Ozgun Y. Bursalioglu, Maria Fresia, Giuseppe Caire, H. Vincent Poor
Joint Source-Channel Coding at the Application Layer for Parallel Gaussian Sources
5 pages, 4 figures, submitted to ISIT-09
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper the multicasting of independent parallel Gaussian sources over a binary erasure broadcasted channel is considered. Multiresolution embedded quantizer and layered joint source-channel coding schemes are used in order to serve simultaneously several users at different channel capacities. The convex nature of the rate-distortion function, computed by means of reverse water-filling, allows us to solve relevant convex optimization problems corresponding to different performance criteria. Then, layered joint source-channel codes are constructed based on the concatenation of embedded scalar quantizers with binary rateless encoders.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 05:17:12 GMT" } ]
2009-01-19T00:00:00
[ [ "Bursalioglu", "Ozgun Y.", "" ], [ "Fresia", "Maria", "" ], [ "Caire", "Giuseppe", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2399
William Blum
William Blum and C.-H. Luke Ong
The Safe Lambda Calculus
null
Logical Methods in Computer Science, Volume 5, Issue 1 (February 19, 2009) lmcs:1145
10.2168/LMCS-5(1:3)2009
null
cs.PL cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Safety is a syntactic condition of higher-order grammars that constrains occurrences of variables in the production rules according to their type-theoretic order. In this paper, we introduce the safe lambda calculus, which is obtained by transposing (and generalizing) the safety condition to the setting of the simply-typed lambda calculus. In contrast to the original definition of safety, our calculus does not constrain types (to be homogeneous). We show that in the safe lambda calculus, there is no need to rename bound variables when performing substitution, as variable capture is guaranteed not to happen. We also propose an adequate notion of beta-reduction that preserves safety. In the same vein as Schwichtenberg's 1976 characterization of the simply-typed lambda calculus, we show that the numeric functions representable in the safe lambda calculus are exactly the multivariate polynomials; thus conditional is not definable. We also give a characterization of representable word functions. We then study the complexity of deciding beta-eta equality of two safe simply-typed terms and show that this problem is PSPACE-hard. Finally we give a game-semantic analysis of safety: We show that safe terms are denoted by `P-incrementally justified strategies'. Consequently pointers in the game semantics of safe lambda-terms are only necessary from order 4 onwards.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 05:41:36 GMT" }, { "version": "v2", "created": "Tue, 17 Feb 2009 08:17:13 GMT" }, { "version": "v3", "created": "Thu, 19 Feb 2009 18:43:11 GMT" } ]
2015-07-01T00:00:00
[ [ "Blum", "William", "" ], [ "Ong", "C. -H. Luke", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0901.2401
Hoon Huh
Hoon Huh, Haralabos Papadopoulos, Giuseppe Caire
MIMO Broadcast Channel Optimization under General Linear Constraints
accepted for ISIT 2009, replaced by the camera-ready version
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The optimization of the transmit parameters (power allocation and steering vectors) for the MIMO BC under general linear constraints is treated under the optimal DPC coding strategy and the simple suboptimal linear zero-forcing beamforming strategy. In the case of DPC, we show that "SINR duality" and "min-max duality" yield the same dual MAC problem, and compare two alternatives for its efficient solution. In the case of zero-forcing beamforming, we provide a new efficient algorithm based on the direct optimization of a generalized inverse matrix. In both cases, the algorithms presented here address the problems in the most general form and can be applied to special cases previously considered, such as per-antenna and per-group of antennas power constraints, "forbidden interference direction" constraints, or any combination thereof.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 06:23:08 GMT" }, { "version": "v2", "created": "Fri, 29 May 2009 18:22:17 GMT" } ]
2009-05-29T00:00:00
[ [ "Huh", "Hoon", "" ], [ "Papadopoulos", "Haralabos", "" ], [ "Caire", "Giuseppe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2410
Jasper Goseling
Jasper Goseling, Ruytaroh Matsumoto, Tomohiko Uyematsu and Jos H. Weber
On the Energy Benefit of Network Coding for Wireless Multiple Unicast
null
EURASIP Journal on Wireless Communications and Networking, Vol. 2010 (2010), Art.ID 605421
10.1155/2010/605421
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the energy savings that can be obtained by employing network coding instead of plain routing in wireless multiple unicast problems. We establish lower bounds on the benefit of network coding, defined as the maximum of the ratio of the minimum energy required by routing and network coding solutions, where the maximum is over all configurations. It is shown that if coding and routing solutions are using the same transmission range, the benefit in $d$-dimensional networks is at least $2d/\lfloor\sqrt{d}\rfloor$. Moreover, it is shown that if the transmission range can be optimized for routing and coding individually, the benefit in 2-dimensional networks is at least 3. Our results imply that codes following a \emph{decode-and-recombine} strategy are not always optimal regarding energy efficiency.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 07:49:43 GMT" }, { "version": "v2", "created": "Thu, 18 Aug 2011 10:39:41 GMT" } ]
2011-08-19T00:00:00
[ [ "Goseling", "Jasper", "" ], [ "Matsumoto", "Ruytaroh", "" ], [ "Uyematsu", "Tomohiko", "" ], [ "Weber", "Jos H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2416
Jort Gemmeke
J. F. Gemmeke and B. Cranen
TR01: Time-continuous Sparse Imputation
9 pages, 5 figures, Technical Report
null
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An effective way to increase the noise robustness of automatic speech recognition is to label noisy speech features as either reliable or unreliable (missing) prior to decoding, and to replace the missing ones by clean speech estimates. We present a novel method to obtain such clean speech estimates. Unlike previous imputation frameworks which work on a frame-by-frame basis, our method focuses on exploiting information from a large time-context. Using a sliding window approach, denoised speech representations are constructed using a sparse representation of the reliable features in an overcomplete basis of fixed-length exemplar fragments. We demonstrate the potential of our approach with experiments on the AURORA-2 connected digit database.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 08:24:14 GMT" } ]
2009-01-19T00:00:00
[ [ "Gemmeke", "J. F.", "" ], [ "Cranen", "B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
0901.2434
Robert Frank Carslaw Walters
L. de Francesco Albasini, N. Sabadini, R.F.C. Walters
The compositional construction of Markov processes
null
null
null
null
cs.LO math.CT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an algebra for composing automata in which the actions have probabilities. We illustrate by showing how to calculate the probability of reaching deadlock in k steps in a model of the classical Dining Philosopher problem, and show, using the Perron-Frobenius Theorem, that this probability tends to 1 as k tends to infinity.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 10:15:51 GMT" } ]
2009-01-19T00:00:00
[ [ "Albasini", "L. de Francesco", "" ], [ "Sabadini", "N.", "" ], [ "Walters", "R. F. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0901.2461
Andrey Breslav
Andrey Breslav
Grammatic -- a tool for grammar definition reuse and modularity
Submitted to DSL'09
null
null
null
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Grammatic is a tool for grammar definition and manipulation aimed to improve modularity and reuse of grammars and related development artifacts. It is independent from parsing technology and any other details of target system implementation. Grammatic provides a way for annotating grammars with arbitrary metadata (like associativity attributes, semantic actions or anything else). It might be used as a front-end for external tools like parser generators to make their input grammars modular and reusable. This paper describes main principles behind Grammatic and gives an overview of languages it provides and their ability to separate concerns and define reusable modules. Also it presents sketches of possible use cases for the tool.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 11:45:40 GMT" } ]
2009-01-19T00:00:00
[ [ "Breslav", "Andrey", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0901.2483
Danilo Silva
Danilo Silva and Frank R. Kschischang
Fast Encoding and Decoding of Gabidulin Codes
5 pages, 1 figure, to be published at ISIT 2009
null
10.1109/ISIT.2009.5205272
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gabidulin codes are the rank-metric analogs of Reed-Solomon codes and have a major role in practical error control for network coding. This paper presents new encoding and decoding algorithms for Gabidulin codes based on low-complexity normal bases. In addition, a new decoding algorithm is proposed based on a transform-domain approach. Together, these represent the fastest known algorithms for encoding and decoding Gabidulin codes.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 13:56:53 GMT" }, { "version": "v2", "created": "Sun, 5 Apr 2009 18:57:06 GMT" } ]
2019-05-07T00:00:00
[ [ "Silva", "Danilo", "" ], [ "Kschischang", "Frank R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2518
Koen Claessen
Koen Claessen, Jan-Willem Roorda
A Faithful Semantics for Generalised Symbolic Trajectory Evaluation
null
Logical Methods in Computer Science, Volume 5, Issue 2 (April 8, 2009) lmcs:1028
10.2168/LMCS-5(2:1)2009
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Generalised Symbolic Trajectory Evaluation (GSTE) is a high-capacity formal verification technique for hardware. GSTE uses abstraction, meaning that details of the circuit behaviour are removed from the circuit model. A semantics for GSTE can be used to predict and understand why certain circuit properties can or cannot be proven by GSTE. Several semantics have been described for GSTE. These semantics, however, are not faithful to the proving power of GSTE-algorithms, that is, the GSTE-algorithms are incomplete with respect to the semantics. The abstraction used in GSTE makes it hard to understand why a specific property can, or cannot, be proven by GSTE. The semantics mentioned above cannot help the user in doing so. The contribution of this paper is a faithful semantics for GSTE. That is, we give a simple formal theory that deems a property to be true if-and-only-if the property can be proven by a GSTE-model checker. We prove that the GSTE algorithm is sound and complete with respect to this semantics.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 16:14:48 GMT" }, { "version": "v2", "created": "Wed, 8 Apr 2009 20:58:29 GMT" } ]
2015-07-01T00:00:00
[ [ "Claessen", "Koen", "" ], [ "Roorda", "Jan-Willem", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0901.2538
Marios Kountouris
Marios Kountouris and Jeffrey G. Andrews
Capacity Scaling of SDMA in Wireless Ad Hoc Networks
5 pages, submitted to ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider an ad hoc network in which each multi-antenna transmitter sends independent streams to multiple receivers in a Poisson field of interferers. We provide the outage probability and transmission capacity scaling laws, aiming at investigating the fundamental limits of Space Division Multiple Access (SDMA). We first show that super linear capacity scaling with the number of receive/transmit antennas can be achieved using dirty paper coding. Nevertheless, the potential benefits of multi-stream, multi-antenna communications fall off quickly if linear precoding is employed, leading to sublinear capacity growth in the case of single-antenna receivers. A key finding is that receive antenna array processing is of vital importance in SDMA ad hoc networks, as a means to cancel the increased residual interference and boost the signal power through diversity.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 17:44:52 GMT" } ]
2009-01-19T00:00:00
[ [ "Kountouris", "Marios", "" ], [ "Andrews", "Jeffrey G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2545
Yiyue Wu
Yiyue Wu, Linda M. Davis and Robert Calderbank
On the Capacity of the Discrete-Time Channel with Uniform Output Quantization
submitted to ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides new insight into the classical problem of determining both the capacity of the discrete-time channel with uniform output quantization and the capacity achieving input distribution. It builds on earlier work by Gallager and Witsenhausen to provide a detailed analysis of two particular quantization schemes. The first is saturation quantization where overflows are mapped to the nearest quantization bin, and the second is wrapping quantization where overflows are mapped to the nearest quantization bin after reduction by some modulus. Both the capacity of wrapping quantization and the capacity achieving input distribution are determined. When the additive noise is gaussian and relatively small, the capacity of saturation quantization is shown to be bounded below by that of wrapping quantization. In the limit of arbitrarily many uniform quantization levels, it is shown that the difference between the upper and lower bounds on capacity given by Ihara is only 0.26 bits.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 18:54:46 GMT" } ]
2009-01-19T00:00:00
[ [ "Wu", "Yiyue", "" ], [ "Davis", "Linda M.", "" ], [ "Calderbank", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2586
Richard Nock
Richard Nock, Brice Magdalou, Nicolas Sanz, Eric Briys, Fred Celimene, Frank Nielsen
Information geometries and Microeconomic Theories
null
null
null
null
q-fin.GN cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
More than thirty years ago, Charnes, Cooper and Schinnar (1976) established an enlightening contact between economic production functions (EPFs) -- a cornerstone of neoclassical economics -- and information theory, showing how a generalization of the Cobb-Douglas production function encodes homogeneous functions. As expected by Charnes \textit{et al.}, the contact turns out to be much broader: we show how information geometry as pioneered by Amari and others underpins static and dynamic descriptions of microeconomic cornerstones. We show that the most popular EPFs are fundamentally grounded in a very weak axiomatization of economic transition costs between inputs. The strength of this characterization is surprising, as it geometrically bonds altogether a wealth of collateral economic notions -- advocating for applications in various economic fields --: among all, it characterizes (i) Marshallian and Hicksian demands and their geometric duality, (ii) Slutsky-type properties for the transformation paths, (iii) Roy-type properties for their elementary variations.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 22:06:56 GMT" } ]
2009-01-20T00:00:00
[ [ "Nock", "Richard", "" ], [ "Magdalou", "Brice", "" ], [ "Sanz", "Nicolas", "" ], [ "Briys", "Eric", "" ], [ "Celimene", "Fred", "" ], [ "Nielsen", "Frank", "" ] ]
[ { "class": "Quantitative Finance", "code": "q-fin.GN", "description": "Development of general quantitative methodologies with applications in finance", "span": "(General Finance)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2588
Hassan Ghozlan
Hassan Ghozlan, Yahya Mohasseb, Hesham El Gamal, Gerhard Kramer
The MIMO Wireless Switch: Relaying Can Increase the Multiplexing Gain
5 pages, 3 figures, submitted to ISIT'09
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers an interference network composed of K half-duplex single-antenna pairs of users who wish to establish bi-directional communication with the aid of a multi-input-multi-output (MIMO) half-duplex relay node. This channel is referred to as the "MIMO Wireless Switch" since, for the sake of simplicity, our model assumes no direct link between the two end nodes of each pair implying that all communication must go through the relay node (i.e., the MIMO switch). Assuming a delay-limited scenario, the fundamental limits in the high signal-to-noise ratio (SNR) regime is analyzed using the diversity multiplexing tradeoff (DMT) framework. Our results sheds light on the structure of optimal transmission schemes and the gain offered by the relay node in two distinct cases, namely reciprocal and non-reciprocal channels (between the relay and end-users). In particular, the existence of a relay node, equipped with a sufficient number of antennas, is shown to increase the multiplexing gain; as compared with the traditional fully connected K-pair interference channel. To the best of our knowledge, this is the first known example where adding a relay node results in enlarging the pre-log factor of the sum rate. Moreover, for the case of reciprocal channels, it is shown that, when the relay has a number of antennas at least equal to the sum of antennas of all the users, static time allocation of decode and forward (DF) type schemes is optimal. On the other hand, in the non-reciprocal scenario, we establish the optimality of dynamic decode and forward in certain relevant scenarios.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 22:13:24 GMT" } ]
2009-01-20T00:00:00
[ [ "Ghozlan", "Hassan", "" ], [ "Mohasseb", "Yahya", "" ], [ "Gamal", "Hesham El", "" ], [ "Kramer", "Gerhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2606
Yong Peng
Yong Peng and Dinesh Rajan
Capacity Bounds of Half-Duplex Gaussian Cooperative Interference Channel
5 pages, 3 figures, submitted to IEEE ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate the half-duplex cooperative communication scheme of a two user Gaussian interference channel. We develop achievable region and outer bound for the case when the system allow either transmitter or receiver cooperation. We show that by using our transmitter cooperation scheme, there is significant capacity improvement compare to the previous results, especially when the cooperation link is strong. Further, if the cooperation channel gain is infinity, both our transmitter and receiver cooperation rates achieve their respective outer bound. It is also shown that transmitter cooperation provides larger achievable region than receiver cooperation under the same channel and power conditions.
[ { "version": "v1", "created": "Sat, 17 Jan 2009 02:33:38 GMT" } ]
2009-01-20T00:00:00
[ [ "Peng", "Yong", "" ], [ "Rajan", "Dinesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2612
Gerard Henry Edmond Duchamp
G\'erard Henry Edmond Duchamp (LIPN), H. Cheballah (LIPN)
Some Open Problems in Combinatorial Physics
null
null
null
null
cs.SC math.CO quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We point out four problems which have arisen during the recent research in the domain of Combinatorial Physics.
[ { "version": "v1", "created": "Sat, 17 Jan 2009 07:11:12 GMT" } ]
2009-01-20T00:00:00
[ [ "Duchamp", "Gérard Henry Edmond", "", "LIPN" ], [ "Cheballah", "H.", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0901.2616
Onur Ozan Koyluoglu
Karim Khalil, Moustafa Youssef, O. Ozan Koyluoglu, Hesham El Gamal
On the Delay Limited Secrecy Capacity of Fading Channels
Proceedings of the 2009 IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, June 28-July 3, 2009
null
10.1109/ISIT.2009.5205955
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the delay limited secrecy capacity of the flat fading channel is investigated under two different assumptions on the available transmitter channel state information (CSI). The first scenario assumes perfect prior knowledge of both the main and eavesdropper channel gains. Here, upper and lower bounds on the secure delay limited capacity are derived and shown to be tight in the high signal-to-noise ratio (SNR) regime (for a wide class of channel distributions). In the second scenario, only the main channel CSI is assumed to be available at the transmitter. Remarkably, under this assumption, we establish the achievability of non-zero secure rate (for a wide class of channel distributions) under a strict delay constraint. In the two cases, our achievability arguments are based on a novel two-stage approach that overcomes the secrecy outage phenomenon observed in earlier works.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 16:02:14 GMT" }, { "version": "v2", "created": "Fri, 1 May 2009 02:50:00 GMT" } ]
2016-11-15T00:00:00
[ [ "Khalil", "Karim", "" ], [ "Youssef", "Moustafa", "" ], [ "Koyluoglu", "O. Ozan", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2645
Vincent Limouzy
Michel Habib (LIAFA), Vincent Limouzy
On some simplicial elimination schemes for chordal graphs
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present here some results on particular elimination schemes for chordal graphs, namely we show that for any chordal graph we can construct in linear time a simplicial elimination scheme starting with a pending maximal clique attached via a minimal separator maximal (resp. minimal) under inclusion among all minimal separators.
[ { "version": "v1", "created": "Sat, 17 Jan 2009 15:23:29 GMT" }, { "version": "v2", "created": "Tue, 17 Feb 2009 16:07:37 GMT" } ]
2009-02-17T00:00:00
[ [ "Habib", "Michel", "", "LIAFA" ], [ "Limouzy", "Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0901.2665
Eric Polizzi
Eric Polizzi
A Density Matrix-based Algorithm for Solving Eigenvalue Problems
7 pages, 3 figures
null
10.1103/PhysRevB.79.115112
null
cs.CE cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new numerical algorithm for solving the symmetric eigenvalue problem is presented. The technique deviates fundamentally from the traditional Krylov subspace iteration based techniques (Arnoldi and Lanczos algorithms) or other Davidson-Jacobi techniques, and takes its inspiration from the contour integration and density matrix representation in quantum mechanics. It will be shown that this new algorithm - named FEAST - exhibits high efficiency, robustness, accuracy and scalability on parallel architectures. Examples from electronic structure calculations of Carbon nanotubes (CNT) are presented, and numerical performances and capabilities are discussed.
[ { "version": "v1", "created": "Sat, 17 Jan 2009 23:36:23 GMT" } ]
2009-11-13T00:00:00
[ [ "Polizzi", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0901.2682
Danny Bickson
Danny Bickson, Ezra N. Hoch, Harel Avissar and Danny Dolev
Self-stabilizing Numerical Iterative Computation
Submitted to Theory of Computer Science (TCS) Journal
null
null
TCS09
cs.NA cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many challenging tasks in sensor networks, including sensor calibration, ranking of nodes, monitoring, event region detection, collaborative filtering, collaborative signal processing, {\em etc.}, can be formulated as a problem of solving a linear system of equations. Several recent works propose different distributed algorithms for solving these problems, usually by using linear iterative numerical methods. The main problem with previous approaches is that once the problem inputs change during the process of computation, the computation may output unexpected results. In real life settings, sensor measurements are subject to varying environmental conditions and to measurement noise. We present a simple iterative scheme called SS-Iterative for solving systems of linear equations, and examine its properties in the self-stabilizing perspective. We analyze the behavior of the proposed scheme under changing input sequences using two different assumptions on the input: a box bound, and a probabilistic distribution. As a case study, we discuss the sensor calibration problem and provide simulation results to support the applicability of our approach.
[ { "version": "v1", "created": "Sun, 18 Jan 2009 06:56:59 GMT" } ]
2009-01-20T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Hoch", "Ezra N.", "" ], [ "Avissar", "Harel", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0901.2684
Danny Bickson
Danny Bickson, Yoav Tock, Argyris Zymnis, Stephen Boyd and Danny Dolev
Distributed Large Scale Network Utility Maximization
In the International Symposium on Information Theory (ISIT) 2009
null
10.1109/ISIT.2009.5205655
null
cs.IT cs.DC math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent work by Zymnis et al. proposes an efficient primal-dual interior-point method, using a truncated Newton method, for solving the network utility maximization (NUM) problem. This method has shown superior performance relative to the traditional dual-decomposition approach. Other recent work by Bickson et al. shows how to compute efficiently and distributively the Newton step, which is the main computational bottleneck of the Newton method, utilizing the Gaussian belief propagation algorithm. In the current work, we combine both approaches to create an efficient distributed algorithm for solving the NUM problem. Unlike the work of Zymnis, which uses a centralized approach, our new algorithm is easily distributed. Using an empirical evaluation we show that our new method outperforms previous approaches, including the truncated Newton method and dual-decomposition methods. As an additional contribution, this is the first work that evaluates the performance of the Gaussian belief propagation algorithm vs. the preconditioned conjugate gradient method, for a large scale problem.
[ { "version": "v1", "created": "Sun, 18 Jan 2009 07:02:55 GMT" }, { "version": "v2", "created": "Sat, 9 May 2009 07:07:09 GMT" } ]
2010-03-23T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Tock", "Yoav", "" ], [ "Zymnis", "Argyris", "" ], [ "Boyd", "Stephen", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0901.2685
Danny Bickson
Danny Bickson, Gidon Gershinsky, Ezra N. Hoch and Konstantin Shagin
A Statistical Approach to Performance Monitoring in Soft Real-Time Distributed Systems
Submitted to the 29th Int'l Conference on Distributed Computing Systems (ICDCS 2009)
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Soft real-time applications require timely delivery of messages conforming to the soft real-time constraints. Satisfying such requirements is a complex task both due to the volatile nature of distributed environments, as well as due to numerous domain-specific factors that affect message latency. Prompt detection of the root-cause of excessive message delay allows a distributed system to react accordingly. This may significantly improve compliance with the required timeliness constraints. In this work, we present a novel approach for distributed performance monitoring of soft-real time distributed systems. We propose to employ recent distributed algorithms from the statistical signal processing and learning domains, and to utilize them in a different context of online performance monitoring and root-cause analysis, for pinpointing the reasons for violation of performance requirements. Our approach is general and can be used for monitoring of any distributed system, and is not limited to the soft real-time domain. We have implemented the proposed framework in TransFab, an IBM prototype of soft real-time messaging fabric. In addition to root-cause analysis, the framework includes facilities to resolve resource allocation problems, such as memory and bandwidth deficiency. The experiments demonstrate that the system can identify and resolve latency problems in a timely fashion.
[ { "version": "v1", "created": "Sun, 18 Jan 2009 07:16:59 GMT" } ]
2009-01-20T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Gershinsky", "Gidon", "" ], [ "Hoch", "Ezra N.", "" ], [ "Shagin", "Konstantin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0901.2687
Danny Bickson
Danny Bickson, Ezra N. Hoch, Nir Naaman and Yoav Tock
A Hybrid Multicast-Unicast Infrastructure for Efficient Publish-Subscribe in Enterprise Networks
null
SYSTOR 2010 - The 3rd Annual Haifa Experimental Systems Conference, Haifa, Israel, May 24-26, 2010
10.1145/1815695.1815722
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the main challenges in building a large scale publish-subscribe infrastructure in an enterprise network, is to provide the subscribers with the required information, while minimizing the consumed host and network resources. Typically, previous approaches utilize either IP multicast or point-to-point unicast for efficient dissemination of the information. In this work, we propose a novel hybrid framework, which is a combination of both multicast and unicast data dissemination. Our hybrid framework allows us to take the advantages of both multicast and unicast, while avoiding their drawbacks. We investigate several algorithms for computing the best mapping of publishers' transmissions into multicast and unicast transport. Using extensive simulations, we show that our hybrid framework reduces consumed host and network resources, outperforming traditional solutions. To insure the subscribers interests closely resemble those of real-world settings, our simulations are based on stock market data and on recorded IBM WebShpere subscriptions.
[ { "version": "v1", "created": "Sun, 18 Jan 2009 08:52:22 GMT" }, { "version": "v2", "created": "Thu, 25 Jun 2009 08:51:45 GMT" }, { "version": "v3", "created": "Mon, 12 Apr 2010 13:18:21 GMT" } ]
2010-06-30T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Hoch", "Ezra N.", "" ], [ "Naaman", "Nir", "" ], [ "Tock", "Yoav", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0901.2689
Danny Bickson
Danny Bickson, Tzachy Reinman, Danny Dolev and Benny Pinkas
Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries
Submitted to Peer-to-Peer Networking and Applications Journal (PPNA) 2009
null
10.1007/s12083-009-0051-9
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and other tasks, where the computing nodes is expected to preserve the privacy of their inputs while performing a joint computation of a certain function. Although there is a rich literature in the field of distributed systems security concerning secure multi-party computation, in practice it is hard to deploy those methods in very large scale Peer-to-Peer networks. In this work, we try to bridge the gap between theoretical algorithms in the security domain, and a practical Peer-to-Peer deployment. We consider two security models. The first is the semi-honest model where peers correctly follow the protocol, but try to reveal private information. We provide three possible schemes for secure multi-party numerical computation for this model and identify a single light-weight scheme which outperforms the others. Using extensive simulation results over real Internet topologies, we demonstrate that our scheme is scalable to very large networks, with up to millions of nodes. The second model we consider is the malicious peers model, where peers can behave arbitrarily, deliberately trying to affect the results of the computation as well as compromising the privacy of other peers. For this model we provide a fourth scheme to defend the execution of the computation against the malicious peers. The proposed scheme has a higher complexity relative to the semi-honest model. Overall, we provide the Peer-to-Peer network designer a set of tools to choose from, based on the desired level of security.
[ { "version": "v1", "created": "Sun, 18 Jan 2009 09:06:24 GMT" } ]
2010-05-04T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Reinman", "Tzachy", "" ], [ "Dolev", "Danny", "" ], [ "Pinkas", "Benny", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0901.2698
Bharath Sriperumbudur
Bharath K. Sriperumbudur, Kenji Fukumizu, Arthur Gretton, Bernhard Sch\"olkopf and Gert R. G. Lanckriet
On integral probability metrics, \phi-divergences and binary classification
18 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A class of distance measures on probabilities -- the integral probability metrics (IPMs) -- is addressed: these include the Wasserstein distance, Dudley metric, and Maximum Mean Discrepancy. IPMs have thus far mostly been used in more abstract settings, for instance as theoretical tools in mass transportation problems, and in metrizing the weak topology on the set of all Borel probability measures defined on a metric space. Practical applications of IPMs are less common, with some exceptions in the kernel machines literature. The present work contributes a number of novel properties of IPMs, which should contribute to making IPMs more widely used in practice, for instance in areas where $\phi$-divergences are currently popular. First, to understand the relation between IPMs and $\phi$-divergences, the necessary and sufficient conditions under which these classes intersect are derived: the total variation distance is shown to be the only non-trivial $\phi$-divergence that is also an IPM. This shows that IPMs are essentially different from $\phi$-divergences. Second, empirical estimates of several IPMs from finite i.i.d. samples are obtained, and their consistency and convergence rates are analyzed. These estimators are shown to be easily computable, with better rates of convergence than estimators of $\phi$-divergences. Third, a novel interpretation is provided for IPMs by relating them to binary classification, where it is shown that the IPM between class-conditional distributions is the negative of the optimal risk associated with a binary classifier. In addition, the smoothness of an appropriate binary classifier is proved to be inversely related to the distance between the class-conditional distributions, measured in terms of an IPM.
[ { "version": "v1", "created": "Sun, 18 Jan 2009 13:20:59 GMT" }, { "version": "v2", "created": "Thu, 30 Jul 2009 09:31:39 GMT" }, { "version": "v3", "created": "Wed, 19 Aug 2009 18:06:29 GMT" }, { "version": "v4", "created": "Tue, 13 Oct 2009 03:15:17 GMT" } ]
2009-10-13T00:00:00
[ [ "Sriperumbudur", "Bharath K.", "" ], [ "Fukumizu", "Kenji", "" ], [ "Gretton", "Arthur", "" ], [ "Schölkopf", "Bernhard", "" ], [ "Lanckriet", "Gert R. G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2703
Abuzer Yakaryilmaz
Abuzer Yakaryilmaz and A. C. Cem Say
Language recognition by generalized quantum finite automata with unbounded error (abstract & poster)
2 pages, poster presented at the 4th Workshop on Theory of Quantum Computation, Communication, and Cryptography (TQC2009)
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, we generalize the results of arXiv:0901.2703v1 We show that all one-way quantum finite automaton (QFA) models that are at least as general as Kondacs-Watrous QFA's are equivalent in power to classical probabilistic finite automata in this setting. Unlike their probabilistic counterparts, allowing the tape head to stay put for some steps during its traversal of the input does enlarge the class of languages recognized by such QFA's with unbounded error. (Note that, the proof of Theorem 1 in the abstract was presented in the previous version (arXiv:0901.2703v1).)
[ { "version": "v1", "created": "Sun, 18 Jan 2009 13:33:21 GMT" }, { "version": "v2", "created": "Fri, 17 Sep 2010 09:50:03 GMT" } ]
2010-09-20T00:00:00
[ [ "Yakaryilmaz", "Abuzer", "" ], [ "Say", "A. C. Cem", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0901.2723
Arthur Young Mr
A. P. Young
Information science and technology as applications of the physics of signalling
13 pages including 3 diagrams. The hypothesis, proposed, is explained from first principles, no directly-related work found in the literature
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Adopting the scientific method a theoretical model is proposed as foundation for information science and technology, extending the existing theory of signaling: a fact f becomes known in a physical system only following the success of a test f, tests performed primarily by human sensors and applied to (physical) phenomena within which further tests may be performed. Tests are phenomena and classify phenomena. A phenomenon occupies both time and space, facts and inferences having physical counterparts which are phenomena of specified classes. Identifiers such as f are conventional, assigned by humans; a fact (f', f'') reports the success of a test of generic class f', the outcome f'' of the reported application classifying the successful test in more detail. Facts then exist only within structures of a form dictated by constraints on the structural design of tests. The model explains why responses of real time systems are not uniquely predictable and why restrictions, on concurrency in performing inferences within them, are needed. Improved methods, based on the model and applicable throughout the software life-cycle, are summarised in the paper. No report of similar work has been found in the literature.
[ { "version": "v1", "created": "Sun, 18 Jan 2009 18:31:37 GMT" }, { "version": "v2", "created": "Wed, 28 Jan 2009 15:26:28 GMT" }, { "version": "v3", "created": "Sun, 1 Feb 2009 17:11:24 GMT" } ]
2009-02-01T00:00:00
[ [ "Young", "A. P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0901.2731
Oliver Friedmann
Oliver Friedmann
A Super-Polynomial Lower Bound for the Parity Game Strategy Improvement Algorithm as We Know it
null
null
null
null
cs.GT
http://creativecommons.org/licenses/by/3.0/
This paper presents a new lower bound for the discrete strategy improvement algorithm for solving parity games due to Voege and Jurdziski. First, we informally show which structures are difficult to solve for the algorithm. Second, we outline a family of games of quadratic size on which the algorithm requires exponentially many strategy iterations, answering in the negative the long-standing question whether this algorithm runs in polynomial time. Additionally we note that the same family of games can be used to prove a similar result w.r.t. the strategy improvement variant by Schewe.
[ { "version": "v1", "created": "Sun, 18 Jan 2009 19:55:17 GMT" } ]
2009-01-20T00:00:00
[ [ "Friedmann", "Oliver", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0901.2742
Fahad Saeed
Fahad Saeed and Ashfaq Khokhar
Sample-Align-D: A High Performance Multiple Sequence Alignment System using Phylogenetic Sampling and Domain Decomposition
12 pages, 8 figures, paper appeared in HICOMB, IPDPS 2008
null
null
null
cs.DC q-bio.GN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple Sequence Alignment (MSA) is one of the most computationally intensive tasks in Computational Biology. Existing best known solutions for multiple sequence alignment take several hours (in some cases days) of computation time to align, for example, 2000 homologous sequences of average length 300. Inspired by the Sample Sort approach in parallel processing, in this paper we propose a highly scalable multiprocessor solution for the MSA problem in phylogenetically diverse sequences. Our method employs an intelligent scheme to partition the set of sequences into smaller subsets using kmer count based similarity index, referred to as k-mer rank. Each subset is then independently aligned in parallel using any sequential approach. Further fine tuning of the local alignments is achieved using constraints derived from a global ancestor of the entire set. The proposed Sample-Align-D Algorithm has been implemented on a cluster of workstations using MPI message passing library. The accuracy of the proposed solution has been tested on standard benchmarks such as PREFAB. The accuracy of the alignment produced by our methods is comparable to that of well known sequential MSA techniques. We were able to align 2000 randomly selected sequences from the Methanosarcina acetivorans genome in less than 10 minutes using Sample-Align-D on a 16 node cluster, compared to over 23 hours on sequential MUSCLE system running on a single cluster node.
[ { "version": "v1", "created": "Sun, 18 Jan 2009 22:31:26 GMT" } ]
2009-01-20T00:00:00
[ [ "Saeed", "Fahad", "" ], [ "Khokhar", "Ashfaq", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0901.2747
Fahad Saeed
Fahad Saeed and Ashfaq Khokhar
An Overview of Multiple Sequence Alignment Systems
24 pages, 15 figures, Technical Report Parallel Algorithms & Multimedia System Laboratory
null
null
PAMS-05-2007
cs.DS q-bio.GN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An overview of current multiple alignment systems to date are described.The useful algorithms, the procedures adopted and their limitations are presented.We also present the quality of the alignments obtained and in which cases(kind of alignments, kind of sequences etc) the particular systems are useful.
[ { "version": "v1", "created": "Sun, 18 Jan 2009 23:31:09 GMT" } ]
2009-01-20T00:00:00
[ [ "Saeed", "Fahad", "" ], [ "Khokhar", "Ashfaq", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0901.2751
Fahad Saeed
Fahad Saeed
Pyro-Align: Sample-Align based Multiple Alignment system for Pyrosequencing Reads of Large Number
6 pages, 1 figure, Technical Report, Department of Biosystems Science and Engineering, ETH Zurich Switzerland
null
null
DBSSE-08-2008
cs.DS cs.DC q-bio.GN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pyro-Align is a multiple alignment program specifically designed for pyrosequencing reads of huge number. Multiple sequence alignment is shown to be NP-hard and heuristics are designed for approximate solutions. Multiple sequence alignment of pyrosequenceing reads is complex mainly because of 2 factors. One being the huge number of reads, making the use of traditional heuristics,that scale very poorly for large number, unsuitable. The second reason is that the alignment cannot be performed arbitrarily, because the position of the reads with respect to the original genome is important and has to be taken into account.In this report we present a short description of the multiple alignment system for pyrosequencing reads.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 00:26:18 GMT" } ]
2009-01-20T00:00:00
[ [ "Saeed", "Fahad", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0901.2764
Chinmay Vaze
Chinmay S. Vaze and Mahesh K. Varanasi
Dirty Paper Coding for Fading Channels with Partial Transmitter Side Information
5 pages with 2 figures, presented at 42nd Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, USA, Oct. 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of Dirty Paper Coding (DPC) over the Fading Dirty Paper Channel (FDPC) Y = H(X + S)+Z, a more general version of Costa's channel, is studied for the case in which there is partial and perfect knowledge of the fading process H at the transmitter (CSIT) and the receiver (CSIR), respectively. A key step in this problem is to determine the optimal inflation factor (under Costa's choice of auxiliary random variable) when there is only partial CSIT. Towards this end, two iterative numerical algorithms are proposed. Both of these algorithms are seen to yield a good choice for the inflation factor. Finally, the high-SNR (signal-to-noise ratio) behavior of the achievable rate over the FDPC is dealt with. It is proved that FDPC (with t transmit and r receive antennas) achieves the largest possible scaling factor of min(t,r) log SNR even with no CSIT. Furthermore, in the high SNR regime, the optimality of Costa's choice of auxiliary random variable is established even when there is partial (or no) CSIT in the special case of FDPC with t <= r. Using the high-SNR scaling-law result of the FDPC (mentioned before), it is shown that a DPC-based multi-user transmission strategy, unlike other beamforming-based multi-user strategies, can achieve a single-user sum-rate scaling factor over the multiple-input multiple-output Gaussian Broadcast Channel with partial (or no) CSIT.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 05:05:55 GMT" } ]
2009-01-20T00:00:00
[ [ "Vaze", "Chinmay S.", "" ], [ "Varanasi", "Mahesh K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2768
Ananthanarayanan Chockalingam
S. Barik, Saif K. Mohammed, A. Chockalingam, and B. Sundar Rajan
FRFD MIMO Systems: Precoded V-BLAST with Limited Feedback Versus Non-orthogonal STBC MIMO
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Full-rate (FR) and full-diversity (FD) are attractive features in MIMO systems. We refer to systems which achieve both FR and FD simultaneously as FRFD systems. Non-orthogonal STBCs can achieve FRFD without feedback, but their ML decoding complexities are high. V-BLAST without precoding achieves FR but not FD. FRFD can be achieved in V-BLAST through precoding given full channel state information at the transmitter (CSIT). However, with limited feedback precoding, V-BLAST achieves FD, but with some rate loss. Our contribution in this paper is two-fold: $i)$ we propose a limited feedback (LFB) precoding scheme which achieves FRFD in $2\times 2$, $3\times 3$ and $4\times 4$ V-BLAST systems (we refer to this scheme as FRFD-VBLAST-LFB scheme), and $ii)$ comparing the performances of the FRFD-VBLAST-LFB scheme and non-orthogonal STBCs without feedback (e.g., Golden code, perfect codes) under ML decoding, we show that in $2\times 2$ MIMO system with 4-QAM/16-QAM, FRFD-VBLAST-LFB scheme outperforms the Golden code by about 0.6 dB; in $3\times 3$ and $4\times 4$ MIMO systems, the performance of FRFD-VBLAST-LFB scheme is comparable to the performance of perfect codes. The FRFD-VBLAST-LFB scheme is attractive because 1) ML decoding becomes less complex compared to that of non-orthogonal STBCs, 2) the number of feedback bits required to achieve the above performance is small, 3) in slow-fading, it is adequate to send feedback bits only occasionally, and 4) in most practical wireless systems feedback channel is often available (e.g., for adaptive modulation, rate/power control).
[ { "version": "v1", "created": "Mon, 19 Jan 2009 05:35:35 GMT" } ]
2009-01-20T00:00:00
[ [ "Barik", "S.", "" ], [ "Mohammed", "Saif K.", "" ], [ "Chockalingam", "A.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2771
Shalabh Gupta
Shalabh Gupta
Automatic Analog Beamforming Transceiver for 60 GHz Radios
Submitted to 2009 IEEE RFIC Symposium
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a transceiver architecture for automatic beamforming and instantaneous setup of a multigigabit-per-second wireless link between two millimeter wave radios. The retro-directive architecture eliminates necessity of slow and complex digital algorithms required for searching and tracking the directions of opposite end radios. Simulations predict <5 micro-seconds setup time for a 2-Gbps bidirectional 60-GHz communication link between two 10-meters apart radios. The radios have 4-element arrayed antennas, and use QPSK modulation with 1.5 GHz analog bandwidth.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 07:09:38 GMT" } ]
2009-01-20T00:00:00
[ [ "Gupta", "Shalabh", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0901.2778
Bernard Mourrain
Itnuit Janovitz-Freireich, Bernard Mourrain (INRIA Sophia Antipolis), Lajos Ronayi, Agnes Szanto
On the Computation of Matrices of Traces and Radicals of Ideals
null
Journal of Symbolic Computation 47, 1 (2012) 102-122
10.1016/j.jsc.2011.08.020
null
cs.SC math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $f_1,...,f_s \in \mathbb{K}[x_1,...,x_m]$ be a system of polynomials generating a zero-dimensional ideal $\I$, where $\mathbb{K}$ is an arbitrary algebraically closed field. We study the computation of "matrices of traces" for the factor algebra $\A := \CC[x_1, ..., x_m]/ \I$, i.e. matrices with entries which are trace functions of the roots of $\I$. Such matrices of traces in turn allow us to compute a system of multiplication matrices $\{M_{x_i}|i=1,...,m\}$ of the radical $\sqrt{\I}$. We first propose a method using Macaulay type resultant matrices of $f_1,...,f_s$ and a polynomial $J$ to compute moment matrices, and in particular matrices of traces for $\A$. Here $J$ is a polynomial generalizing the Jacobian. We prove bounds on the degrees needed for the Macaulay matrix in the case when $\I$ has finitely many projective roots in $\mathbb{P}^m_\CC$. We also extend previous results which work only for the case where $\A$ is Gorenstein to the non-Gorenstein case. The second proposed method uses Bezoutian matrices to compute matrices of traces of $\A$. Here we need the assumption that $s=m$ and $f_1,...,f_m$ define an affine complete intersection. This second method also works if we have higher dimensional components at infinity. A new explicit description of the generators of $\sqrt{\I}$ are given in terms of Bezoutians.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 07:57:18 GMT" } ]
2011-12-02T00:00:00
[ [ "Janovitz-Freireich", "Itnuit", "", "INRIA Sophia Antipolis" ], [ "Mourrain", "Bernard", "", "INRIA Sophia Antipolis" ], [ "Ronayi", "Lajos", "" ], [ "Szanto", "Agnes", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
0901.2804
Li Chia Choo
Li-Chia Choo and Kai-Kit Wong
The Secrecy Capacity for a 3-Receiver Broadcast Channel with Degraded Message Sets
This paper has been withdrawn by the author
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn by the author due to some errors.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 10:36:33 GMT" }, { "version": "v2", "created": "Thu, 5 Feb 2009 16:04:22 GMT" }, { "version": "v3", "created": "Tue, 3 Mar 2009 15:08:26 GMT" }, { "version": "v4", "created": "Thu, 11 Jun 2009 09:53:16 GMT" } ]
2009-06-11T00:00:00
[ [ "Choo", "Li-Chia", "" ], [ "Wong", "Kai-Kit", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2838
Takayuki Nozaki
Takayuki Nozaki, Kenta Kasai, Kohichi Sakaniwa
Analytical Solution of Covariance Evolution for Regular LDPC Codes
5 pages, 3 figures, submitted to ISIT2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The covariance evolution is a system of differential equations with respect to the covariance of the number of edges connecting to the nodes of each residual degree. Solving the covariance evolution, we can derive distributions of the number of check nodes of residual degree 1, which helps us to estimate the block error probability for finite-length LDPC code. Amraoui et al.\ resorted to numerical computations to solve the covariance evolution. In this paper, we give the analytical solution of the covariance evolution.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 12:58:26 GMT" } ]
2009-01-20T00:00:00
[ [ "Nozaki", "Takayuki", "" ], [ "Kasai", "Kenta", "" ], [ "Sakaniwa", "Kohichi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2847
Dominique Rossin
Mathilde Bouvel (LIAFA), Cedric Chauve, Marni Mishna, Dominique Rossin (LIAFA)
Average-case analysis of perfect sorting by reversals
null
CPM'09, Lille : France (2009)
null
null
math.CO cs.DS q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A sequence of reversals that takes a signed permutation to the identity is perfect if at no step a common interval is broken. Determining a parsimonious perfect sequence of reversals that sorts a signed permutation is NP-hard. Here we show that, despite this worst-case analysis, with probability one, sorting can be done in polynomial time. Further, we find asymptotic expressions for the average length and number of reversals in commuting permutations, an interesting sub-class of signed permutations.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 13:11:17 GMT" } ]
2009-05-18T00:00:00
[ [ "Bouvel", "Mathilde", "", "LIAFA" ], [ "Chauve", "Cedric", "", "LIAFA" ], [ "Mishna", "Marni", "", "LIAFA" ], [ "Rossin", "Dominique", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0901.2850
Piero Bonatti
Sabrina Baselice, Piero A. Bonatti, Giovanni Criscuolo
On finitely recursive programs
26 pages, Preliminary version in Proc. of ICLP 2007, Best paper award
Theory and Practice of Logic Programming, 9(2), 213-238, 2009
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Disjunctive finitary programs are a class of logic programs admitting function symbols and hence infinite domains. They have very good computational properties, for example ground queries are decidable while in the general case the stable model semantics is highly undecidable. In this paper we prove that a larger class of programs, called finitely recursive programs, preserves most of the good properties of finitary programs under the stable model semantics, namely: (i) finitely recursive programs enjoy a compactness property; (ii) inconsistency checking and skeptical reasoning are semidecidable; (iii) skeptical resolution is complete for normal finitely recursive programs. Moreover, we show how to check inconsistency and answer skeptical queries using finite subsets of the ground program instantiation. We achieve this by extending the splitting sequence theorem by Lifschitz and Turner: We prove that if the input program P is finitely recursive, then the partial stable models determined by any smooth splitting omega-sequence converge to a stable model of P.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 13:23:09 GMT" } ]
2009-05-25T00:00:00
[ [ "Baselice", "Sabrina", "" ], [ "Bonatti", "Piero A.", "" ], [ "Criscuolo", "Giovanni", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0901.2864
Iwan M. Duursma
Iwan Duursma and Radoslav Kirov
An extension of the order bound for AG codes
11 pages
null
10.1007/978-3-642-02181-7
null
math.NT cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The most successful method to obtain lower bounds for the minimum distance of an algebraic geometric code is the order bound, which generalizes the Feng-Rao bound. We provide a significant extension of the bound that improves the order bounds by Beelen and by Duursma and Park. We include an exhaustive numerical comparison of the different bounds for 10168 two-point codes on the Suzuki curve of genus g=124 over the field of 32 elements. Keywords: algebraic geometric code, order bound, Suzuki curve.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 16:54:01 GMT" } ]
2010-04-13T00:00:00
[ [ "Duursma", "Iwan", "" ], [ "Kirov", "Radoslav", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]