id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0504035
|
Marcus Hutter
|
Shane Legg and Marcus Hutter
|
Fitness Uniform Deletion: A Simple Way to Preserve Diversity
|
8 two-column pages, 19 figures
|
Proc. Genetic and Evolutionary Computation Conference (GECCO 2005)
1271-1278
| null |
IDSIA-11-04
|
cs.NE cs.AI
| null |
A commonly experienced problem with population based optimisation methods is
the gradual decline in population diversity that tends to occur over time. This
can slow a system's progress or even halt it completely if the population
converges on a local optimum from which it cannot escape. In this paper we
present the Fitness Uniform Deletion Scheme (FUDS), a simple but somewhat
unconventional approach to this problem. Under FUDS the deletion operation is
modified to only delete those individuals which are "common" in the sense that
there exist many other individuals of similar fitness in the population. This
makes it impossible for the population to collapse to a collection of highly
related individuals with similar fitness. Our experimental results on a range
of optimisation problems confirm this, in particular for deceptive optimisation
problems the performance is significantly more robust to variation in the
selection intensity.
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2005 10:42:41 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Legg",
"Shane",
""
],
[
"Hutter",
"Marcus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504036
|
Richard Belew
|
Richard K. Belew
|
Scientific impact quantity and quality: Analysis of two sources of
bibliographic data
|
12 pages, 1 table, 6 figures
| null | null | null |
cs.IR cs.DL
| null |
Attempts to understand the consequence of any individual scientist's activity
within the long-term trajectory of science is one of the most difficult
questions within the philosophy of science. Because scientific publications
play such as central role in the modern enterprise of science, bibliometric
techniques which measure the ``impact'' of an individual publication as a
function of the number of citations it receives from subsequent authors have
provided some of the most useful empirical data on this question. Until
recently, Thompson/ISI has provided the only source of large-scale ``inverted''
bibliographic data of the sort required for impact analysis. In the end of
2004, Google introduced a new service, GoogleScholar, making much of this same
data available. Here we analyze 203 publications, collectively cited by more
than 4000 other publications. We show surprisingly good agreement between data
citation counts provided by the two services. Data quality across the systems
is analyzed, and potentially useful complementarities between are considered.
The additional robustness offered by multiple sources of such data promises to
increase the utility of these measurements as open citation protocols and open
access increase their impact on electronic scientific publication practices.
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2005 13:52:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Belew",
"Richard K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0504037
|
K. P.N. Murthy
|
K. P. N. Murthy, M. Janani and B. Shenbga Priya
|
Bayesian Restoration of Digital Images Employing Markov Chain Monte
Carlo a Review
|
42 pages; 16 figures; revised version with several typos removed and
mistakes in equations corrected
| null | null | null |
cs.CV cond-mat.stat-mech physics.comp-ph
| null |
A review of Bayesian restoration of digital images based on Monte Carlo
techniques is presented. The topics covered include Likelihood, Prior and
Posterior distributions, Poisson, Binay symmetric channel, and Gaussian channel
models of Likelihood distribution,Ising and Potts spin models of Prior
distribution, restoration of an image through Posterior maximization,
statistical estimation of a true image from Posterior ensembles, Markov Chain
Monte Carlo methods and cluster algorithms.
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2005 12:41:19 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Oct 2006 14:34:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Murthy",
"K. P. N.",
""
],
[
"Janani",
"M.",
""
],
[
"Priya",
"B. Shenbga",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
] |
cs/0504038
|
Bodo Manthey
|
Bodo Manthey
|
On Approximating Restricted Cycle Covers
|
To appear in SIAM Journal on Computing. Minor changes
| null | null | null |
cs.CC cs.DM
| null |
A cycle cover of a graph is a set of cycles such that every vertex is part of
exactly one cycle. An L-cycle cover is a cycle cover in which the length of
every cycle is in the set L. The weight of a cycle cover of an edge-weighted
graph is the sum of the weights of its edges.
We come close to settling the complexity and approximability of computing
L-cycle covers. On the one hand, we show that for almost all L, computing
L-cycle covers of maximum weight in directed and undirected graphs is APX-hard
and NP-hard. Most of our hardness results hold even if the edge weights are
restricted to zero and one.
On the other hand, we show that the problem of computing L-cycle covers of
maximum weight can be approximated within a factor of 2 for undirected graphs
and within a factor of 8/3 in the case of directed graphs. This holds for
arbitrary sets L.
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2005 12:47:02 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Jun 2005 09:36:17 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Sep 2005 10:34:14 GMT"
},
{
"version": "v4",
"created": "Fri, 15 Dec 2006 14:09:30 GMT"
},
{
"version": "v5",
"created": "Mon, 8 Oct 2007 09:30:54 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Manthey",
"Bodo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0504039
|
Andrey Grozin
|
A. G. Grozin
|
TeXmacs-maxima interface
|
html file, 32 png screenshots
| null | null | null |
cs.SC cs.MS hep-ph
| null |
This tutorial presents features of the new and improved TeXmacs-maxima
interface. It is designed for running maxima-5.9.2 from TeXmacs-1.0.5 (or
later).
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2005 16:39:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Grozin",
"A. G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Physics",
"code": "hep-ph",
"description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.",
"span": "(High Energy Physics - Phenomenology)"
}
] |
cs/0504040
|
J?r?mie Leguay M.
|
Jeremie Leguay, Timur Friedman and Vania Conan
|
DTN Routing in a Mobility Pattern Space
|
8 pages, preprint
| null | null | null |
cs.NI
| null |
Routing in Delay Tolerant Networks (DTNs) benefits considerably if one can
take advantage of knowledge concerning node mobility. The main contribution of
this paper is the definition of a generic routing scheme for DTNs using a
high-dimensional Euclidean space constructed upon nodes' mobility patterns. For
example, nodes are represented as points having as coordinates their
probability of being found in each possible location. We present simulation
results indicating that such a scheme can be beneficial in a scenario inspired
by studies done on real mobility traces. This work should open the way to
further use of the virtual space formalism in DTN routing.
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2005 17:03:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Leguay",
"Jeremie",
""
],
[
"Friedman",
"Timur",
""
],
[
"Conan",
"Vania",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0504041
|
Vitaly Schetinin
|
Vitaly Schetinin and Joachim Schult
|
Learning Polynomial Networks for Classification of Clinical
Electroencephalograms
| null |
J Soft Computing 2005
| null | null |
cs.AI cs.NE
| null |
We describe a polynomial network technique developed for learning to classify
clinical electroencephalograms (EEGs) presented by noisy features. Using an
evolutionary strategy implemented within Group Method of Data Handling, we
learn classification models which are comprehensively described by sets of
short-term polynomials. The polynomial models were learnt to classify the EEGs
recorded from Alzheimer and healthy patients and recognize the EEG artifacts.
Comparing the performances of our technique and some machine learning methods
we conclude that our technique can learn well-suited polynomial models which
experts can find easy-to-understand.
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2005 17:11:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
],
[
"Schult",
"Joachim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0504042
|
Vitaly Schetinin
|
V. Schetinin, J.E. Fieldsend, D. Partridge, W.J. Krzanowski, R.M.
Everson, T.C. Bailey, A. Hernandez
|
The Bayesian Decision Tree Technique with a Sweeping Strategy
| null | null | null | null |
cs.AI cs.LG
| null |
The uncertainty of classification outcomes is of crucial importance for many
safety critical applications including, for example, medical diagnostics. In
such applications the uncertainty of classification can be reliably estimated
within a Bayesian model averaging technique that allows the use of prior
information. Decision Tree (DT) classification models used within such a
technique gives experts additional information by making this classification
scheme observable. The use of the Markov Chain Monte Carlo (MCMC) methodology
of stochastic sampling makes the Bayesian DT technique feasible to perform.
However, in practice, the MCMC technique may become stuck in a particular DT
which is far away from a region with a maximal posterior. Sampling such DTs
causes bias in the posterior estimates, and as a result the evaluation of
classification uncertainty may be incorrect. In a particular case, the negative
effect of such sampling may be reduced by giving additional prior information
on the shape of DTs. In this paper we describe a new approach based on sweeping
the DTs without additional priors on the favorite shape of DTs. The
performances of Bayesian DT techniques with the standard and sweeping
strategies are compared on a synthetic data as well as on real datasets.
Quantitatively evaluating the uncertainty in terms of entropy of class
posterior probabilities, we found that the sweeping strategy is superior to the
standard strategy.
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2005 17:45:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"V.",
""
],
[
"Fieldsend",
"J. E.",
""
],
[
"Partridge",
"D.",
""
],
[
"Krzanowski",
"W. J.",
""
],
[
"Everson",
"R. M.",
""
],
[
"Bailey",
"T. C.",
""
],
[
"Hernandez",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0504043
|
Vitaly Schetinin
|
V. Schetinin, D. Partridge, W.J. Krzanowski, R.M. Everson, J.E.
Fieldsend, T.C. Bailey, and A. Hernandez
|
Experimental Comparison of Classification Uncertainty for Randomised and
Bayesian Decision Tree Ensembles
|
IDEAL-2004
| null | null | null |
cs.AI cs.LG
| null |
In this paper we experimentally compare the classification uncertainty of the
randomised Decision Tree (DT) ensemble technique and the Bayesian DT technique
with a restarting strategy on a synthetic dataset as well as on some datasets
commonly used in the machine learning community. For quantitative evaluation of
classification uncertainty, we use an Uncertainty Envelope dealing with the
class posterior distribution and a given confidence probability. Counting the
classifier outcomes, this technique produces feasible evaluations of the
classification uncertainty. Using this technique in our experiments, we found
that the Bayesian DT technique is superior to the randomised DT ensemble
technique.
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2005 17:53:35 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"V.",
""
],
[
"Partridge",
"D.",
""
],
[
"Krzanowski",
"W. J.",
""
],
[
"Everson",
"R. M.",
""
],
[
"Fieldsend",
"J. E.",
""
],
[
"Bailey",
"T. C.",
""
],
[
"Hernandez",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0504044
|
Richard McClatchey
|
Michael Thomas, Conrad Steenberg, Frank van Lingen, Harvey Newman,
Julian Bunn, Arshad Ali, Richard McClatchey, Ashiq Anjum, Tahir Azim, Waqas
ur Rehman, Faisal Khan, Jang Uk In
|
JClarens: A Java Framework for Developing and Deploying Web Services for
Grid Computing
|
8 pages, 4 figures. Paper at the 3rd IEEE International Conference on
Web Services (ICWS05). Florida, USA. July 2005
| null | null | null |
cs.DC
| null |
High Energy Physics (HEP) and other scientific communities have adopted
Service Oriented Architectures (SOA) as part of a larger Grid computing effort.
This effort involves the integration of many legacy applications and
programming libraries into a SOA framework. The Grid Analysis Environment (GAE)
is such a service oriented architecture based on the Clarens Grid Services
Framework and is being developed as part of the Compact Muon Solenoid (CMS)
experiment at the Large Hadron Collider (LHC) at European Laboratory for
Particle Physics (CERN). Clarens provides a set of authorization, access
control, and discovery services, as well as XMLRPC and SOAP access to all
deployed services. Two implementations of the Clarens Web Services Framework
(Python and Java) offer integration possibilities for a wide range of
programming languages. This paper describes the Java implementation of the
Clarens Web Services Framework called JClarens. and several web services of
interest to the scientific and Grid community that have been deployed using
JClarens.
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2005 21:45:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Thomas",
"Michael",
""
],
[
"Steenberg",
"Conrad",
""
],
[
"van Lingen",
"Frank",
""
],
[
"Newman",
"Harvey",
""
],
[
"Bunn",
"Julian",
""
],
[
"Ali",
"Arshad",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Anjum",
"Ashiq",
""
],
[
"Azim",
"Tahir",
""
],
[
"Rehman",
"Waqas ur",
""
],
[
"Khan",
"Faisal",
""
],
[
"In",
"Jang Uk",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0504045
|
Stephanie Wehner
|
Stephanie Wehner (CWI, Amsterdam)
|
Analyzing Worms and Network Traffic using Compression
|
12 pages, LaTeX, two columns
|
Journal of Computer Security, Vol 15, Number 3, 303-320, 2007
| null | null |
cs.CR
| null |
Internet worms have become a widespread threat to system and network
operations. In order to fight them more efficiently, it is necessary to analyze
newly discovered worms and attack patterns. This paper shows how techniques
based on Kolmogorov Complexity can help in the analysis of internet worms and
network traffic. Using compression, different species of worms can be clustered
by type. This allows us to determine whether an unknown worm binary could in
fact be a later version of an existing worm in an extremely simple, automated,
manner. This may become a useful tool in the initial analysis of malicious
binaries. Furthermore, compression can also be useful to distinguish different
types of network traffic and can thus help to detect traffic anomalies: Certain
anomalies may be detected by looking at the compressibility of a network
session alone. We furthermore show how to use compression to detect malicious
network sessions that are very similar to known intrusion attempts. This
technique could become a useful tool to detect new variations of an attack and
thus help to prevent IDS evasion. We provide two new plugins for Snort which
demonstrate both approaches.
|
[
{
"version": "v1",
"created": "Tue, 12 Apr 2005 16:50:07 GMT"
}
] | 2009-04-07T00:00:00 |
[
[
"Wehner",
"Stephanie",
"",
"CWI, Amsterdam"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0504046
|
George Gemelos
|
George M. Gemelos and Tsachy Weissman
|
On the Entropy Rate of Pattern Processes
|
Submitted to IEEE Transactions of Information Theory
| null | null | null |
cs.IT math.IT
| null |
We study the entropy rate of pattern sequences of stochastic processes, and
its relationship to the entropy rate of the original process. We give a
complete characterization of this relationship for i.i.d. processes over
arbitrary alphabets, stationary ergodic processes over discrete alphabets, and
a broad family of stationary ergodic processes over uncountable alphabets. For
cases where the entropy rate of the pattern process is infinite, we
characterize the possible growth rate of the block entropy.
|
[
{
"version": "v1",
"created": "Tue, 12 Apr 2005 19:47:53 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Feb 2006 04:12:41 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gemelos",
"George M.",
""
],
[
"Weissman",
"Tsachy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0504047
|
David Doty
|
David Doty, Jared Nichols
|
Pushdown dimension
|
10 page main body; 12 page appendix of proofs
| null | null | null |
cs.IT cs.CC math.IT
| null |
This paper develops the theory of pushdown dimension and explores its
relationship with finite-state dimension. Pushdown dimension is trivially
bounded above by finite-state dimension for all sequences, since a pushdown
gambler can simulate any finite-state gambler. We show that for every rational
0 < d < 1, there exists a sequence with finite-state dimension d whose pushdown
dimension is at most d/2. This establishes a quantitative analogue of the
well-known fact that pushdown automata decide strictly more languages than
finite automata.
|
[
{
"version": "v1",
"created": "Tue, 12 Apr 2005 22:13:12 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Apr 2005 23:12:11 GMT"
},
{
"version": "v3",
"created": "Fri, 22 Apr 2005 05:09:08 GMT"
},
{
"version": "v4",
"created": "Fri, 27 May 2005 02:46:26 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Doty",
"David",
""
],
[
"Nichols",
"Jared",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0504048
|
Scott Aaronson
|
Scott Aaronson
|
Oracles Are Subtle But Not Malicious
|
20 pages, 1 figure
| null | null | null |
cs.CC quant-ph
| null |
Theoretical computer scientists have been debating the role of oracles since
the 1970's. This paper illustrates both that oracles can give us nontrivial
insights about the barrier problems in circuit complexity, and that they need
not prevent us from trying to solve those problems.
First, we give an oracle relative to which PP has linear-sized circuits, by
proving a new lower bound for perceptrons and low- degree threshold
polynomials. This oracle settles a longstanding open question, and generalizes
earlier results due to Beigel and to Buhrman, Fortnow, and Thierauf. More
importantly, it implies the first nonrelativizing separation of "traditional"
complexity classes, as opposed to interactive proof classes such as MIP and
MA-EXP. For Vinodchandran showed, by a nonrelativizing argument, that PP does
not have circuits of size n^k for any fixed k. We present an alternative proof
of this fact, which shows that PP does not even have quantum circuits of size
n^k with quantum advice. To our knowledge, this is the first nontrivial lower
bound on quantum circuit size.
Second, we study a beautiful algorithm of Bshouty et al. for learning Boolean
circuits in ZPP^NP. We show that the NP queries in this algorithm cannot be
parallelized by any relativizing technique, by giving an oracle relative to
which ZPP^||NP and even BPP^||NP have linear-size circuits. On the other hand,
we also show that the NP queries could be parallelized if P=NP. Thus, classes
such as ZPP^||NP inhabit a "twilight zone," where we need to distinguish
between relativizing and black-box techniques. Our results on this subject have
implications for computational learning theory as well as for the circuit
minimization problem.
|
[
{
"version": "v1",
"created": "Tue, 12 Apr 2005 22:57:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Aaronson",
"Scott",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0504049
|
Gil Shamir
|
Gil I. Shamir
|
Bounds on the Entropy of Patterns of I.I.D. Sequences
|
submitted to ITW2005
| null | null | null |
cs.IT math.IT
| null |
Bounds on the entropy of patterns of sequences generated by independently
identically distributed (i.i.d.) sources are derived. A pattern is a sequence
of indices that contains all consecutive integer indices in increasing order of
first occurrence. If the alphabet of a source that generated a sequence is
unknown, the inevitable cost of coding the unknown alphabet symbols can be
exploited to create the pattern of the sequence. This pattern can in turn be
compressed by itself. The bounds derived here are functions of the i.i.d.
source entropy, alphabet size, and letter probabilities. It is shown that for
large alphabets, the pattern entropy must decrease from the i.i.d. one. The
decrease is in many cases more significant than the universal coding redundancy
bounds derived in prior works. The pattern entropy is confined between two
bounds that depend on the arrangement of the letter probabilities in the
probability space. For very large alphabets whose size may be greater than the
coded pattern length, all low probability letters are packed into one symbol.
The pattern entropy is upper and lower bounded in terms of the i.i.d. entropy
of the new packed alphabet. Correction terms, which are usually negligible, are
provided for both upper and lower bounds.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 03:22:15 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Shamir",
"Gil I.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0504050
|
Ivan Lanese
|
Ivan Lanese and Ugo Montanari
|
Mapping Fusion and Synchronized Hyperedge Replacement into Logic
Programming
|
44 pages, 8 figures, to appear in a special issue of Theory and
Practice of Logic Programming, minor revision
| null | null | null |
cs.LO cs.PL
| null |
In this paper we compare three different formalisms that can be used in the
area of models for distributed, concurrent and mobile systems. In particular we
analyze the relationships between a process calculus, the Fusion Calculus,
graph transformations in the Synchronized Hyperedge Replacement with Hoare
synchronization (HSHR) approach and logic programming. We present a translation
from Fusion Calculus into HSHR (whereas Fusion Calculus uses Milner
synchronization) and prove a correspondence between the reduction semantics of
Fusion Calculus and HSHR transitions. We also present a mapping from HSHR into
a transactional version of logic programming and prove that there is a full
correspondence between the two formalisms. The resulting mapping from Fusion
Calculus to logic programming is interesting since it shows the tight analogies
between the two formalisms, in particular for handling name generation and
mobility. The intermediate step in terms of HSHR is convenient since graph
transformations allow for multiple, remote synchronizations, as required by
Fusion Calculus semantics.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 14:40:28 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Jan 2006 09:55:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lanese",
"Ivan",
""
],
[
"Montanari",
"Ugo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0504051
|
Tassos Argyros
|
Tassos S. Argyros and David R. Cheriton
|
A Scalable Stream-Oriented Framework for Cluster Applications
| null | null | null | null |
cs.DC cs.DB cs.NI cs.OS cs.PL
| null |
This paper presents a stream-oriented architecture for structuring cluster
applications. Clusters that run applications based on this architecture can
scale to tenths of thousands of nodes with significantly less performance loss
or reliability problems. Our architecture exploits the stream nature of the
data flow and reduces congestion through load balancing, hides latency behind
data pushes and transparently handles node failures. In our ongoing work, we
are developing an implementation for this architecture and we are able to run
simple data mining applications on a cluster simulator.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 16:37:59 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Argyros",
"Tassos S.",
""
],
[
"Cheriton",
"David R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0504052
|
Vitaly Schetinin
|
Vitaly Schetinin, Joachim Schult, Burkhart Scheidt, and Valery
Kuriakin
|
Learning Multi-Class Neural-Network Models from Electroencephalograms
|
KES-2003
| null | null | null |
cs.NE cs.LG
| null |
We describe a new algorithm for learning multi-class neural-network models
from large-scale clinical electroencephalograms (EEGs). This algorithm trains
hidden neurons separately to classify all the pairs of classes. To find best
pairwise classifiers, our algorithm searches for input variables which are
relevant to the classification problem. Despite patient variability and heavily
overlapping classes, a 16-class model learnt from EEGs of 65 sleeping newborns
correctly classified 80.8% of the training and 80.1% of the testing examples.
Additionally, the neural-network model provides a probabilistic interpretation
of decisions.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 13:22:49 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
],
[
"Schult",
"Joachim",
""
],
[
"Scheidt",
"Burkhart",
""
],
[
"Kuriakin",
"Valery",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0504053
|
Vitaly Schetinin
|
V.V.Zharkova and V.Schetinin
|
A Neural-Network Technique for Recognition of Filaments in Solar Images
| null | null | null | null |
cs.NE
| null |
We describe a new neural-network technique developed for an automated
recognition of solar filaments visible in the hydrogen H-alpha line full disk
spectroheliograms. This technique allows neural networks learn from a few image
fragments labelled manually to recognize the single filaments depicted on a
local background. The trained network is able to recognize filaments depicted
on the backgrounds with variations in brightness caused by atmospherics
distortions. Despite the difference in backgrounds in our experiments the
neural network has properly recognized filaments in the testing image
fragments. Using a parabolic activation function we extend this technique to
recognize multiple solar filaments which may appear in one fragment.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 13:28:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zharkova",
"V. V.",
""
],
[
"Schetinin",
"V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0504054
|
Vitaly Schetinin
|
Vitaly Schetinin
|
Learning from Web: Review of Approaches
| null | null | null | null |
cs.NE cs.LG
| null |
Knowledge discovery is defined as non-trivial extraction of implicit,
previously unknown and potentially useful information from given data.
Knowledge extraction from web documents deals with unstructured, free-format
documents whose number is enormous and rapidly growing. The artificial neural
networks are well suitable to solve a problem of knowledge discovery from web
documents because trained networks are able more accurately and easily to
classify the learning and testing examples those represent the text mining
domain. However, the neural networks that consist of large number of weighted
connections and activation units often generate the incomprehensible and
hard-to-understand models of text classification. This problem may be also
addressed to most powerful recurrent neural networks that employ the feedback
links from hidden or output units to their input units. Due to feedback links,
recurrent neural networks are able take into account of a context in document.
To be useful for data mining, self-organizing neural network techniques of
knowledge extraction have been explored and developed. Self-organization
principles were used to create an adequate neural-network structure and reduce
a dimensionality of features used to describe text documents. The use of these
principles seems interesting because ones are able to reduce a neural-network
redundancy and considerably facilitate the knowledge representation.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 13:40:38 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0504055
|
Vitaly Schetinin
|
Vitaly Schetinin
|
A Learning Algorithm for Evolving Cascade Neural Networks
| null |
Neural Processing Letter 17:21-31, 2003. Kluwer
| null | null |
cs.NE cs.AI
| null |
A new learning algorithm for Evolving Cascade Neural Networks (ECNNs) is
described. An ECNN starts to learn with one input node and then adding new
inputs as well as new hidden neurons evolves it. The trained ECNN has a nearly
minimal number of input and hidden neurons as well as connections. The
algorithm was successfully applied to classify artifacts and normal segments in
clinical electroencephalograms (EEGs). The EEG segments were visually labeled
by EEG-viewer. The trained ECNN has correctly classified 96.69% of the testing
segments. It is slightly better than a standard fully connected neural network.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 13:57:56 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504056
|
Vitaly Schetinin
|
V. Schetinin
|
Self-Organizing Multilayered Neural Networks of Optimal Complexity
| null | null | null | null |
cs.NE cs.AI
| null |
The principles of self-organizing the neural networks of optimal complexity
is considered under the unrepresentative learning set. The method of
self-organizing the multi-layered neural networks is offered and used to train
the logical neural networks which were applied to the medical diagnostics.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 13:59:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504057
|
Vitaly Schetinin
|
Vitaly Schetinin and Anatoly Brazhnikov
|
Diagnostic Rule Extraction Using Neural Networks
| null | null | null | null |
cs.NE cs.AI
| null |
The neural networks have trained on incomplete sets that a doctor could
collect. Trained neural networks have correctly classified all the presented
instances. The number of intervals entered for encoding the quantitative
variables is equal two. The number of features as well as the number of neurons
and layers in trained neural networks was minimal. Trained neural networks are
adequately represented as a set of logical formulas that more comprehensible
and easy-to-understand. These formulas are as the syndrome-complexes, which may
be easily tabulated and represented as a diagnostic table that the doctors
usually use. Decision rules provide the evaluations of their confidence in
which interested a doctor. Conducted clinical researches have shown that
iagnostic decisions produced by symbolic rules have coincided with the doctor's
conclusions.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 14:03:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
],
[
"Brazhnikov",
"Anatoly",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504058
|
Vitaly Schetinin
|
Vitaly Schetinin
|
Polynomial Neural Networks Learnt to Classify EEG Signals
| null | null | null | null |
cs.NE cs.AI
| null |
A neural network based technique is presented, which is able to successfully
extract polynomial classification rules from labeled electroencephalogram (EEG)
signals. To represent the classification rules in an analytical form, we use
the polynomial neural networks trained by a modified Group Method of Data
Handling (GMDH). The classification rules were extracted from clinical EEG data
that were recorded from an Alzheimer patient and the sudden death risk
patients. The third data is EEG recordings that include the normal and artifact
segments. These EEG data were visually identified by medical experts. The
extracted polynomial rules verified on the testing EEG data allow to correctly
classify 72% of the risk group patients and 96.5% of the segments. These rules
performs slightly better than standard feedforward neural networks.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 14:06:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504059
|
Vitaly Schetinin
|
Vitaly Schetinin
|
A Neural Network Decision Tree for Learning Concepts from EEG Data
| null | null | null | null |
cs.NE cs.AI
| null |
To learn the multi-class conceptions from the electroencephalogram (EEG) data
we developed a neural network decision tree (DT), that performs the linear
tests, and a new training algorithm. We found that the known methods fail
inducting the classification models when the data are presented by the features
some of them are irrelevant, and the classes are heavily overlapped. To train
the DT, our algorithm exploits a bottom up search of the features that provide
the best classification accuracy of the linear tests. We applied the developed
algorithm to induce the DT from the large EEG dataset consisted of 65 patients
belonging to 16 age groups. In these recordings each EEG segment was
represented by 72 calculated features. The DT correctly classified 80.8% of the
training and 80.1% of the testing examples. Correspondingly it correctly
classified 89.2% and 87.7% of the EEG recordings.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 14:28:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504060
|
George Gemelos
|
George Gemelos, Styrmir Sigurjonsson and Tsachy Weissman
|
Universal Minimax Discrete Denoising under Channel Uncertainty
|
Submitted to IEEE Transactions of Information Theory
| null | null | null |
cs.IT math.IT
| null |
The goal of a denoising algorithm is to recover a signal from its
noise-corrupted observations. Perfect recovery is seldom possible and
performance is measured under a given single-letter fidelity criterion. For
discrete signals corrupted by a known discrete memoryless channel, the DUDE was
recently shown to perform this task asymptotically optimally, without knowledge
of the statistical properties of the source. In the present work we address the
scenario where, in addition to the lack of knowledge of the source statistics,
there is also uncertainty in the channel characteristics. We propose a family
of discrete denoisers and establish their asymptotic optimality under a minimax
performance criterion which we argue is appropriate for this setting. As we
show elsewhere, the proposed schemes can also be implemented computationally
efficiently.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 19:20:05 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Aug 2005 21:01:19 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gemelos",
"George",
""
],
[
"Sigurjonsson",
"Styrmir",
""
],
[
"Weissman",
"Tsachy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0504061
|
Stergos Afantenos
|
Stergos D. Afantenos, Vangelis Karkaletsis, Panagiotis Stamatopoulos
|
Summarization from Medical Documents: A Survey
|
21 pages, 4 tables
|
Artificial Intelligence in Medicine, Volume 33, Issue 2, February
2005, Pages 157-177
|
10.1016/j.artmed.2004.07.017
| null |
cs.CL cs.IR
| null |
Objective:
The aim of this paper is to survey the recent work in medical documents
summarization.
Background:
During the last decade, documents summarization got increasing attention by
the AI research community. More recently it also attracted the interest of the
medical research community as well, due to the enormous growth of information
that is available to the physicians and researchers in medicine, through the
large and growing number of published journals, conference proceedings, medical
sites and portals on the World Wide Web, electronic medical records, etc.
Methodology:
This survey gives first a general background on documents summarization,
presenting the factors that summarization depends upon, discussing evaluation
issues and describing briefly the various types of summarization techniques. It
then examines the characteristics of the medical domain through the different
types of medical documents. Finally, it presents and discusses the
summarization techniques used so far in the medical domain, referring to the
corresponding systems and their characteristics.
Discussion and conclusions:
The paper discusses thoroughly the promising paths for future research in
medical documents summarization. It mainly focuses on the issue of scaling to
large collections of documents in various languages and from different media,
on personalization issues, on portability to new sub-domains, and on the
integration of summarization technology in practical applications
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2005 20:02:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Afantenos",
"Stergos D.",
""
],
[
"Karkaletsis",
"Vangelis",
""
],
[
"Stamatopoulos",
"Panagiotis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0504062
|
Elchanan Mossel
|
Irit Dinur and Elchanan Mossel and Oded Regev
|
Conditional Hardness for Approximate Coloring
| null | null | null | null |
cs.CC math.PR
| null |
We study the coloring problem: Given a graph G, decide whether $c(G) \leq q$
or $c(G) \ge Q$, where c(G) is the chromatic number of G. We derive conditional
hardness for this problem for any constant $3 \le q < Q$. For $q\ge 4$, our
result is based on Khot's 2-to-1 conjecture [Khot'02]. For $q=3$, we base our
hardness result on a certain `fish shaped' variant of his conjecture.
We also prove that the problem almost coloring is hard for any constant
$\eps>0$, assuming Khot's Unique Games conjecture. This is the problem of
deciding for a given graph, between the case where one can 3-color all but a
$\eps$ fraction of the vertices without monochromatic edges, and the case where
the graph contains no independent set of relative size at least $\eps$.
Our result is based on bounding various generalized noise-stability
quantities using the invariance principle of Mossel et al [MOO'05].
|
[
{
"version": "v1",
"created": "Thu, 14 Apr 2005 00:43:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dinur",
"Irit",
""
],
[
"Mossel",
"Elchanan",
""
],
[
"Regev",
"Oded",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0504063
|
Zsolt Palotai
|
Zs. Palotai, Cs. Farkas, A. Lorincz
|
Selection in Scale-Free Small World
|
24 pages, 3 figures
| null | null | null |
cs.LG cs.IR
| null |
In this paper we compare the performance characteristics of our selection
based learning algorithm for Web crawlers with the characteristics of the
reinforcement learning algorithm. The task of the crawlers is to find new
information on the Web. The selection algorithm, called weblog update, modifies
the starting URL lists of our crawlers based on the found URLs containing new
information. The reinforcement learning algorithm modifies the URL orderings of
the crawlers based on the received reinforcements for submitted documents. We
performed simulations based on data collected from the Web. The collected
portion of the Web is typical and exhibits scale-free small world (SFSW)
structure. We have found that on this SFSW, the weblog update algorithm
performs better than the reinforcement learning algorithm. It finds the new
information faster than the reinforcement learning algorithm and has better new
information/all submitted documents ratio. We believe that the advantages of
the selection algorithm over reinforcement learning algorithm is due to the
small world property of the Web.
|
[
{
"version": "v1",
"created": "Thu, 14 Apr 2005 07:57:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Palotai",
"Zs.",
""
],
[
"Farkas",
"Cs.",
""
],
[
"Lorincz",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0504064
|
Vitaly Schetinin
|
Vitaly Schetinin, Joachim Schult and Anatoly Brazhnikov
|
Neural-Network Techniques for Visual Mining Clinical
Electroencephalograms
| null | null | null | null |
cs.AI
| null |
In this chapter we describe new neural-network techniques developed for
visual mining clinical electroencephalograms (EEGs), the weak electrical
potentials invoked by brain activity. These techniques exploit fruitful ideas
of Group Method of Data Handling (GMDH). Section 2 briefly describes the
standard neural-network techniques which are able to learn well-suited
classification modes from data presented by relevant features. Section 3
introduces an evolving cascade neural network technique which adds new input
nodes as well as new neurons to the network while the training error decreases.
This algorithm is applied to recognize artifacts in the clinical EEGs. Section
4 presents the GMDH-type polynomial networks learnt from data. We applied this
technique to distinguish the EEGs recorded from an Alzheimer and a healthy
patient as well as recognize EEG artifacts. Section 5 describes the new
neural-network technique developed to induce multi-class concepts from data. We
used this technique for inducing a 16-class concept from the large-scale
clinical EEG data. Finally we discuss perspectives of applying the
neural-network techniques to clinical EEGs.
|
[
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:27:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
],
[
"Schult",
"Joachim",
""
],
[
"Brazhnikov",
"Anatoly",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504065
|
Vitaly Schetinin
|
Vitaly Schetinin, Jonathan E. Fieldsend, Derek Partridge, Wojtek J.
Krzanowski, Richard M. Everson, Trevor C. Bailey and Adolfo Hernandez
|
Estimating Classification Uncertainty of Bayesian Decision Tree
Technique on Financial Data
| null | null | null | null |
cs.AI
| null |
Bayesian averaging over classification models allows the uncertainty of
classification outcomes to be evaluated, which is of crucial importance for
making reliable decisions in applications such as financial in which risks have
to be estimated. The uncertainty of classification is determined by a trade-off
between the amount of data available for training, the diversity of a
classifier ensemble and the required performance. The interpretability of
classification models can also give useful information for experts responsible
for making reliable classifications. For this reason Decision Trees (DTs) seem
to be attractive classification models. The required diversity of the DT
ensemble can be achieved by using the Bayesian model averaging all possible
DTs. In practice, the Bayesian approach can be implemented on the base of a
Markov Chain Monte Carlo (MCMC) technique of random sampling from the posterior
distribution. For sampling large DTs, the MCMC method is extended by Reversible
Jump technique which allows inducing DTs under given priors. For the case when
the prior information on the DT size is unavailable, the sweeping technique
defining the prior implicitly reveals a better performance. Within this Chapter
we explore the classification uncertainty of the Bayesian MCMC techniques on
some datasets from the StatLog Repository and real financial data. The
classification uncertainty is compared within an Uncertainty Envelope technique
dealing with the class posterior distribution and a given confidence
probability. This technique provides realistic estimates of the classification
uncertainty which can be easily interpreted in statistical terms with the aim
of risk evaluation.
|
[
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:30:54 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
],
[
"Fieldsend",
"Jonathan E.",
""
],
[
"Partridge",
"Derek",
""
],
[
"Krzanowski",
"Wojtek J.",
""
],
[
"Everson",
"Richard M.",
""
],
[
"Bailey",
"Trevor C.",
""
],
[
"Hernandez",
"Adolfo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504066
|
Vitaly Schetinin
|
Vitaly Schetinin, Jonathan E. Fieldsend, Derek Partridge, Wojtek J.
Krzanowski, Richard M. Everson, Trevor C. Bailey, and Adolfo Hernandez
|
Comparison of the Bayesian and Randomised Decision Tree Ensembles within
an Uncertainty Envelope Technique
| null |
Journal of Mathematical Modelling and Algorithms, 2005
| null | null |
cs.AI
| null |
Multiple Classifier Systems (MCSs) allow evaluation of the uncertainty of
classification outcomes that is of crucial importance for safety critical
applications. The uncertainty of classification is determined by a trade-off
between the amount of data available for training, the classifier diversity and
the required performance. The interpretability of MCSs can also give useful
information for experts responsible for making reliable classifications. For
this reason Decision Trees (DTs) seem to be attractive classification models
for experts. The required diversity of MCSs exploiting such classification
models can be achieved by using two techniques, the Bayesian model averaging
and the randomised DT ensemble. Both techniques have revealed promising results
when applied to real-world problems. In this paper we experimentally compare
the classification uncertainty of the Bayesian model averaging with a
restarting strategy and the randomised DT ensemble on a synthetic dataset and
some domain problems commonly used in the machine learning community. To make
the Bayesian DT averaging feasible, we use a Markov Chain Monte Carlo
technique. The classification uncertainty is evaluated within an Uncertainty
Envelope technique dealing with the class posterior distribution and a given
confidence probability. Exploring a full posterior distribution, this technique
produces realistic estimates which can be easily interpreted in statistical
terms. In our experiments we found out that the Bayesian DTs are superior to
the randomised DT ensembles within the Uncertainty Envelope technique.
|
[
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:33:33 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
],
[
"Fieldsend",
"Jonathan E.",
""
],
[
"Partridge",
"Derek",
""
],
[
"Krzanowski",
"Wojtek J.",
""
],
[
"Everson",
"Richard M.",
""
],
[
"Bailey",
"Trevor C.",
""
],
[
"Hernandez",
"Adolfo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504067
|
Vitaly Schetinin
|
Vitaly Schetinin
|
An Evolving Cascade Neural Network Technique for Cleaning Sleep
Electroencephalograms
| null |
Natural Computing Application, 2005
| null | null |
cs.NE cs.AI
| null |
Evolving Cascade Neural Networks (ECNNs) and a new training algorithm capable
of selecting informative features are described. The ECNN initially learns with
one input node and then evolves by adding new inputs as well as new hidden
neurons. The resultant ECNN has a near minimal number of hidden neurons and
inputs. The algorithm is successfully used for training ECNN to recognise
artefacts in sleep electroencephalograms (EEGs) which were visually labelled by
EEG-viewers. In our experiments, the ECNN outperforms the standard
neural-network as well as evolutionary techniques.
|
[
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:36:54 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504068
|
Vitaly Schetinin
|
V. Schetinin and A. Kostunin
|
Self-Organization of the Neuron Collective of Optimal Complexity
|
NOLTA-1996, Japan
| null | null | null |
cs.NE cs.AI
| null |
The optimal complexity of neural networks is achieved when the
self-organization principles is used to eliminate the contradictions existing
in accordance with the K. Godel theorem about incompleteness of the systems
based on axiomatics. The principle of S. Beer exterior addition the Heuristic
Group Method of Data Handling by A. Ivakhnenko realized is used.
|
[
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:45:06 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"V.",
""
],
[
"Kostunin",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504069
|
Vitaly Schetinin
|
Vitaly Schetinin and Joachim Schult
|
A Neural-Network Technique to Learn Concepts from Electroencephalograms
| null | null | null |
Theory in Biosciences, 2005
|
cs.NE cs.AI cs.LG
| null |
A new technique is presented developed to learn multi-class concepts from
clinical electroencephalograms. A desired concept is represented as a neuronal
computational model consisting of the input, hidden, and output neurons. In
this model the hidden neurons learn independently to classify the
electroencephalogram segments presented by spectral and statistical features.
This technique has been applied to the electroencephalogram data recorded from
65 sleeping healthy newborns in order to learn a brain maturation concept of
newborns aged between 35 and 51 weeks. The 39399 and 19670 segments from these
data have been used for learning and testing the concept, respectively. As a
result, the concept has correctly classified 80.1% of the testing segments or
87.7% of the 65 records.
|
[
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:47:38 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
],
[
"Schult",
"Joachim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0504070
|
Vitaly Schetinin
|
Vitaly Schetinin and Joachim Schult
|
The Combined Technique for Detection of Artifacts in Clinical
Electroencephalograms of Sleeping Newborns
| null | null | null | null |
cs.NE cs.AI cs.LG
| null |
In this paper we describe a new method combining the polynomial neural
network and decision tree techniques in order to derive comprehensible
classification rules from clinical electroencephalograms (EEGs) recorded from
sleeping newborns. These EEGs are heavily corrupted by cardiac, eye movement,
muscle and noise artifacts and as a consequence some EEG features are
irrelevant to classification problems. Combining the polynomial network and
decision tree techniques, we discover comprehensible classification rules
whilst also attempting to keep their classification error down. This technique
is shown to outperform a number of commonly used machine learning technique
applied to automatically recognize artifacts in the sleep EEGs.
|
[
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:49:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schetinin",
"Vitaly",
""
],
[
"Schult",
"Joachim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0504071
|
Byeong Kang Dr
|
Byeong Ho Kang, Achim Hoffmann, Takahira Yamaguchi, Wai Kiang Yeap
|
Proceedings of the Pacific Knowledge Acquisition Workshop 2004
| null | null | null | null |
cs.AI
| null |
Artificial intelligence (AI) research has evolved over the last few decades
and knowledge acquisition research is at the core of AI research. PKAW-04 is
one of three international knowledge acquisition workshops held in the
Pacific-Rim, Canada and Europe over the last two decades. PKAW-04 has a strong
emphasis on incremental knowledge acquisition, machine learning, neural nets
and active mining.
The proceedings contain 19 papers that were selected by the program committee
among 24 submitted papers. All papers were peer reviewed by at least two
reviewers. The papers in these proceedings cover the methods and tools as well
as the applications related to develop expert systems or knowledge based
systems.
|
[
{
"version": "v1",
"created": "Thu, 14 Apr 2005 13:14:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kang",
"Byeong Ho",
""
],
[
"Hoffmann",
"Achim",
""
],
[
"Yamaguchi",
"Takahira",
""
],
[
"Yeap",
"Wai Kiang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504072
|
Marc Barthelemy
|
Marc Barthelemy, Edmond Chow, and Tina Eliassi-Rad
|
Knowledge Representation Issues in Semantic Graphs for Relationship
Detection
|
9 pages, 2 tables, 7 figures
|
Papers from the 2005 AAAI Spring Symposium, AAAI Press, 2005, pp.
91-98
| null | null |
cs.AI physics.soc-ph
| null |
An important task for Homeland Security is the prediction of threat
vulnerabilities, such as through the detection of relationships between
seemingly disjoint entities. A structure used for this task is a "semantic
graph", also known as a "relational data graph" or an "attributed relational
graph". These graphs encode relationships as "typed" links between a pair of
"typed" nodes. Indeed, semantic graphs are very similar to semantic networks
used in AI. The node and link types are related through an ontology graph (also
known as a schema). Furthermore, each node has a set of attributes associated
with it (e.g., "age" may be an attribute of a node of type "person").
Unfortunately, the selection of types and attributes for both nodes and links
depends on human expertise and is somewhat subjective and even arbitrary. This
subjectiveness introduces biases into any algorithm that operates on semantic
graphs. Here, we raise some knowledge representation issues for semantic graphs
and provide some possible solutions using recently developed ideas in the field
of complex networks. In particular, we use the concept of transitivity to
evaluate the relevance of individual links in the semantic graph for detecting
relationships. We also propose new statistical measures for semantic graphs and
illustrate these semantic measures on graphs constructed from movies and
terrorism data.
|
[
{
"version": "v1",
"created": "Thu, 14 Apr 2005 20:15:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Barthelemy",
"Marc",
""
],
[
"Chow",
"Edmond",
""
],
[
"Eliassi-Rad",
"Tina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0504073
|
Karim Seada
|
Karim Seada, Ahmed Helmy
|
Rendezvous Regions: A Scalable Architecture for Resource Discovery and
Service Location in Large-Scale Mobile Networks
| null | null | null | null |
cs.NI
| null |
In large-scale wireless networks such as mobile ad hoc and sensor networks,
efficient and robust service discovery and data-access mechanisms are both
essential and challenging. Rendezvous-based mechanisms provide a valuable
solution for provisioning a wide range of services. In this paper, we describe
Rendezvous Regions (RRs) - a novel scalable rendezvous-based architecture for
wireless networks. RR is a general architecture proposed for service location
and bootstrapping in ad hoc networks, in addition to data-centric storage,
configuration, and task assignment in sensor networks. In RR the network
topology is divided into geographical regions, where each region is responsible
for a set of keys representing the services or data of interest. Each key is
mapped to a region based on a hash-table-like mapping scheme. A few elected
nodes inside each region are responsible for maintaining the mapped
information. The service or data provider stores the information in the
corresponding region and the seekers retrieve it from there. We run extensive
detailed simulations, and high-level simulations and analysis, to investigate
the design space, and study the architecture in various environments including
node mobility and failures. We evaluate it against other approaches to identify
its merits and limitations. The results show high success rate and low overhead
even with dynamics. RR scales to large number of nodes and is highly robust and
efficient to node failures. It is also robust to node mobility and location
inaccuracy with a significant advantage over point-based rendezvous mechanisms.
|
[
{
"version": "v1",
"created": "Fri, 15 Apr 2005 03:01:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Seada",
"Karim",
""
],
[
"Helmy",
"Ahmed",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0504074
|
Carlos Rodriguez
|
Carlos Rodriguez
|
Metalinguistic Information Extraction for Terminology
|
Presented at CompuTerm 2004, COLING. Geneve
| null | null | null |
cs.CL cs.AI cs.IR
| null |
This paper describes and evaluates the Metalinguistic Operation Processor
(MOP) system for automatic compilation of metalinguistic information from
technical and scientific documents. This system is designed to extract
non-standard terminological resources that we have called Metalinguistic
Information Databases (or MIDs), in order to help update changing glossaries,
knowledge bases and ontologies, as well as to reflect the metastable dynamics
of special-domain knowledge.
|
[
{
"version": "v1",
"created": "Fri, 15 Apr 2005 20:10:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Rodriguez",
"Carlos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0504075
|
Lane A. Hemaspaandra
|
Edith Hemaspaandra and Lane A. Hemaspaandra
|
Dichotomy for Voting Systems
| null | null | null |
URCS-TR-2005-861
|
cs.GT cs.CC cs.MA
| null |
Scoring protocols are a broad class of voting systems. Each is defined by a
vector $(\alpha_1,\alpha_2,...,\alpha_m)$, $\alpha_1 \geq \alpha_2 \geq >...
\geq \alpha_m$, of integers such that each voter contributes $\alpha_1$ points
to his/her first choice, $\alpha_2$ points to his/her second choice, and so on,
and any candidate receiving the most points is a winner.
What is it about scoring-protocol election systems that makes some have the
desirable property of being NP-complete to manipulate, while others can be
manipulated in polynomial time? We find the complete, dichotomizing answer:
Diversity of dislike. Every scoring-protocol election system having two or more
point values assigned to candidates other than the favorite--i.e., having
$||\{\alpha_i \condition 2 \leq i \leq m\}||\geq 2$--is NP-complete to
manipulate. Every other scoring-protocol election system can be manipulated in
polynomial time. In effect, we show that--other than trivial systems (where all
candidates alway tie), plurality voting, and plurality voting's transparently
disguised translations--\emph{every} scoring-protocol election system is
NP-complete to manipulate.
|
[
{
"version": "v1",
"created": "Fri, 15 Apr 2005 22:11:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0504076
|
Manoj Kumar
|
Manoj Kumar
|
An Improved Remote User Authentication Scheme Using Smart Cards
|
16 pages, no figures
| null | null | null |
cs.CR
| null |
In 2000, Hwang and Li proposed a new remote user authentication scheme using
smart cards. In the same year, Chan and Cheng pointed out that Hwang and
Li’s scheme is not secure against the masquerade attack. Further, in
2003, Shen, Lin and Hwang pointed out a different type of attack on Hwang and
Li’s scheme and presented a modified scheme to remove its security
pitfalls. This paper presents an improved scheme which is secure against
Chan-Cheng and all the extended attacks.
|
[
{
"version": "v1",
"created": "Sat, 16 Apr 2005 11:56:46 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kumar",
"Manoj",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0504077
|
Manoj Kumar
|
Manoj Kumar
|
The Modified Scheme is still vulnerable to the parallel Session Attack
|
12 pages, no figures
| null | null | null |
cs.CR
| null |
In 2002, Chien–Jan–Tseng introduced an efficient remote user
authentication scheme using smart cards. Further, in 2004, W. C. Ku and S. M.
Chen proposed an efficient remote user authentication scheme using smart cards
to solve the security problems of Chien et al.’s scheme. Recently, Hsu
and Yoon et al. pointed out the security weakness of the Ku and Chen’s
scheme Furthermore, Yoon et al. modified the password change phase of Ku and
Chen’s scheme and they also proposed a new efficient remote user
authentication scheme using smart cards. This paper analyzes that the modified
scheme of Yoon et al. still vulnerable to parallel session attack.
|
[
{
"version": "v1",
"created": "Sat, 16 Apr 2005 12:17:17 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kumar",
"Manoj",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0504078
|
Marcus Hutter
|
Marcus Hutter and Jan Poland
|
Adaptive Online Prediction by Following the Perturbed Leader
|
25 pages
|
Journal of Machine Learning Research 6 (2005) 639--660
| null |
IDSIA-10-05
|
cs.AI cs.LG
| null |
When applying aggregating strategies to Prediction with Expert Advice, the
learning rate must be adaptively tuned. The natural choice of
sqrt(complexity/current loss) renders the analysis of Weighted Majority
derivatives quite complicated. In particular, for arbitrary weights there have
been no results proven so far. The analysis of the alternative "Follow the
Perturbed Leader" (FPL) algorithm from Kalai & Vempala (2003) (based on
Hannan's algorithm) is easier. We derive loss bounds for adaptive learning rate
and both finite expert classes with uniform weights and countable expert
classes with arbitrary weights. For the former setup, our loss bounds match the
best known results so far, while for the latter our results are new.
|
[
{
"version": "v1",
"created": "Sat, 16 Apr 2005 16:48:49 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hutter",
"Marcus",
""
],
[
"Poland",
"Jan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0504079
|
Boris Ryabko
|
Boris Ryabko, Jaakko Astola
|
Prediction of Large Alphabet Processes and Its Application to Adaptive
Source Coding
|
submitted
| null | null | null |
cs.IT math.IT
| null |
The problem of predicting a sequence $x_1,x_2,...$ generated by a discrete
source with unknown statistics is considered. Each letter $x_{t+1}$ is
predicted using information on the word $x_1x_2... x_t$ only. In fact, this
problem is a classical problem which has received much attention. Its history
can be traced back to Laplace. We address the problem where each $x_i$ belongs
to some large (or even infinite) alphabet. A method is presented for which the
precision is greater than for known algorithms, where precision is estimated by
the Kullback-Leibler divergence. The results can readily be translated to
results about adaptive coding.
|
[
{
"version": "v1",
"created": "Sun, 17 Apr 2005 16:32:03 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Apr 2005 17:42:23 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Ryabko",
"Boris",
""
],
[
"Astola",
"Jaakko",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0504080
|
Rasika Perera Mr
|
Rasika Perera, Tony Pollock, Thushara Abhayapala
|
Performance of Gaussian Signalling in Non Coherent Rayleigh Fading
Channels
|
06 pages, 04 figures, Correspondence
| null | null |
CLN: 5-340
|
cs.IT math.IT
| null |
The mutual information of a discrete time memoryless Rayleigh fading channel
is considered, where neither the transmitter nor the receiver has the knowledge
of the channel state information except the fading statistics. We present the
mutual information of this channel in closed form when the input distribution
is complex Gaussian, and derive a lower bound in terms of the capacity of the
corresponding non fading channel and the capacity when the perfect channel
state information is known at the receiver.
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2005 03:26:49 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Perera",
"Rasika",
""
],
[
"Pollock",
"Tony",
""
],
[
"Abhayapala",
"Thushara",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0504081
|
Matthew Earl
|
Matthew Earl and Raffaello D'Andrea
|
A Decomposition Approach to Multi-Vehicle Cooperative Control
|
36 pages, 19 figures, for associated web page see
http://control.mae.cornell.edu/earl/decomp
|
M. G. Earl and R. D'Andrea, "A Decomposition Approach to
Multi-Vehicle Cooperative Control," Robotics and Autonomous Systems, Volume
55, Issue 4, pages 276-291, April 2007.
|
10.1016/j.robot.2006.11.002
| null |
cs.RO
| null |
We present methods that generate cooperative strategies for multi-vehicle
control problems using a decomposition approach. By introducing a set of tasks
to be completed by the team of vehicles and a task execution method for each
vehicle, we decomposed the problem into a combinatorial component and a
continuous component. The continuous component of the problem is captured by
task execution, and the combinatorial component is captured by task assignment.
In this paper, we present a solver for task assignment that generates
near-optimal assignments quickly and can be used in real-time applications. To
motivate our methods, we apply them to an adversarial game between two teams of
vehicles. One team is governed by simple rules and the other by our algorithms.
In our study of this game we found phase transitions, showing that the task
assignment problem is most difficult to solve when the capabilities of the
adversaries are comparable. Finally, we implement our algorithms in a
multi-level architecture with a variable replanning rate at each level to
provide feedback on a dynamically changing and uncertain environment.
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2005 03:53:27 GMT"
}
] | 2007-10-14T00:00:00 |
[
[
"Earl",
"Matthew",
""
],
[
"D'Andrea",
"Raffaello",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0504082
|
Benjamin Leveque
|
Benjamin L\'ev\^eque (Leibniz - IMAG), Fr\'ed\'eric Maffray (Leibniz -
IMAG), Bruce Reed, Nicolas Trotignon (Leibniz - IMAG)
|
Coloring Artemis graphs
| null | null |
10.1016/j.tcs.2009.02.012
| null |
cs.DM
| null |
We consider the class A of graphs that contain no odd hole, no antihole, and
no ``prism'' (a graph consisting of two disjoint triangles with three disjoint
paths between them). We show that the coloring algorithm found by the second
and fourth author can be implemented in time O(n^2m) for any graph in A with n
vertices and m edges, thereby improving on the complexity proposed in the
original paper.
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2005 13:45:09 GMT"
}
] | 2020-12-01T00:00:00 |
[
[
"Lévêque",
"Benjamin",
"",
"Leibniz - IMAG"
],
[
"Maffray",
"Frédéric",
"",
"Leibniz -\n IMAG"
],
[
"Reed",
"Bruce",
"",
"Leibniz - IMAG"
],
[
"Trotignon",
"Nicolas",
"",
"Leibniz - IMAG"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0504083
|
Weiming Zhang
|
Zhang Weiming and Li Shiqu
|
On the Unicity Distance of Stego Key
|
8 pages, 3 figures
| null | null | null |
cs.CR
| null |
Steganography is about how to send secret message covertly. And the purpose
of steganalysis is to not only detect the existence of the hidden message but
also extract it. So far there have been many reliable detecting methods on
various steganographic algorithms, while there are few approaches that can
extract the hidden information. In this paper, the difficulty of extracting
hidden information, which is essentially a kind of privacy, is analyzed with
information-theoretic method in the terms of unicity distance of steganographic
key (abbreviated stego key). A lower bound for the unicity distance is
obtained, which shows the relations between key rate, message rate, hiding
capacity and difficulty of extraction. Furthermore the extracting attack to
steganography is viewed as a special kind of cryptanalysis, and an effective
method on recovering the stego key of popular LSB replacing steganography in
spatial images is presented by combining the detecting technique of
steganalysis and correlation attack of cryptanalysis together. The analysis for
this method and experimental results on steganographic software ``Hide and Seek
4.1" are both accordant with the information-theoretic conclusion.
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2005 13:45:51 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Weiming",
"Zhang",
""
],
[
"Shiqu",
"Li",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0504084
|
Marko Antonio Rodriguez
|
Marko A. Rodriguez, Johan Bollen, Herbert Van de Sompel
|
The Convergence of Digital-Libraries and the Peer-Review Process
|
Journal of Information Science [in press]
|
Journal of Information Science, 32(2), pp. 149-159, 2006.
|
10.1177/0165551506062327
|
http://jis.sagepub.com/cgi/content/abstract/32/2/149
|
cs.DL cs.CY
| null |
Pre-print repositories have seen a significant increase in use over the past
fifteen years across multiple research domains. Researchers are beginning to
develop applications capable of using these repositories to assist the
scientific community above and beyond the pure dissemination of information.
The contribution set forth by this paper emphasizes a deconstructed publication
model in which the peer-review process is mediated by an OAI-PMH peer-review
service. This peer-review service uses a social-network algorithm to determine
potential reviewers for a submitted manuscript and for weighting the relative
influence of each participating reviewer's evaluations. This paper also
suggests a set of peer-review specific metadata tags that can accompany a
pre-print's existing metadata record. The combinations of these contributions
provide a unique repository-centric peer-review model that fits within the
widely deployed OAI-PMH framework.
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2005 14:28:12 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Apr 2005 11:11:50 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Sep 2005 16:00:19 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Rodriguez",
"Marko A.",
""
],
[
"Bollen",
"Johan",
""
],
[
"Van de Sompel",
"Herbert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/0504085
|
Vignesh Sethuraman
|
Vignesh Sethuraman and Bruce Hajek
|
Capacity per Unit Energy of Fading Channels with a Peak Constraint
|
Journal version of paper presented in ISIT 2003 - now accepted for
publication in IEEE Transactions on Information Theory
| null |
10.1109/TIT.2005.853329
| null |
cs.IT math.IT
| null |
A discrete-time single-user scalar channel with temporally correlated
Rayleigh fading is analyzed. There is no side information at the transmitter or
the receiver. A simple expression is given for the capacity per unit energy, in
the presence of a peak constraint. The simple formula of Verdu for capacity per
unit cost is adapted to a channel with memory, and is used in the proof. In
addition to bounding the capacity of a channel with correlated fading, the
result gives some insight into the relationship between the correlation in the
fading process and the channel capacity. The results are extended to a channel
with side information, showing that the capacity per unit energy is one nat per
Joule, independently of the peak power constraint.
A continuous-time version of the model is also considered. The capacity per
unit energy subject to a peak constraint (but no bandwidth constraint) is given
by an expression similar to that for discrete time, and is evaluated for
Gauss-Markov and Clarke fading channels.
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2005 16:29:14 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Jun 2005 01:36:55 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Sethuraman",
"Vignesh",
""
],
[
"Hajek",
"Bruce",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0504086
|
Kristiaan Pelckmans
|
Kristiaan Pelckmans, Ivan Goethals, Jos De Brabanter, Johan A.K.
Suykens, Bart De Moor
|
Componentwise Least Squares Support Vector Machines
|
22 pages. Accepted for publication in Support Vector Machines: Theory
and Applications, ed. L. Wang, 2005
| null | null | null |
cs.LG cs.AI
| null |
This chapter describes componentwise Least Squares Support Vector Machines
(LS-SVMs) for the estimation of additive models consisting of a sum of
nonlinear components. The primal-dual derivations characterizing LS-SVMs for
the estimation of the additive model result in a single set of linear equations
with size growing in the number of data-points. The derivation is elaborated
for the classification as well as the regression case. Furthermore, different
techniques are proposed to discover structure in the data by looking for sparse
components in the model based on dedicated regularization schemes on the one
hand and fusion of the componentwise LS-SVMs training with a validation
criterion on the other hand. (keywords: LS-SVMs, additive models,
regularization, structure detection)
|
[
{
"version": "v1",
"created": "Tue, 19 Apr 2005 15:01:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pelckmans",
"Kristiaan",
""
],
[
"Goethals",
"Ivan",
""
],
[
"De Brabanter",
"Jos",
""
],
[
"Suykens",
"Johan A. K.",
""
],
[
"De Moor",
"Bart",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0504087
|
Rahul Jain
|
Rahul Jain
|
Improved direct sum theorem in classical communication complexity
|
Withdrawn due to critical error
| null | null | null |
cs.OH
| null |
Withdrawn due to critical error.
|
[
{
"version": "v1",
"created": "Tue, 19 Apr 2005 21:53:09 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Apr 2005 17:11:36 GMT"
},
{
"version": "v3",
"created": "Thu, 21 Apr 2005 21:00:46 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Jain",
"Rahul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0504088
|
Paul Vitanyi
|
Paul Vitanyi (CWI, University of Amsterdam, and National ICT
Australia)
|
Time, Space, and Energy in Reversible Computing
|
LaTeX, 10 pages, Proc. 2005 ACM International Conference on Computing
Frontiers, Ischia, Italy, 4-6 May 2005 (1st Intn'l Workshop on Reversible
Computing)
| null | null | null |
cs.CC
| null |
We survey results of a quarter century of work on computation by reversible
general-purpose computers (in this setting Turing machines), and general
reversible simulation of irreversible computations, with respect to energy-,
time- and space requirements.
|
[
{
"version": "v1",
"created": "Wed, 20 Apr 2005 17:13:33 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Vitanyi",
"Paul",
"",
"CWI, University of Amsterdam, and National ICT\n Australia"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0504089
|
Paul Vitanyi
|
Paul Vitanyi (CWI, University of Amsterdam, and National ICT
Australia)
|
Universal Similarity
|
LaTeX, 5 pages, Proc. ITW2005 - IEEE ITSOC Information Theory
Workshop 2005 on Coding and Complexity, 29th Aug. - 1st Sept., 2005, Rotorua,
New Zealand. (invited). The second version has minor changes, and corrections
getting rid of typos: in (2) we "max" in the denominator is replaced by the
correct "min", some refs to (1) in the text should have been to (2)
| null | null | null |
cs.IR cs.AI cs.CL physics.data-an
| null |
We survey a new area of parameter-free similarity distance measures useful in
data-mining, pattern recognition, learning and automatic semantics extraction.
Given a family of distances on a set of objects, a distance is universal up to
a certain precision for that family if it minorizes every distance in the
family between every two objects in the set, up to the stated precision (we do
not require the universal distance to be an element of the family). We consider
similarity distances for two types of objects: literal objects that as such
contain all of their meaning, like genomes or books, and names for objects. The
latter may have literal embodyments like the first type, but may also be
abstract like ``red'' or ``christianity.'' For the first type we consider a
family of computable distance measures corresponding to parameters expressing
similarity according to particular features between pairs of literal objects.
For the second type we consider similarity distances generated by web users
corresponding to particular semantic relations between the (names for) the
designated objects. For both families we give universal similarity distance
measures, incorporating all particular distance measures in the family. In the
first case the universal distance is based on compression and in the second
case it is based on Google page counts related to search terms. In both cases
experiments on a massive scale give evidence of the viability of the
approaches.
|
[
{
"version": "v1",
"created": "Wed, 20 Apr 2005 17:40:55 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Jul 2005 17:16:35 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Vitanyi",
"Paul",
"",
"CWI, University of Amsterdam, and National ICT\n Australia"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
cs/0504090
|
Dmitry Kozlov N
|
Dmitry N. Kozlov
|
Discrete Morse Theory for free chain complexes
| null |
Comptes Rendus Mathematique, Acad. Sci. Paris, Ser. I 340 (2005),
pp. 867-872
| null | null |
cs.DM math.RA
| null |
We extend the combinatorial Morse complex construction to the arbitrary free
chain complexes, and give a short, self-contained, and elementary proof of the
quasi-isomorphism between the original chain complex and its Morse complex.
Even stronger, the main result states that, if $C_*$ is a free chain complex,
and $\cm$ an acyclic matching, then $C_*=C_*^\cm\oplus T_*$, where $C_*^\cm$ is
the Morse complex generated by the critical elements, and $T_*$ is an acyclic
complex.
|
[
{
"version": "v1",
"created": "Thu, 21 Apr 2005 14:20:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kozlov",
"Dmitry N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
cs/0504091
|
Joe DeStefano
|
Joseph DeStefano and Erik Learned-Miller
|
A Probabilistic Upper Bound on Differential Entropy
| null | null | null | null |
cs.IT math.IT
| null |
A novel, non-trivial, probabilistic upper bound on the entropy of an unknown
one-dimensional distribution, given the support of the distribution and a
sample from that distribution, is presented. No knowledge beyond the support of
the unknown distribution is required, nor is the distribution required to have
a density. Previous distribution-free bounds on the cumulative distribution
function of a random variable given a sample of that variable are used to
construct the bound. A simple, fast, and intuitive algorithm for computing the
entropy bound from a sample is provided.
|
[
{
"version": "v1",
"created": "Thu, 21 Apr 2005 18:25:09 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"DeStefano",
"Joseph",
""
],
[
"Learned-Miller",
"Erik",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0504092
|
Victor Korotkikh
|
Victor Korotkikh, Galina Korotkikh and Darryl Bond
|
On Optimality Condition of Complex Systems: Computational Evidence
|
5 pages, 4 figures
| null | null | null |
cs.CC cond-mat.dis-nn nlin.AO
| null |
A general condition determining the optimal performance of a complex system
has not yet been found and the possibility of its existence is unknown. To
contribute in this direction, an optimization algorithm as a complex system is
presented. The performance of the algorithm for any problem is controlled as a
convex function with a single optimum. To characterize the performance
optimums, certain quantities of the algorithm and the problem are suggested and
interpreted as their complexities. An optimality condition of the algorithm is
computationally found: if the algorithm shows its best performance for a
problem, then the complexity of the algorithm is in a linear relationship with
the complexity of the problem. The optimality condition provides a new
perspective to the subject by recognizing that the relationship between certain
quantities of the complex system and the problem may determine the optimal
performance.
|
[
{
"version": "v1",
"created": "Sat, 23 Apr 2005 06:52:50 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Korotkikh",
"Victor",
""
],
[
"Korotkikh",
"Galina",
""
],
[
"Bond",
"Darryl",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
cs/0504093
|
Amit K Awasthi
|
Amit K Awasthi and Sunder Lal
|
A Multi-proxy Signature Scheme for Partial delegation with Warrant
|
Old Version 6 Pages
| null | null | null |
cs.CR
| null |
In some cases, the original signer may delegate its signing power to a
specified proxy group while ensuring individual accountability of each
participantsigner. The proxy signature scheme that achieves such purpose is
called the multi-proxy signature scheme and the signature generated by the
specified proxy group is called multi-proxy signature for the original signer.
Recently such scheme has been discussed by Lin et al. Lins scheme is based on
partial delegation by Mambo et al. In present chapter we introduce a new
multi-proxy signature scheme, which requires less computational overhead in
comparison to Lin et al, and also fulfill the requirement of partial delegation
with warrant simultaneously.
|
[
{
"version": "v1",
"created": "Sat, 23 Apr 2005 22:09:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Awasthi",
"Amit K",
""
],
[
"Lal",
"Sunder",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0504094
|
Amit K Awasthi
|
Amit K Awasthi
|
A New Remote User Authentication Scheme Using Smart Cards with Check
Digits
|
3 Pages. Not Published
| null | null | null |
cs.CR
| null |
Since 1981, when Lamport introduced the remote user authentication scheme
using table, a plenty of schemes had been proposed with table and without table
using. In 1993, Chang and Wu [5] introduced Remote password authentication
scheme with smart cards. A number of remote authentication schemes with smart
cards have been proposed since then. These schemes allow a valid user to login
a remote server and access the services provided by the remote server. But
still there is no scheme to authenticate the remote proxy user. In this paper
we propose firstly, a protocol to authenticate a proxy user remotely using
smartcards.
|
[
{
"version": "v1",
"created": "Sat, 23 Apr 2005 22:47:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Awasthi",
"Amit K",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0504095
|
Amit K Awasthi
|
Amit K Awasthi and Sunder Lal
|
An Efficient Scheme for Sensitive Message Transmission using Blind
Signcryption
|
5 Pages. Intenational conference on sommunication. India 22 Dec 2004,
Sastra Deemed Univ. Kumabakonam
| null | null | null |
cs.CR
| null |
Blind signature schemes enable a useful protocol that guarantee the anonymity
of the participants while Signcryption offers authentication of message and
confidentiality of messages at the same time and more efficiently. In this
paper, we present a blind signcryption scheme that combines the functionality
of blind signature and signcryption. This blind Signcryption is useful for
applications that are based on anonymity untracebility and unlinkability.
|
[
{
"version": "v1",
"created": "Sat, 23 Apr 2005 23:05:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Awasthi",
"Amit K",
""
],
[
"Lal",
"Sunder",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0504096
|
Lane A. Hemaspaandra
|
Lane A. Hemaspaandra and Leen Torenvliet
|
P-Selectivity, Immunity, and the Power of One Bit
| null | null | null |
URCS-TR-2005-864
|
cs.CC
| null |
We prove that P-sel, the class of all P-selective sets, is EXP-immune, but is
not EXP/1-immune. That is, we prove that some infinite P-selective set has no
infinite EXP-time subset, but we also prove that every infinite P-selective set
has some infinite subset in EXP/1. Informally put, the immunity of P-sel is so
fragile that it is pierced by a single bit of information.
The above claims follow from broader results that we obtain about the
immunity of the P-selective sets. In particular, we prove that for every
recursive function f, P-sel is DTIME(f)-immune. Yet we also prove that P-sel is
not \Pi_2^p/1-immune.
|
[
{
"version": "v1",
"created": "Mon, 25 Apr 2005 15:18:17 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Dec 2005 18:28:08 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Torenvliet",
"Leen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0504097
|
Amit K Awasthi
|
Amit K Awasthi and Sunder Lal
|
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear
Pairings
|
Published with ePrint Archive
| null |
10.13140/2.1.2549.1529
| null |
cs.CR
| null |
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A
ring signature is a simplified group signature without any manager. It protects
the anonymity of a signer. The first scheme proposed by Rivest et al. was based
on RSA cryptosystem and certificate based public key setting. The first ring
signature scheme based on DLP was proposed by Abe, Ohkubo, and Suzuki. Their
scheme is also based on the general certificate-based public key setting too.
In 2002, Zhang and Kim proposed a new ID-based ring signature scheme using
pairings. Later Lin and Wu proposed a more efficient ID-based ring signature
scheme. Both these schemes have some inconsistency in computational aspect.
In this paper we propose a new ID-based ring signature scheme and a proxy
ring signature scheme. Both the schemes are more efficient than existing one.
These schemes also take care of the inconsistencies in above two schemes.
|
[
{
"version": "v1",
"created": "Sat, 23 Apr 2005 23:24:31 GMT"
}
] | 2014-12-24T00:00:00 |
[
[
"Awasthi",
"Amit K",
""
],
[
"Lal",
"Sunder",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0504099
|
Vivek Mhatre
|
Vivek P. Mhatre, Catherine P. Rosenberg
|
The Capacity of Random Ad hoc Networks under a Realistic Link Layer
Model
|
12 pages, 6 figures, submitted to IEEE Transactions on Information
Theory, April 21st 2005
| null | null | null |
cs.IT cs.NI math.IT
| null |
The problem of determining asymptotic bounds on the capacity of a random ad
hoc network is considered. Previous approaches assumed a threshold-based link
layer model in which a packet transmission is successful if the SINR at the
receiver is greater than a fixed threshold. In reality, the mapping from SINR
to packet success probability is continuous. Hence, over each hop, for every
finite SINR, there is a non-zero probability of packet loss. With this more
realistic link model, it is shown that for a broad class of routing and
scheduling schemes, a fixed fraction of hops on each route have a fixed
non-zero packet loss probability. In a large network, a packet travels an
asymptotically large number of hops from source to destination. Consequently,
it is shown that the cumulative effect of per-hop packet loss results in a
per-node throughput of only O(1/n) (instead of Theta(1/sqrt{n log{n}})) as
shown previously for the threshold-based link model).
A scheduling scheme is then proposed to counter this effect. The proposed
scheme improves the link SINR by using conservative spatial reuse, and improves
the per-node throughput to O(1/(K_n sqrt{n log{n}})), where each cell gets a
transmission opportunity at least once every K_n slots, and K_n tends to
infinity as n tends to infinity.
|
[
{
"version": "v1",
"created": "Mon, 25 Apr 2005 01:44:12 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Mhatre",
"Vivek P.",
""
],
[
"Rosenberg",
"Catherine P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0504100
|
Sheng Bao
|
Sheng Bao, Shi Chen, Zhiqiang Jing, Ran Ren
|
A DNA Sequence Compression Algorithm Based on LUT and LZ77
|
13 pages,3 tables,with source code of our algorithm
| null | null | null |
cs.IT math.IT
| null |
This article introduces a new DNA sequence compression algorithm which is
based on LUT and LZ77 algorithm. Combined a LUT-based pre-coding routine and
LZ77 compression routine,this algorithm can approach a compression ratio of
1.9bits \slash base and even lower.The biggest advantage of this algorithm is
fast execution, small memory occupation and easy implementation.
|
[
{
"version": "v1",
"created": "Mon, 25 Apr 2005 14:57:19 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Apr 2005 08:36:45 GMT"
},
{
"version": "v3",
"created": "Sat, 7 May 2005 08:50:24 GMT"
},
{
"version": "v4",
"created": "Wed, 18 May 2005 01:29:00 GMT"
},
{
"version": "v5",
"created": "Mon, 30 May 2005 13:35:09 GMT"
},
{
"version": "v6",
"created": "Tue, 7 Jun 2005 12:38:06 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Bao",
"Sheng",
""
],
[
"Chen",
"Shi",
""
],
[
"Jing",
"Zhiqiang",
""
],
[
"Ren",
"Ran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0504101
|
Marko Znidaric
|
Marko Znidaric
|
Single-solution Random 3-SAT Instances
|
18 pages, 9 figures; considerable revision
| null | null | null |
cs.AI cs.CC cs.DM
| null |
We study a class of random 3-SAT instances having exactly one solution. The
properties of this ensemble considerably differ from those of a random 3-SAT
ensemble. It is numerically shown that the running time of several complete and
stochastic local search algorithms monotonically increases as the clause
density is decreased. Therefore, there is no easy-hard-easy pattern of hardness
as for standard random 3-SAT ensemble. Furthermore, the running time for short
single-solution formulas increases with the problem size much faster than for
random 3-SAT formulas from the phase transition region.
|
[
{
"version": "v1",
"created": "Mon, 25 Apr 2005 10:40:32 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Aug 2005 15:15:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Znidaric",
"Marko",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0504102
|
Lars Eirik Danielsen
|
Lars Eirik Danielsen (1), Matthew G. Parker (1) ((1) University of
Bergen)
|
Spectral Orbits and Peak-to-Average Power Ratio of Boolean Functions
with respect to the {I,H,N}^n Transform
|
Presented at Sequences and Their Applications, SETA'04, Seoul, South
Korea, October 2004. 17 pages, 10 figures
|
In Sequences and Their Applications -- SETA 2004, edited by T.
Helleseth, D. Sarwate, H.-Y. Song, and K. Yang, Lecture Notes in Comput.
Sci., volume 3486, pp. 373--388, Springer-Verlag, Berlin, May 2005.
|
10.1007/11423461_28
| null |
cs.IT math.IT
| null |
We enumerate the inequivalent self-dual additive codes over GF(4) of
blocklength n, thereby extending the sequence A090899 in The On-Line
Encyclopedia of Integer Sequences from n = 9 to n = 12. These codes have a
well-known interpretation as quantum codes. They can also be represented by
graphs, where a simple graph operation generates the orbits of equivalent
codes. We highlight the regularity and structure of some graphs that correspond
to codes with high distance. The codes can also be interpreted as quadratic
Boolean functions, where inequivalence takes on a spectral meaning. In this
context we define PAR_IHN, peak-to-average power ratio with respect to the
{I,H,N}^n transform set. We prove that PAR_IHN of a Boolean function is
equivalent to the the size of the maximum independent set over the associated
orbit of graphs. Finally we propose a construction technique to generate
Boolean functions with low PAR_IHN and algebraic degree higher than 2.
|
[
{
"version": "v1",
"created": "Mon, 25 Apr 2005 11:32:25 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Danielsen",
"Lars Eirik",
""
],
[
"Parker",
"Matthew G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0504103
|
Neal E. Young
|
Marek Chrobak and Claire Kenyon and John Noga and Neal E. Young
|
Incremental Medians via Online Bidding
|
conference version appeared in LATIN 2006 as "Oblivious Medians via
Online Bidding"
|
Algorithmica 50(4):455-478(2008)
|
10.1007/s00453-007-9005-x
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the k-median problem we are given sets of facilities and customers, and
distances between them. For a given set F of facilities, the cost of serving a
customer u is the minimum distance between u and a facility in F. The goal is
to find a set F of k facilities that minimizes the sum, over all customers, of
their service costs.
Following Mettu and Plaxton, we study the incremental medians problem, where
k is not known in advance, and the algorithm produces a nested sequence of
facility sets where the kth set has size k. The algorithm is c-cost-competitive
if the cost of each set is at most c times the cost of the optimum set of size
k. We give improved incremental algorithms for the metric version: an
8-cost-competitive deterministic algorithm, a 2e ~ 5.44-cost-competitive
randomized algorithm, a (24+epsilon)-cost-competitive, poly-time deterministic
algorithm, and a (6e+epsilon ~ .31)-cost-competitive, poly-time randomized
algorithm.
The algorithm is s-size-competitive if the cost of the kth set is at most the
minimum cost of any set of size k, and has size at most s k. The optimal
size-competitive ratios for this problem are 4 (deterministic) and e
(randomized). We present the first poly-time O(log m)-size-approximation
algorithm for the offline problem and first poly-time O(log m)-size-competitive
algorithm for the incremental problem.
Our proofs reduce incremental medians to the following online bidding
problem: faced with an unknown threshold T, an algorithm submits "bids" until
it submits a bid that is at least the threshold. It pays the sum of all its
bids. We prove that folklore algorithms for online bidding are optimally
competitive.
|
[
{
"version": "v1",
"created": "Wed, 27 Apr 2005 00:07:32 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Jan 2006 22:53:09 GMT"
},
{
"version": "v3",
"created": "Thu, 28 May 2020 12:58:50 GMT"
}
] | 2020-05-29T00:00:00 |
[
[
"Chrobak",
"Marek",
""
],
[
"Kenyon",
"Claire",
""
],
[
"Noga",
"John",
""
],
[
"Young",
"Neal E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0504104
|
Neal E. Young
|
Marek Chrobak and Claire Kenyon and Neal E. Young
|
The reverse greedy algorithm for the metric k-median problem
|
to appear in IPL. preliminary version in COCOON '05
|
Information Processing Letters 97:68-72(2006)
|
10.1016/j.ipl.2005.09.009
| null |
cs.DS
| null |
The Reverse Greedy algorithm (RGreedy) for the k-median problem works as
follows. It starts by placing facilities on all nodes. At each step, it removes
a facility to minimize the resulting total distance from the customers to the
remaining facilities. It stops when k facilities remain. We prove that, if the
distance function is metric, then the approximation ratio of RGreedy is between
?(log n/ log log n) and O(log n).
|
[
{
"version": "v1",
"created": "Wed, 27 Apr 2005 19:36:08 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Sep 2005 17:43:50 GMT"
}
] | 2015-06-02T00:00:00 |
[
[
"Chrobak",
"Marek",
""
],
[
"Kenyon",
"Claire",
""
],
[
"Young",
"Neal E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0504105
|
G Gordon Worley III
|
G Gordon Worley III
|
Wikis in Tuple Spaces
|
To appear at WMSCI 2005
| null | null | null |
cs.DC cs.MM
| null |
We consider storing the pages of a wiki in a tuple space and the effects this
might have on the wiki experience. In particular, wiki pages are stored in
tuples with a few identifying values such as title, author, revision date,
content, etc. and pages are retrieved by sending the tuple space templates,
such as one that gives the title but nothing else, leaving the tuple space to
resolve to a single tuple. We use a tuple space wiki to avoid deadlocks,
infinite loops, and wasted efforts when page edit contention arises and examine
how a tuple space wiki changes the wiki experience.
|
[
{
"version": "v1",
"created": "Wed, 27 Apr 2005 23:04:35 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Worley",
"G Gordon",
"III"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0504106
|
Thomas C. Schmidt
|
Hans L. Cycon, Thomas C. Schmidt, Matthias Waehlisch, Mark Palkow and
Henrik Regensburg
|
A Distributed Multimedia Communication System and its Applications to
E-Learning
|
Including 6 figures
|
IEEE International Symposium on Consumer Electronics, Sept. 1-3,
2004, Page(s):425 - 429
| null | null |
cs.MM cs.NI
| null |
In this paper we report on a multimedia communication system including a
VCoIP (Video Conferencing over IP) software with a distributed architecture and
its applications for teaching scenarios. It is a simple, ready-to-use scheme
for distributed presenting, recording and streaming multimedia content. We also
introduce and investigate concepts and experiments to IPv6 user and session
mobility, with the special focus on real-time video group communication.
|
[
{
"version": "v1",
"created": "Thu, 28 Apr 2005 13:40:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Cycon",
"Hans L.",
""
],
[
"Schmidt",
"Thomas C.",
""
],
[
"Waehlisch",
"Matthias",
""
],
[
"Palkow",
"Mark",
""
],
[
"Regensburg",
"Henrik",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0504107
|
Jose Ignacio Alvarez-Hamelin
|
Jos\'e Ignacio Alvarez-Hamelin (LPTO), Luca Dall'Asta (LPTO), Alain
Barrat (LPTO), Alessandro Vespignani (LPTO)
|
k-core decomposition: a tool for the visualization of large scale
networks
| null |
Advances in Neural Information Processing Systems 18, Canada
(2006) 41
| null | null |
cs.NI cs.GR
| null |
We use the k-core decomposition to visualize large scale complex networks in
two dimensions. This decomposition, based on a recursive pruning of the least
connected vertices, allows to disentangle the hierarchical structure of
networks by progressively focusing on their central cores. By using this
strategy we develop a general visualization algorithm that can be used to
compare the structural properties of various networks and highlight their
hierarchical structure. The low computational complexity of the algorithm,
O(n+e), where 'n' is the size of the network, and 'e' is the number of edges,
makes it suitable for the visualization of very large sparse networks. We apply
the proposed visualization tool to several real and synthetic graphs, showing
its utility in finding specific structural fingerprints of computer generated
and real world networks.
|
[
{
"version": "v1",
"created": "Thu, 28 Apr 2005 13:53:36 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Oct 2005 13:47:59 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Alvarez-Hamelin",
"José Ignacio",
"",
"LPTO"
],
[
"Dall'Asta",
"Luca",
"",
"LPTO"
],
[
"Barrat",
"Alain",
"",
"LPTO"
],
[
"Vespignani",
"Alessandro",
"",
"LPTO"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0504108
|
Derek Messie
|
Derek Messie (Syracuse University) and Jae C. Oh (Syracuse University)
|
Cooperative Game Theory within Multi-Agent Systems for Systems
Scheduling
|
Fourth International Conference on Hybrid Intelligent Systems (HIS),
Kitakyushu, Japan, December, 2004
| null | null | null |
cs.AI cs.MA
| null |
Research concerning organization and coordination within multi-agent systems
continues to draw from a variety of architectures and methodologies. The work
presented in this paper combines techniques from game theory and multi-agent
systems to produce self-organizing, polymorphic, lightweight, embedded agents
for systems scheduling within a large-scale real-time systems environment.
Results show how this approach is used to experimentally produce optimum
real-time scheduling through the emergent behavior of thousands of agents.
These results are obtained using a SWARM simulation of systems scheduling
within a High Energy Physics experiment consisting of 2500 digital signal
processors.
|
[
{
"version": "v1",
"created": "Fri, 29 Apr 2005 13:43:30 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Messie",
"Derek",
"",
"Syracuse University"
],
[
"Oh",
"Jae C.",
"",
"Syracuse University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0504109
|
Derek Messie
|
Derek Messie (1), Mina Jung (1), Jae C. Oh (1), Shweta Shetty (2),
Steven Nordstrom (2), Michael Haney (3) ((1) Syracuse University, (2)
Vanderbilt University, (3) University of Illinois at Urbana-Champaign)
|
Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time
Systems
|
2nd Workshop on Engineering of Autonomic Systems (EASe), in the 12th
Annual IEEE International Conference and Workshop on the Engineering of
Computer Based Systems (ECBS), Washington, DC, April, 2005
| null | null | null |
cs.SE
| null |
This paper describes a comprehensive prototype of large-scale fault adaptive
embedded software developed for the proposed Fermilab BTeV high energy physics
experiment. Lightweight self-optimizing agents embedded within Level 1 of the
prototype are responsible for proactive and reactive monitoring and mitigation
based on specified layers of competence. The agents are self-protecting,
detecting cascading failures using a distributed approach. Adaptive,
reconfigurable, and mobile objects for reliablility are designed to be
self-configuring to adapt automatically to dynamically changing environments.
These objects provide a self-healing layer with the ability to discover,
diagnose, and react to discontinuities in real-time processing. A generic
modeling environment was developed to facilitate design and implementation of
hardware resource specifications, application data flow, and failure mitigation
strategies. Level 1 of the planned BTeV trigger system alone will consist of
2500 DSPs, so the number of components and intractable fault scenarios involved
make it impossible to design an `expert system' that applies traditional
centralized mitigative strategies based on rules capturing every possible
system state. Instead, a distributed reactive approach is implemented using the
tools and methodologies developed by the Real-Time Embedded Systems group.
|
[
{
"version": "v1",
"created": "Fri, 29 Apr 2005 14:59:23 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Messie",
"Derek",
""
],
[
"Jung",
"Mina",
""
],
[
"Oh",
"Jae C.",
""
],
[
"Shetty",
"Shweta",
""
],
[
"Nordstrom",
"Steven",
""
],
[
"Haney",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0504110
|
Lawrence Ioannou
|
Lawrence M. Ioannou
|
Computing finite-dimensional bipartite quantum separability
|
Replaced orginal archive submission with PhD thesis, which subsumes
and mildly corrects it
| null | null | null |
cs.DS quant-ph
| null |
Ever since entanglement was identified as a computational and cryptographic
resource, effort has been made to find an efficient way to tell whether a given
density matrix represents an unentangled, or separable, state. Essentially,
this is the quantum separability problem.
Chapters 1 to 3 motivate a new interior-point algorithm which, given the
expected values of a subset of an orthogonal basis of observables of an
otherwise unknown quantum state, searches for an entanglement witness in the
span of the subset of observables. When all the expected values are known, the
algorithm solves the separability problem. In Chapter 4, I give the motivation
for the algorithm and show how it can be used in a particular physical scenario
to detect entanglement (or decide separability) of an unknown quantum state
using as few quantum resources as possible. I then explain the intuitive idea
behind the algorithm and relate it to the standard algorithms of its kind. I
end the chapter with a comparison of the complexities of the algorithms
surveyed in Chapter 3. Finally, in Chapter 5, I present the details of the
algorithm and discuss its performance relative to standard methods.
|
[
{
"version": "v1",
"created": "Fri, 29 Apr 2005 16:42:54 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Apr 2005 12:11:17 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Feb 2006 15:47:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ioannou",
"Lawrence M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0504111
|
Karim Seada
|
Karim Seada, Ahmed Helmy
|
Efficient and Robust Geocasting Protocols for Sensor Networks
| null | null | null | null |
cs.NI
| null |
Geocasting is the delivery of packets to nodes within a certain geographic
area. For many applications in wireless ad hoc and sensor networks, geocasting
is an important and frequent communication service. The challenging problem in
geocasting is distributing the packets to all the nodes within the geocast
region with high probability but with low overhead. According to our study we
notice a clear tradeoff between the proportion of nodes in the geocast region
that receive the packet and the overhead incurred by the geocast packet
especially at low densities and irregular distributions. We present two novel
protocols for geocasting that achieve high delivery rate and low overhead by
utilizing the local location information of nodes to combine geographic routing
mechanisms with region flooding. We show that the first protocol
Geographic-Forwarding-Geocast (GFG) has close-to-minimum overhead in dense
networks and that the second protocol Geographic-Forwarding-Perimeter-Geocast
(GFPG) provides guaranteed delivery without global flooding or global network
information even at low densities and with the existence of region gaps or
obstacles. An adaptive version of the second protocol (GFPG*) has the desirable
property of perfect delivery at all densities and close-to-minimum overhead at
high densities. We evaluate our mechanisms and compare them using simulation to
other proposed geocasting mechanisms. The results show the significant
improvement in delivery rate (up to 63% higher delivery percentage in low
density networks) and reduction in overhead (up to 80% reduction) achieved by
our mechanisms. We hope for our protocols to become building block mechanisms
for dependable sensor network architectures that require robust efficient
geocast services.
|
[
{
"version": "v1",
"created": "Fri, 29 Apr 2005 18:37:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Seada",
"Karim",
""
],
[
"Helmy",
"Ahmed",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0505001
|
Roberto da Silva
|
Roberto da Silva, Alexandre Tavares Baraviera, Silvio R. Dahmen
|
Modelling investment in artificial stock markets: Analytical and
Numerical Results
|
19 pages 10 figures
| null | null | null |
cs.CE
| null |
In this article we study the behavior of a group of economic agents in the
context of cooperative game theory, interacting according to rules based on the
Potts Model with suitable modifications. Each agent can be thought of as
belonging to a chain, where agents can only interact with their nearest
neighbors (periodic boundary conditions are imposed). Each agent can invest an
amount σ_{i}=0,...,q-1. Using the transfer matrix method we study
analytically, among other things, the behavior of the investment as a function
of a control parameter (denoted β) for the cases q=2 and 3. For q>3
numerical evaluation of eigenvalues and high precision numerical derivatives
are used in order to assess this information.
|
[
{
"version": "v1",
"created": "Fri, 29 Apr 2005 20:38:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"da Silva",
"Roberto",
""
],
[
"Baraviera",
"Alexandre Tavares",
""
],
[
"Dahmen",
"Silvio R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0505002
|
Christoph Koch
|
Martin Grohe, Christoph Koch, Nicole Schweikardt
|
Tight Lower Bounds for Query Processing on Streaming and External Memory
Data
|
25 pages, 4 figures, to appear in Proc. ICALP 2005; extended version
with appendix
| null | null | null |
cs.DB cs.CC
| null |
We study a clean machine model for external memory and stream processing. We
show that the number of scans of the external data induces a strict hierarchy
(as long as work space is sufficiently small, e.g., polylogarithmic in the size
of the input). We also show that neither joins nor sorting are feasible if the
product of the number $r(n)$ of scans of the external memory and the size
$s(n)$ of the internal memory buffers is sufficiently small, e.g., of size
$o(\sqrt[5]{n})$. We also establish tight bounds for the complexity of XPath
evaluation and filtering.
|
[
{
"version": "v1",
"created": "Fri, 29 Apr 2005 22:28:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Grohe",
"Martin",
""
],
[
"Koch",
"Christoph",
""
],
[
"Schweikardt",
"Nicole",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0505003
|
Xiaofei Huang
|
Xiaofei Huang
|
A New Kind of Hopfield Networks for Finding Global Optimum
|
6 pages, accepted by International Joint Conference on Neural
Networks 2005
| null | null | null |
cs.NE
| null |
The Hopfield network has been applied to solve optimization problems over
decades. However, it still has many limitations in accomplishing this task.
Most of them are inherited from the optimization algorithms it implements. The
computation of a Hopfield network, defined by a set of difference equations,
can easily be trapped into one local optimum or another, sensitive to initial
conditions, perturbations, and neuron update orders. It doesn't know how long
it will take to converge, as well as if the final solution is a global optimum,
or not. In this paper, we present a Hopfield network with a new set of
difference equations to fix those problems. The difference equations directly
implement a new powerful optimization algorithm.
|
[
{
"version": "v1",
"created": "Sat, 30 Apr 2005 16:13:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Huang",
"Xiaofei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0505004
|
David Lorenz
|
Sergei Kojarski and David H. Lorenz
|
Pluggable AOP: Designing Aspect Mechanisms for Third-party Composition
| null |
(new version) In Proceedings of the 20th Annual ACM SIGPLAN
Conference on Object Oriented Programming Systems Languages and Applications
(San Diego, CA, USA, October 16 - 20, 2005). OOPSLA '05. ACM Press, New York,
NY, 247-263.
|
10.1145/1094811.1094831
| null |
cs.SE cs.PL
| null |
Studies of Aspect-Oriented Programming (AOP) usually focus on a language in
which a specific aspect extension is integrated with a base language. Languages
specified in this manner have a fixed, non-extensible AOP functionality. In
this paper we consider the more general case of integrating a base language
with a set of domain specific third-party aspect extensions for that language.
We present a general mixin-based method for implementing aspect extensions in
such a way that multiple, independently developed, dynamic aspect extensions
can be subject to third-party composition and work collaboratively.
|
[
{
"version": "v1",
"created": "Sat, 30 Apr 2005 20:49:15 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Kojarski",
"Sergei",
""
],
[
"Lorenz",
"David H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0505005
|
Sandor P. Fekete
|
Jan van der Veen and Sandor P. Fekete and Ali Ahmadinia and Christophe
Bobda and Frank Hannig and Juergen Teich
|
Defragmenting the Module Layout of a Partially Reconfigurable Device
|
10 pages, 11 figures, 1 table, Latex, to appear in "Engineering of
Reconfigurable Systems and Algorithms" as a "Distinguished Paper"
| null | null | null |
cs.AR cs.DS
| null |
Modern generations of field-programmable gate arrays (FPGAs) allow for
partial reconfiguration. In an online context, where the sequence of modules to
be loaded on the FPGA is unknown beforehand, repeated insertion and deletion of
modules leads to progressive fragmentation of the available space, making
defragmentation an important issue. We address this problem by propose an
online and an offline component for the defragmentation of the available space.
We consider defragmenting the module layout on a reconfigurable device. This
corresponds to solving a two-dimensional strip packing problem. Problems of
this type are NP-hard in the strong sense, and previous algorithmic results are
rather limited. Based on a graph-theoretic characterization of feasible
packings, we develop a method that can solve two-dimensional defragmentation
instances of practical size to optimality. Our approach is validated for a set
of benchmark instances.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2005 01:10:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"van der Veen",
"Jan",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Ahmadinia",
"Ali",
""
],
[
"Bobda",
"Christophe",
""
],
[
"Hannig",
"Frank",
""
],
[
"Teich",
"Juergen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0505006
|
Emanuel Diamant
|
Emanuel Diamant
|
Searching for image information content, its discovery, extraction, and
representation
| null |
Journal of Electronic Imaging, vol. 14, issue 1, article 013016,
Jan-Mar 2005
|
10.1117/1.1867476
| null |
cs.CV
| null |
Image information content is known to be a complicated and controvercial
problem. This paper posits a new image information content definition.
Following the theory of Solomonoff-Kolmogorov-Chaitin's complexity, we define
image information content as a set of descriptions of imafe data structures.
Three levels of such description can be generally distinguished: 1)the global
level, where the coarse structure of the entire scene is initially outlined; 2)
the intermediate level, where structures of separate, non-overlapping image
regions usually associated with individual scene objects are deliniated; and 3)
the low-level description, where local image structures observed in a limited
and restricted field of view are resolved. A technique for creating such image
information content descriptors is developed. Its algorithm is presented and
elucidated with some examples, which demonstrate the effectiveness of the
proposed approach.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2005 03:17:02 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Diamant",
"Emanuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0505007
|
Dragos Trinca
|
Dragos Trinca
|
Adaptive Codes: A New Class of Non-standard Variable-length Codes
|
10 pages
| null | null | null |
cs.DS
| null |
We introduce a new class of non-standard variable-length codes, called
adaptive codes. This class of codes associates a variable-length codeword to
the symbol being encoded depending on the previous symbols in the input data
string. An efficient algorithm for constructing adaptive codes of order one is
presented. Then, we introduce a natural generalization of adaptive codes,
called GA codes.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2005 09:40:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Trinca",
"Dragos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0505008
|
Ralf-Michael Vetter
|
A. Kuhlmann, R.-M. Vetter, Ch. Luebbing, C.-A. Thole
|
Data Mining on Crash Simulation Data
|
12 pages, 10 figures. Accepted for Lecture Notes in Computer Science
(LNCS)
|
Lecture Notes in Computer Science, Lecture Notes in Artificial
Intelligence, Proceedings Conference MLDM 2005, Leipzig/Germany, Springer
Verlag, LNAI 3587, ISBN: 3-540-26923-1, 2005
| null | null |
cs.IR cs.CE
| null |
The work presented in this paper is part of the cooperative research project
AUTO-OPT carried out by twelve partners from the automotive industries. One
major work package concerns the application of data mining methods in the area
of automotive design. Suitable methods for data preparation and data analysis
are developed. The objective of the work is the re-use of data stored in the
crash-simulation department at BMW in order to gain deeper insight into the
interrelations between the geometric variations of the car during its design
and its performance in crash testing. In this paper a method for data analysis
of finite element models and results from crash simulation is proposed and
application to recent data from the industrial partner BMW is demonstrated. All
necessary steps from data pre-processing to re-integration into the working
environment of the engineer are covered.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2005 15:27:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kuhlmann",
"A.",
""
],
[
"Vetter",
"R. -M.",
""
],
[
"Luebbing",
"Ch.",
""
],
[
"Thole",
"C. -A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0505009
|
Arindam Mitra
|
Arindam Mitra
|
Human being is a living random number generator
|
PDF, Revised
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
General wisdom is, mathematical operation is needed to generate number by
numbers. It is pointed out that without any mathematical operation true random
numbers can be generated by numbers through algorithmic process. It implies
that human brain itself is a living true random number generator. Human brain
can meet the enormous human demand of true random numbers.
|
[
{
"version": "v1",
"created": "Tue, 3 May 2005 15:42:24 GMT"
},
{
"version": "v10",
"created": "Tue, 21 Aug 2007 15:28:48 GMT"
},
{
"version": "v11",
"created": "Thu, 23 Aug 2007 15:10:06 GMT"
},
{
"version": "v12",
"created": "Wed, 14 Nov 2007 16:04:01 GMT"
},
{
"version": "v13",
"created": "Fri, 13 Jun 2008 15:41:34 GMT"
},
{
"version": "v14",
"created": "Mon, 14 Jul 2008 13:44:30 GMT"
},
{
"version": "v15",
"created": "Thu, 24 Jul 2008 14:43:57 GMT"
},
{
"version": "v16",
"created": "Sat, 27 Dec 2008 15:56:26 GMT"
},
{
"version": "v17",
"created": "Tue, 16 Jun 2009 10:57:47 GMT"
},
{
"version": "v2",
"created": "Thu, 5 May 2005 13:09:26 GMT"
},
{
"version": "v3",
"created": "Fri, 8 Jul 2005 06:20:22 GMT"
},
{
"version": "v4",
"created": "Thu, 26 Oct 2006 14:34:45 GMT"
},
{
"version": "v5",
"created": "Tue, 9 Jan 2007 15:54:27 GMT"
},
{
"version": "v6",
"created": "Wed, 31 Jan 2007 12:44:08 GMT"
},
{
"version": "v7",
"created": "Wed, 7 Feb 2007 15:48:03 GMT"
},
{
"version": "v8",
"created": "Thu, 8 Mar 2007 14:49:33 GMT"
},
{
"version": "v9",
"created": "Wed, 18 Jul 2007 15:24:15 GMT"
}
] | 2009-06-16T00:00:00 |
[
[
"Mitra",
"Arindam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0505010
|
Neri Merhav
|
Neri Merhav and Jacob Ziv
|
On the Wyner-Ziv problem for individual sequences
|
21 pages
| null | null |
CCIT Report #517, Department of Electrical Engineering, Technion,
February 2005
|
cs.IT math.IT
| null |
We consider a variation of the Wyner-Ziv problem pertaining to lossy
compression of individual sequences using finite-state encoders and decoders.
There are two main results in this paper. The first characterizes the
relationship between the performance of the best $M$-state encoder-decoder pair
to that of the best block code of size $\ell$ for every input sequence, and
shows that the loss of the latter relative to the former (in terms of both rate
and distortion) never exceeds the order of $(\log M)/\ell$, independently of
the input sequence. Thus, in the limit of large $M$, the best rate-distortion
performance of every infinite source sequence can be approached universally by
a sequence of block codes (which are also implementable by finite-state
machines). While this result assumes an asymptotic regime where the number of
states is fixed, and only the length $n$ of the input sequence grows without
bound, we then consider the case where the number of states $M=M_n$ is allowed
to grow concurrently with $n$. Our second result is then about the critical
growth rate of $M_n$ such that the rate-distortion performance of $M_n$-state
encoder-decoder pairs can still be matched by a universal code. We show that
this critical growth rate of $M_n$ is linear in $n$.
|
[
{
"version": "v1",
"created": "Wed, 4 May 2005 11:05:58 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Merhav",
"Neri",
""
],
[
"Ziv",
"Jacob",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0505011
|
Ramona Su
|
Tony Chang, Damon Cook, Ramona Su
|
SWiM: A Simple Window Mover
|
7 pages, 4 figures
| null | null | null |
cs.HC
| null |
As computers become more ubiquitous, traditional two-dimensional interfaces
must be replaced with interfaces based on a three-dimensional metaphor.
However, these interfaces must still be as simple and functional as their
two-dimensional predecessors. This paper introduces SWiM, a new interface for
moving application windows between various screens, such as wall displays,
laptop monitors, and desktop displays, in a three-dimensional physical
environment. SWiM was designed based on the results of initial "paper and
pencil" user tests of three possible interfaces. The results of these tests led
to a map-like interface where users select the destination display for their
application from various icons. If the destination is a mobile display it is
not displayed on the map. Instead users can select the screen's name from a
list of all possible destination displays. User testing of SWiM was conducted
to discover whether it is easy to learn and use. Users that were asked to use
SWiM without any instructions found the interface as intuitive to use as users
who were given a demonstration. The results show that SWiM combines simplicity
and functionality to create an interface that is easy to learn and easy to use.
|
[
{
"version": "v1",
"created": "Wed, 4 May 2005 16:17:54 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chang",
"Tony",
""
],
[
"Cook",
"Damon",
""
],
[
"Su",
"Ramona",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0505012
|
Neri Merhav
|
Neri Merhav
|
On the Shannon cipher system with a capacity-limited key-distribution
channel
|
15 pages, 1 figure
| null | null |
CCIT Report #530, Department of Electrical Engineering, Technion,
May 2005
|
cs.IT math.IT
| null |
We consider the Shannon cipher system in a setting where the secret key is
delivered to the legitimate receiver via a channel with limited capacity. For
this setting, we characterize the achievable region in the space of three
figures of merit: the security (measured in terms of the equivocation), the
compressibility of the cryptogram, and the distortion associated with the
reconstruction of the plaintext source. Although lossy reconstruction of the
plaintext does not rule out the option that the (noisy) decryption key would
differ, to a certain extent, from the encryption key, we show, nevertheless,
that the best strategy is to strive for perfect match between the two keys, by
applying reliable channel coding to the key bits, and to control the distortion
solely via rate-distortion coding of the plaintext source before the
encryption. In this sense, our result has a flavor similar to that of the
classical source-channel separation theorem. Some variations and extensions of
this model are discussed as well.
|
[
{
"version": "v1",
"created": "Thu, 5 May 2005 07:44:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Merhav",
"Neri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0505013
|
Phuong Nguyen
|
Phuong Nguyen and Stephen Cook
|
Theories for TC0 and Other Small Complexity Classes
|
40 pages, Logical Methods in Computer Science
|
Logical Methods in Computer Science, Volume 2, Issue 1 (March 7,
2006) lmcs:2257
|
10.2168/LMCS-2(1:3)2006
| null |
cs.LO cs.CC
| null |
We present a general method for introducing finitely axiomatizable "minimal"
two-sorted theories for various subclasses of P (problems solvable in
polynomial time). The two sorts are natural numbers and finite sets of natural
numbers. The latter are essentially the finite binary strings, which provide a
natural domain for defining the functions and sets in small complexity classes.
We concentrate on the complexity class TC^0, whose problems are defined by
uniform polynomial-size families of bounded-depth Boolean circuits with
majority gates. We present an elegant theory VTC^0 in which the provably-total
functions are those associated with TC^0, and then prove that VTC^0 is
"isomorphic" to a different-looking single-sorted theory introduced by
Johannsen and Pollet. The most technical part of the isomorphism proof is
defining binary number multiplication in terms a bit-counting function, and
showing how to formalize the proofs of its algebraic properties.
|
[
{
"version": "v1",
"created": "Thu, 5 May 2005 22:17:01 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Aug 2005 19:37:05 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Mar 2006 13:53:59 GMT"
},
{
"version": "v4",
"created": "Wed, 8 Mar 2006 15:27:48 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Nguyen",
"Phuong",
""
],
[
"Cook",
"Stephen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0505014
|
Haibin Wang
|
Haibin Wang, Florentin Smarandache, Yan-Qing Zhang, Rajshekhar
Sunderraman
|
Interval Neutrosophic Sets and Logic: Theory and Applications in
Computing
|
12 figures, 100 pages, book in press
| null | null | null |
cs.LO
| null |
This book presents the advancements and applications of neutrosophics.
Chapter 1 first introduces the interval neutrosophic sets which is an instance
of neutrosophic sets. In this chapter, the definition of interval neutrosophic
sets and set-theoretic operators are given and various properties of interval
neutrosophic set are proved. Chapter 2 defines the interval neutrosophic logic
based on interval neutrosophic sets including the syntax and semantics of first
order interval neutrosophic propositional logic and first order interval
neutrosophic predicate logic. The interval neutrosophic logic can reason and
model fuzzy, incomplete and inconsistent information. In this chapter, we also
design an interval neutrosophic inference system based on first order interval
neutrosophic predicate logic. The interval neutrosophic inference system can be
applied to decision making. Chapter 3 gives one application of interval
neutrosophic sets and logic in the field of relational databases. Neutrosophic
data model is the generalization of fuzzy data model and paraconsistent data
model. Here, we generalize various set-theoretic and relation-theoretic
operations of fuzzy data model to neutrosophic data model. Chapter 4 gives
another application of interval neutrosophic logic. A soft semantic Web
Services agent framework is proposed to faciliate the registration and
discovery of high quality semantic Web Services agent. The intelligent
inference engine module of soft Semantic Web Services agent is implemented
using interval neutrosophic logic.
|
[
{
"version": "v1",
"created": "Fri, 6 May 2005 13:57:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Wang",
"Haibin",
""
],
[
"Smarandache",
"Florentin",
""
],
[
"Zhang",
"Yan-Qing",
""
],
[
"Sunderraman",
"Rajshekhar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0505015
|
Tomasz Suslo
|
Tomasz Suslo
|
Complex Mean and Variance of Linear Regression Model for High-Noised
Systems by Kriging
|
3 pages
| null | null | null |
cs.NA cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The aim of the paper is to derive the complex-valued least-squares estimator
for bias-noise mean and variance.
|
[
{
"version": "v1",
"created": "Sat, 7 May 2005 12:11:56 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Nov 2006 13:06:35 GMT"
},
{
"version": "v3",
"created": "Sat, 8 Nov 2008 12:02:44 GMT"
},
{
"version": "v4",
"created": "Wed, 29 Jul 2009 10:31:49 GMT"
}
] | 2009-07-29T00:00:00 |
[
[
"Suslo",
"Tomasz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0505016
|
Shashank Araokar
|
Shashank Araokar
|
Visual Character Recognition using Artificial Neural Networks
|
7 pages, tutorial resource
| null | null | null |
cs.NE
| null |
The recognition of optical characters is known to be one of the earliest
applications of Artificial Neural Networks, which partially emulate human
thinking in the domain of artificial intelligence. In this paper, a simplified
neural approach to recognition of optical or visual characters is portrayed and
discussed. The document is expected to serve as a resource for learners and
amateur investigators in pattern recognition, neural networking and related
disciplines.
|
[
{
"version": "v1",
"created": "Sat, 7 May 2005 20:56:58 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Araokar",
"Shashank",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0505017
|
Merc\`e Claverol
|
Manuel Abellanas, Merc\`e Claverol, and Ferran Hurtado
|
Point set stratification and Delaunay depth
|
17 pages, 16 figures
| null | null | null |
cs.CG
| null |
In the study of depth functions it is important to decide whether we want
such a function to be sensitive to multimodality or not. In this paper we
analyze the Delaunay depth function, which is sensitive to multimodality and
compare this depth with others, as convex depth and location depth. We study
the stratification that Delaunay depth induces in the point set (layers) and in
the whole plane (levels), and we develop an algorithm for computing the
Delaunay depth contours, associated to a point set in the plane, with running
time O(n log^2 n). The depth of a query point p with respect to a data set S in
the plane is the depth of p in the union of S and p. When S and p are given in
the input the Delaunay depth can be computed in O(n log n), and we prove that
this value is optimal.
|
[
{
"version": "v1",
"created": "Sun, 8 May 2005 16:36:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Abellanas",
"Manuel",
""
],
[
"Claverol",
"Mercè",
""
],
[
"Hurtado",
"Ferran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0505018
|
Jean-Francois Mari
|
Jean-Francois Mari (INRIA Lorraine - LORIA), Florence Le Ber (CEVH)
|
Temporal and Spatial Data Mining with Second-Order Hidden Models
| null | null |
10.1007/s00500-005-0501-0
| null |
cs.AI
| null |
In the frame of designing a knowledge discovery system, we have developed
stochastic models based on high-order hidden Markov models. These models are
capable to map sequences of data into a Markov chain in which the transitions
between the states depend on the \texttt{n} previous states according to the
order of the model. We study the process of achieving information extraction
fromspatial and temporal data by means of an unsupervised classification. We
use therefore a French national database related to the land use of a region,
named Teruti, which describes the land use both in the spatial and temporal
domain. Land-use categories (wheat, corn, forest, ...) are logged every year on
each site regularly spaced in the region. They constitute a temporal sequence
of images in which we look for spatial and temporal dependencies. The temporal
segmentation of the data is done by means of a second-order Hidden Markov Model
(\hmmd) that appears to have very good capabilities to locate stationary
segments, as shown in our previous work in speech recognition. Thespatial
classification is performed by defining a fractal scanning ofthe images with
the help of a Hilbert-Peano curve that introduces atotal order on the sites,
preserving the relation ofneighborhood between the sites. We show that the
\hmmd performs aclassification that is meaningful for the agronomists.Spatial
and temporal classification may be achieved simultaneously by means of a 2
levels \hmmd that measures the \aposteriori probability to map a temporal
sequence of images onto a set of hidden classes.
|
[
{
"version": "v1",
"created": "Mon, 9 May 2005 06:54:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mari",
"Jean-Francois",
"",
"INRIA Lorraine - LORIA"
],
[
"Ber",
"Florence Le",
"",
"CEVH"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0505019
|
Nitin Malik
|
Nitin Malik
|
Artificial Neural Networks and their Applications
|
6 pages, 2 figures, 1 table
| null | null | null |
cs.NE
| null |
The Artificial Neural network is a functional imitation of simplified model
of the biological neurons and their goal is to construct useful computers for
real world problems. The ANN applications have increased dramatically in the
last few years fired by both theoretical and practical applications in a wide
variety of applications. A brief theory of ANN is presented and potential areas
are identified and future trends are discussed.
|
[
{
"version": "v1",
"created": "Tue, 10 May 2005 06:37:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Malik",
"Nitin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0505020
|
Thomas Zemen
|
Thomas Zemen (1), Stefan M. Moser (2) ((1) ftw. Forschungszentrum
Telekommunikation Wien, (2) Signal and Information Processing Laboratory ETH
Zurich)
|
Asymptotic Capacity Results for Non-Stationary Time-Variant Channels
Using Subspace Projections
|
14 pages, 1 figure
| null | null | null |
cs.IT math.IT
| null |
In this paper we deal with a single-antenna discrete-time flat-fading
channel. The fading process is assumed to be stationary for the duration of a
single data block. From block to block the fading process is allowed to be
non-stationary. The number of scatterers bounds the rank of the channels
covariance matrix. The signal-to-noise ratio (SNR), the user velocity, and the
data block-length define the usable rank of the time-variant channel subspace.
The usable channel subspace grows with the SNR. This growth in dimensionality
must be taken into account for asymptotic capacity results in the high-SNR
regime. Using results from the theory of time-concentrated and band-limited
sequences we are able to define an SNR threshold below which the capacity grows
logarithmically. Above this threshold the capacity grows
double-logarithmically.
|
[
{
"version": "v1",
"created": "Tue, 10 May 2005 09:28:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Zemen",
"Thomas",
""
],
[
"Moser",
"Stefan M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0505021
|
Artur Rataj
|
Artur Rataj
|
Distant generalization by feedforward neural networks
|
7 pages, 3 figures
| null | null |
IITiS-2005-04-1-2.00
|
cs.NE
| null |
This paper discusses the notion of generalization of training samples over
long distances in the input space of a feedforward neural network. Such a
generalization might occur in various ways, that differ in how great the
contribution of different training features should be.
The structure of a neuron in a feedforward neural network is analyzed and it
is concluded, that the actual performance of the discussed generalization in
such neural networks may be problematic -- while such neural networks might be
capable for such a distant generalization, a random and spurious generalization
may occur as well.
To illustrate the differences in generalizing of the same function by
different learning machines, results given by the support vector machines are
also presented.
|
[
{
"version": "v1",
"created": "Tue, 10 May 2005 11:36:35 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Sep 2006 10:52:19 GMT"
},
{
"version": "v3",
"created": "Fri, 8 Jun 2007 09:20:49 GMT"
}
] | 2007-06-13T00:00:00 |
[
[
"Rataj",
"Artur",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0505022
|
Hideki Ochiai
|
Hideki Ochiai, Patrick Mitran, H. Vincent Poor, Vahid Tarokh
|
Collaborative Beamforming for Distributed Wireless Ad Hoc Sensor
Networks
|
To appear in the IEEE Transactions on Signal Processing
| null |
10.1109/TSP.2005.857028
| null |
cs.IT cs.NI math.IT
| null |
The performance of collaborative beamforming is analyzed using the theory of
random arrays. The statistical average and distribution of the beampattern of
randomly generated phased arrays is derived in the framework of wireless ad hoc
sensor networks. Each sensor node is assumed to have a single isotropic antenna
and nodes in the cluster collaboratively transmit the signal such that the
signal in the target direction is coherently added in the far- eld region. It
is shown that with N sensor nodes uniformly distributed over a disk, the
directivity can approach N, provided that the nodes are located sparsely
enough. The distribution of the maximum sidelobe peak is also studied. With the
application to ad hoc networks in mind, two scenarios, closed-loop and
open-loop, are considered. Associated with these scenarios, the effects of
phase jitter and location estimation errors on the average beampattern are also
analyzed.
|
[
{
"version": "v1",
"created": "Tue, 10 May 2005 13:09:35 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Ochiai",
"Hideki",
""
],
[
"Mitran",
"Patrick",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Tarokh",
"Vahid",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0505023
|
Guillaume Gardey
|
Guillaume Gardey and Olivier H. Roux and Olivier F. Roux
|
State Space Computation and Analysis of Time Petri Nets
|
21 pages
| null | null | null |
cs.LO
| null |
The theory of Petri Nets provides a general framework to specify the
behaviors of real-time reactive systems and Time Petri Nets were introduced to
take also temporal specifications into account. We present in this paper a
forward zone-based algorithm to compute the state space of a bounded Time Petri
Net: the method is different and more efficient than the classical State Class
Graph. We prove the algorithm to be exact with respect to the reachability
problem. Furthermore, we propose a translation of the computed state space into
a Timed Automaton, proved to be timed bisimilar to the original Time Petri Net.
As the method produce a single Timed Automaton, syntactical clocks reduction
methods (Daws and Yovine for instance) may be applied to produce an automaton
with fewer clocks. Then, our method allows to model-check TTPN by the use of
efficient Timed Automata tools.
To appear in Theory and Practice of Logic Programming (TPLP).
|
[
{
"version": "v1",
"created": "Tue, 10 May 2005 13:30:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gardey",
"Guillaume",
""
],
[
"Roux",
"Olivier H.",
""
],
[
"Roux",
"Olivier F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0505024
|
Riccardo Pucella
|
Riccardo Pucella
|
Logic Column 12: Logical Verification and Equational Verification
|
11 pages
|
SIGACT News, 36(2), pp. 77-88, 2005
| null | null |
cs.LO
| null |
This article examines two approaches to verification, one based on using a
logic for expressing properties of a system, and one based on showing the
system equivalent to a simpler system that obviously has whatever property is
of interest. Using examples such as process calculi and regular programs, the
relationship between these two approaches is explored.
|
[
{
"version": "v1",
"created": "Tue, 10 May 2005 14:49:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pucella",
"Riccardo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.