id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0506037
|
Sriram Narayanaswamy Kizhakkemadam
|
Sriram N. Kizhakkemadam, Panos Papamichalis, Mandyam Srinath, Dinesh
Rajan
|
Tradeoff Between Source and Channel Coding for Erasure Channels
|
International Symposium on Information Theory, Adelaide, Sept.
2005(accepted)
| null | null | null |
cs.IT math.IT
| null |
In this paper, we investigate the optimal tradeoff between source and channel
coding for channels with bit or packet erasure. Upper and Lower bounds on the
optimal channel coding rate are computed to achieve minimal end-to-end
distortion. The bounds are calculated based on a combination of sphere packing,
straight line and expurgated error exponents and also high rate vector
quantization theory. By modeling a packet erasure channel in terms of an
equivalent bit erasure channel, we obtain bounds on the packet size for a
specified limit on the distortion.
|
[
{
"version": "v1",
"created": "Fri, 10 Jun 2005 22:49:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kizhakkemadam",
"Sriram N.",
""
],
[
"Papamichalis",
"Panos",
""
],
[
"Srinath",
"Mandyam",
""
],
[
"Rajan",
"Dinesh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506038
|
Wen Ding
|
Wen Ding & William Yurcik
|
A Game Theoretic Economics Framework to understanding Information
Security Oursourcing Market
|
16 pages, 2 figures
| null | null | null |
cs.GT
| null |
On information security outsourcing market, an important reason that firms do
not want to let outside firms(usually called MSSPs-Managed Security Service
Providers) to take care of their security need is that they worry about service
quality MSSPs provide because they cannot monitor effort of the MSSPs. Since
MSSPs action is unobservable to buyers, MSSPs can lower cost by working less
hard than required in the contract and get higher profit. In the asymmetric
information literature, this possible secret shirking behavior is termed as
moral hazard problem. This paper considers a game theoretic economic framework
to show that under information asymmetry, an optimal contract can be designed
so that MSSPs will stick to their promised effort level. We also show that the
optimal contract should be performance-based, i.e., payment to MSSP should base
on performance of MSSP's security service period by period. For comparison, we
also showed that if the moral hazard problem does not exist, the optimal
contract does not depend on MSSP's performance. A contract that specifies
constant payment to MSSP will be optimal. Besides these, we show that for no
matter under perfect information scenario or imperfect information scenario,
the higher the transaction cost is, the lower payment to MSSPs will be.
|
[
{
"version": "v1",
"created": "Fri, 10 Jun 2005 23:58:37 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ding",
"Wen",
""
],
[
"Yurcik",
"William",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0506039
|
Heechoon Lee
|
Weijun Zhu, Heechoon Lee, Daniel Liu and Michael P. Fitz
|
Antenna array geometry and coding performance
|
5 pages, 7 figures, ISIT 2005
| null | null | null |
cs.IT math.IT
| null |
This paper provides details about experiments in realistic, urban, and
frequency flat channels with space-time coding that specifically examines the
impact of the number of receive antennas and the design criteria for code
selection on the performance. Also the performance characteristics are examined
of the coded modulations in the presence of finite size array geometries. This
paper gives some insight into which of the theories are most useful in
realistic deployments.
|
[
{
"version": "v1",
"created": "Sat, 11 Jun 2005 02:38:26 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Zhu",
"Weijun",
""
],
[
"Lee",
"Heechoon",
""
],
[
"Liu",
"Daniel",
""
],
[
"Fitz",
"Michael P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506040
|
Sheng Bao
|
Jie Liu, Sheng Bao, Zhiqiang Jing, Shi Chen
|
A Fixed-Length Coding Algorithm for DNA Sequence Compression
|
2 pages,2 tables,using Bioinformatics Latex template,no more
relationship between us and that magazine
| null | null | null |
cs.IT math.IT
| null |
While achieving a compression ratio of 2.0 bits/base, the new algorithm codes
non-N bases in fixed length. It dramatically reduces the time of coding and
decoding than previous DNA compression algorithms and some universal
compression programs.
|
[
{
"version": "v1",
"created": "Sun, 12 Jun 2005 08:49:07 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Liu",
"Jie",
""
],
[
"Bao",
"Sheng",
""
],
[
"Jing",
"Zhiqiang",
""
],
[
"Chen",
"Shi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506041
|
Vladimir Vovk
|
Vladimir Vovk
|
Competitive on-line learning with a convex loss function
|
26 pages
| null | null | null |
cs.LG cs.AI
| null |
We consider the problem of sequential decision making under uncertainty in
which the loss caused by a decision depends on the following binary
observation. In competitive on-line learning, the goal is to design decision
algorithms that are almost as good as the best decision rules in a wide
benchmark class, without making any assumptions about the way the observations
are generated. However, standard algorithms in this area can only deal with
finite-dimensional (often countable) benchmark classes. In this paper we give
similar results for decision rules ranging over an arbitrary reproducing kernel
Hilbert space. For example, it is shown that for a wide class of loss functions
(including the standard square, absolute, and log loss functions) the average
loss of the master algorithm, over the first $N$ observations, does not exceed
the average loss of the best decision rule with a bounded norm plus
$O(N^{-1/2})$. Our proof technique is very different from the standard ones and
is based on recent results about defensive forecasting. Given the probabilities
produced by a defensive forecasting algorithm, which are known to be well
calibrated and to have good resolution in the long run, we use the expected
loss minimization principle to find a suitable decision.
|
[
{
"version": "v1",
"created": "Sat, 11 Jun 2005 18:11:22 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jul 2005 16:49:33 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Sep 2005 14:27:18 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Vovk",
"Vladimir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0506042
|
Deepak Sridhara
|
Deepak Sridhara, Christine Kelley, and Joachim Rosenthal
|
Tree-Based Construction of LDPC Codes
|
5 pages, 12 figures. To appear in the Proceedings of IEEE
International Symposium on Information Theory, Sept. 4-9, 2005, Adelaide,
Australia
| null |
10.1109/ISIT.2005.1523456
| null |
cs.IT math.IT
| null |
We present a construction of LDPC codes that have minimum pseudocodeword
weight equal to the minimum distance, and perform well with iterative decoding.
The construction involves enumerating a d-regular tree for a fixed number of
layers and employing a connection algorithm based on mutually orthogonal Latin
squares to close the tree. Methods are presented for degrees d=p^s and d =
p^s+1, for p a prime, -- one of which includes the well-known
finite-geometry-based LDPC codes.
|
[
{
"version": "v1",
"created": "Sun, 12 Jun 2005 09:00:09 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Sridhara",
"Deepak",
""
],
[
"Kelley",
"Christine",
""
],
[
"Rosenthal",
"Joachim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506043
|
Kapil Bhattad
|
Krishna R. Narayanan and Kapil Bhattad
|
A Decision Feedback Based Scheme for Slepian-Wolf Coding of sources with
Hidden Markov Correlation
|
Submitted to IEEE Comm. Letters
| null |
10.1109/LCOMM.2006.1633329
| null |
cs.IT math.IT
| null |
We consider the problem of compression of two memoryless binary sources, the
correlation between which is defined by a Hidden Markov Model (HMM). We propose
a Decision Feedback (DF) based scheme which when used with low density parity
check codes results in compression close to the Slepian Wolf limits.
|
[
{
"version": "v1",
"created": "Mon, 13 Jun 2005 13:17:21 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Narayanan",
"Krishna R.",
""
],
[
"Bhattad",
"Kapil",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506044
|
Kapil Bhattad
|
Kapil Bhattad, Niranjan Ratnakar, Ralf Koetter, and Krishna R.
Narayanan
|
Minimal Network Coding for Multicast
|
accepted for publication at ISIT 2005
| null | null | null |
cs.IT math.IT
| null |
We give an information flow interpretation for multicasting using network
coding. This generalizes the fluid model used to represent flows to a single
receiver. Using the generalized model, we present a decentralized algorithm to
minimize the number of packets that undergo network coding. We also propose a
decentralized algorithm to construct capacity achieving multicast codes when
the processing at some nodes is restricted to routing. The proposed algorithms
can be coupled with existing decentralized schemes to achieve minimum cost
muticast.
|
[
{
"version": "v1",
"created": "Sun, 12 Jun 2005 15:20:05 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Bhattad",
"Kapil",
""
],
[
"Ratnakar",
"Niranjan",
""
],
[
"Koetter",
"Ralf",
""
],
[
"Narayanan",
"Krishna R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506045
|
Kapil Bhattad
|
Krishna R. Narayanan and Kapil Bhattad
|
Decision Feedback Based Scheme for Slepian-Wolf Coding of sources with
Hidden Markov Correlation
|
Submitted to IEEE Comm. Letters
| null |
10.1109/LCOMM.2006.1633329
| null |
cs.IT math.IT
| null |
We consider the problem of compression of two memoryless binary sources, the
correlation between which is defined by a Hidden Markov Model (HMM). We propose
a Decision Feedback (DF) based scheme which when used with low density parity
check codes results in compression close to the Slepian Wolf limits.
|
[
{
"version": "v1",
"created": "Sun, 12 Jun 2005 15:18:07 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Narayanan",
"Krishna R.",
""
],
[
"Bhattad",
"Kapil",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506046
|
Bernard Jacquemin
|
Bernard Jacquemin (ISC)
|
Dictionaries merger for text expansion in question answering
|
4 pp
|
Proceedings of COLING 2004 (2004) 1398
| null | null |
cs.DL
| null |
This paper presents an original way to add new data in a reference dictionary
from several other lexical resources, without loosing any consistence. This
operation is carried in order to get lexical information classified by the
sense of the entry. This classification makes it possible to enrich utterances
(in QA: the queries) following the meaning, and to reduce noise. An analysis of
the experienced problems shows the interest of this method, and insists on the
points that have to be tackled.
|
[
{
"version": "v1",
"created": "Sun, 12 Jun 2005 16:36:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Jacquemin",
"Bernard",
"",
"ISC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0506047
|
Bernard Jacquemin
|
Bernard Jacquemin (ISC)
|
Analyse et expansion des textes en question-r\'{e}ponse
|
11 pp
|
Le poids des mots. Actes des 7es journ\'{e}es internationales
d'Analyse statistique des Donn\'{e}es Textuelles (2004) 1219
| null | null |
cs.IR
| null |
This paper presents an original methodology to consider question answering.
We noticed that query expansion is often incorrect because of a bad
understanding of the question. But the automatic good understanding of an
utterance is linked to the context length, and the question are often short.
This methodology proposes to analyse the documents and to construct an
informative structure from the results of the analysis and from a semantic text
expansion. The linguistic analysis identifies words (tokenization and
morphological analysis), links between words (syntactic analysis) and word
sense (semantic disambiguation). The text expansion adds to each word the
synonyms matching its sense and replaces the words in the utterances by
derivatives, modifying the syntactic schema if necessary. In this way, whatever
enrichment may be, the text keeps the same meaning, but each piece of
information matches many realisations. The questioning method consists in
constructing a local informative structure without enrichment, and matches it
with the documentary structure. If a sentence in the informative structure
matches the question structure, this sentence is the answer to the question.
|
[
{
"version": "v1",
"created": "Sun, 12 Jun 2005 16:39:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Jacquemin",
"Bernard",
"",
"ISC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0506048
|
Bernard Jacquemin
|
Bernard Jacquemin (ISC), Caroline Brun, Claude Roux
|
Enriching a Text by Semantic Disambiguation for Information Extraction
|
7 pp
|
LREC 2002 Workshop Proceedings "Using semantics for informaiton
retrival and filtering" (2002) 45-51
| null | null |
cs.IR
| null |
External linguistic resources have been used for a very long time in
information extraction. These methods enrich a document with data that are
semantically equivalent, in order to improve recall. For instance, some of
these methods use synonym dictionaries. These dictionaries enrich a sentence
with words that have a similar meaning. However, these methods present some
serious drawbacks, since words are usually synonyms only in restricted
contexts. The method we propose here consists of using word sense
disambiguation rules (WSD) to restrict the selection of synonyms to only these
that match a specific syntactico-semantic context. We show how WSD rules are
built and how information extraction techniques can benefit from the
application of these rules.
|
[
{
"version": "v1",
"created": "Sun, 12 Jun 2005 16:44:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Jacquemin",
"Bernard",
"",
"ISC"
],
[
"Brun",
"Caroline",
""
],
[
"Roux",
"Claude",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0506049
|
Bernard Jacquemin
|
Caroline Brun (XRCE), Bernard Jacquemin (ISC, XRCE), Fr\'ed\'erique
Segond (XRCE)
|
Exploitation de dictionnaires \'{e}lectroniques pour la
d\'{e}sambigu\"{i}sation s\'{e}mantique lexicale
|
25 pp
|
Traitement Automatique des Langues (TAL) 42, no. 3 (2001) pp.
667-690
| null | null |
cs.DL
| null |
This paper presents a lexical disambiguation system, initially developed for
English and now adapted to French. This system associates a word with its
meaning in a given context using electronic dictionaries as semantically
annotated corpora in order to extract semantic disambiguation rules. We
describe the rule extraction and application process as well as the evaluation
of the system. The results for French give us insight information on some
possible improvments of the nature and content of lexical resources adapted for
disambiguation in this framework.
|
[
{
"version": "v1",
"created": "Sun, 12 Jun 2005 16:48:33 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Brun",
"Caroline",
"",
"XRCE"
],
[
"Jacquemin",
"Bernard",
"",
"ISC, XRCE"
],
[
"Segond",
"Frédérique",
"",
"XRCE"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0506050
|
Alex Wiesmaier
|
A. Wiesmaier, V. Karatsiolis, M. Lippert, J. Buchmann
|
The Workshop - Implementing Well Structured Enterprise Applications
|
7 pages (ieee), 1 figure, accepted for SERP'05
|
Proceedings of "The 2005 International Conference on Software
Engineering Research and Practice"; June 2005
| null | null |
cs.SE
| null |
We specify an abstraction layer to be used between an enterprise application
and the utilized enterprise framework (like J2EE or .NET). This specification
is called the Workshop. It provides an intuitive metaphor supporting the
programmer in designing easy understandable code. We present an implementation
of this specification. It is based upon the J2EE framework and is called the
JWorkshop. As a proof of concept we implement a special certification authority
called the Key Authority based upon the JWorkshop. The mentioned certification
authority runs very successfully in a variety of different real world projects.
|
[
{
"version": "v1",
"created": "Mon, 13 Jun 2005 13:25:14 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Wiesmaier",
"A.",
""
],
[
"Karatsiolis",
"V.",
""
],
[
"Lippert",
"M.",
""
],
[
"Buchmann",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0506051
|
Heiko Herrmann
|
Heiko Herrmann, Gunnar Rueckner
|
Comparison of two different implementations of a
finite-difference-method for first-order pde in mathematica and matlab
|
LaTeX, 6 pages, 9 eps-figures, v2: minor additions/corrections
| null | null | null |
cs.CE cs.DM
| null |
In this article two implementations of a symmetric finite difference
algorithm for a first-order partial differential equation are discussed. The
considered partial differential equation discribes the time evolution of the
crack length distribution of microcracks in brittle materia.
|
[
{
"version": "v1",
"created": "Mon, 13 Jun 2005 15:26:16 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Nov 2005 10:25:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Herrmann",
"Heiko",
""
],
[
"Rueckner",
"Gunnar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0506052
|
Vignesh Sethuraman
|
Vignesh Sethuraman, Bruce Hajek
|
Comments on `Bit Interleaved Coded Modulation'
|
This is the version after review (shorter, better etc)
| null | null | null |
cs.IT math.IT
| null |
Caire, Taricco and Biglieri presented a detailed analysis of bit interleaved
coded modulation, a simple and popular technique used to improve system
performance, especially in the context of fading channels. They derived an
upper bound to the probability of error, called the expurgated bound. In this
correspondence, the proof of the expurgated bound is shown to be flawed. A new
upper bound is also derived. It is not known whether the original expurgated
bound is valid for the important special case of square QAM with Gray labeling,
but the new bound is very close to, and slightly tighter than, the original
bound for a numerical example.
|
[
{
"version": "v1",
"created": "Mon, 13 Jun 2005 16:38:01 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Nov 2005 18:14:39 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sethuraman",
"Vignesh",
""
],
[
"Hajek",
"Bruce",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506053
|
Hongyuan Zhang
|
Hongyuan Zhang, Huaiyu Dai, Quan Zhou, Brian L. Hughes
|
Analysis on Transmit Antenna Selection for Spatial Multiplexing Systems:
A Geometrical Approach
|
28 Pages, Submitted IEEE Trans. Info. Theory
| null | null | null |
cs.IT math.IT
| null |
Recently, the remarkable potential of a multiple-input multiple-output (MIMO)
wireless communication system was unveiled for its ability to provide spatial
diversity or multiplexing gains. For MIMO diversity schemes, it is already
known that. by the optimal antenna selection maximizing the post-processing
signal-to-noise ratio, the diversity order of the full system can be
maintained. On the other hand, the diversity order achieved by antenna
selection in spatial multiplexing systems, especially those exploiting
practical coding and decoding schemes, has not been rigorously analyzed thus
far. In this paper, from a geometric standpoint, we propose a new framework for
theoretically analyzing the diversity order achieved by transmit antenna
selection for separately encoded spatial multiplexing systems with linear and
decision-feedback receivers. We rigorously show that a diversity order of
(Nt-1)(Nr-1) can be achieved for an Nr by Nt SM system when L=2 antennas are
selected from the transmit side; while for L>2 scenarios, we give bounds for
the achievable diversity order and show that the optimal diversity order is at
least (Nt-L+1)(Nr-L+1) . Furthermore, the same geometrical approach can be used
to evaluate the diversity-multiplexing tradeoff curves for the considered
spatial multiplexing systems with transmit antenna selection.
|
[
{
"version": "v1",
"created": "Mon, 13 Jun 2005 16:45:37 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Zhang",
"Hongyuan",
""
],
[
"Dai",
"Huaiyu",
""
],
[
"Zhou",
"Quan",
""
],
[
"Hughes",
"Brian L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506054
|
Ramesh Johari
|
Ramesh Johari (Stanford University), Shie Mannor (McGill University),
John N. Tsitsiklis (MIT)
|
Efficiency Loss in a Network Resource Allocation Game: The Case of
Elastic Supply
|
Originally Laboratory for Information and Decision Systems (MIT)
Publication 2605
| null | null | null |
cs.GT
| null |
We consider a resource allocation problem where individual users wish to send
data across a network to maximize their utility, and a cost is incurred at each
link that depends on the total rate sent through the link. It is known that as
long as users do not anticipate the effect of their actions on prices, a simple
proportional pricing mechanism can maximize the sum of users' utilities minus
the cost (called aggregate surplus). Continuing previous efforts to quantify
the effects of selfish behavior in network pricing mechanisms, we consider the
possibility that users anticipate the effect of their actions on link prices.
Under the assumption that the links' marginal cost functions are convex, we
establish existence of a Nash equilibrium. We show that the aggregate surplus
at a Nash equilibrium is no worse than a factor of 4*sqrt{2} - 5 times the
optimal aggregate surplus; thus, the efficiency loss when users are selfish is
no more than approximately 34%.
|
[
{
"version": "v1",
"created": "Tue, 14 Jun 2005 02:11:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Johari",
"Ramesh",
"",
"Stanford University"
],
[
"Mannor",
"Shie",
"",
"McGill University"
],
[
"Tsitsiklis",
"John N.",
"",
"MIT"
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0506055
|
Lane A. Hemaspaandra
|
Edith Hemaspaandra, Lane A. Hemaspaandra, Osamu Watanabe
|
The Complexity of Kings
| null | null | null |
URCS-TR-2005-870
|
cs.CC cs.DM
| null |
A king in a directed graph is a node from which each node in the graph can be
reached via paths of length at most two. There is a broad literature on
tournaments (completely oriented digraphs), and it has been known for more than
half a century that all tournaments have at least one king [Lan53]. Recently,
kings have proven useful in theoretical computer science, in particular in the
study of the complexity of the semifeasible sets [HNP98,HT05] and in the study
of the complexity of reachability problems [Tan01,NT02].
In this paper, we study the complexity of recognizing kings. For each
succinctly specified family of tournaments, the king problem is known to belong
to $\Pi_2^p$ [HOZZ]. We prove that this bound is optimal: We construct a
succinctly specified tournament family whose king problem is
$\Pi_2^p$-complete. It follows easily from our proof approach that the problem
of testing kingship in succinctly specified graphs (which need not be
tournaments) is $\Pi_2^p$-complete. We also obtain $\Pi_2^p$-completeness
results for k-kings in succinctly specified j-partite tournaments, $k,j \geq
2$, and we generalize our main construction to show that $\Pi_2^p$-completeness
holds for testing k-kingship in succinctly specified families of tournaments
for all $k \geq 2$.
|
[
{
"version": "v1",
"created": "Tue, 14 Jun 2005 02:31:35 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Watanabe",
"Osamu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0506056
|
Travis Gagie
|
Travis Gagie
|
Large Alphabets and Incompressibility
| null | null |
10.1016/j.ipl.2006.04.008
| null |
cs.IT math.IT
| null |
We briefly survey some concepts related to empirical entropy -- normal
numbers, de Bruijn sequences and Markov processes -- and investigate how well
it approximates Kolmogorov complexity. Our results suggest $\ell$th-order
empirical entropy stops being a reasonable complexity metric for almost all
strings of length $m$ over alphabets of size $n$ about when $n^\ell$ surpasses
$m$.
|
[
{
"version": "v1",
"created": "Tue, 14 Jun 2005 03:08:57 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Feb 2006 16:27:45 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Mar 2006 19:00:02 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Gagie",
"Travis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506057
|
Victor Kromer
|
Kromer Victor
|
About one 3-parameter Model of Testing
|
9 pages; in Russian; Paper with changed content
| null | null | null |
cs.LG
| null |
This article offers a 3-parameter model of testing, with 1) the difference
between the ability level of the examinee and item difficulty; 2) the examinee
discrimination and 3) the item discrimination as model parameters.
|
[
{
"version": "v1",
"created": "Tue, 14 Jun 2005 04:00:38 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Jul 2005 02:43:12 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Victor",
"Kromer",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0506058
|
Kapil Bhattad
|
Kapil Bhattad and Krishna Narayanan
|
An MSE Based Ttransfer Chart to Analyze Iterative Decoding Schemes
| null | null | null | null |
cs.IT math.IT
| null |
An alternative to extrinsic information transfer (EXIT) charts called mean
squared error (MSE) charts that use a measure related to the MSE instead of
mutual information is proposed. Using the relationship between mutual
information and minimum mean squared error (MMSE), a relationship between the
rate of any code and the area under a plot of MSE versus signal to noise ratio
(SNR) is obtained, when the log likelihood ratios (LLR) can be assumed to be
from a Gaussian channel. Using this result, a theoretical justification is
provided for designing concatenated codes by matching the EXIT charts of the
inner and outer decoders, when the LLRs are Gaussian which is typically assumed
for code design using EXIT charts. Finally, for the special case of AWGN
channel it is shown that any capacity achieving code has an EXIT curve that is
flat. This extends Ashikhmin et als results for erasure channels to the
Gaussian channel.
|
[
{
"version": "v1",
"created": "Tue, 14 Jun 2005 07:56:14 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Bhattad",
"Kapil",
""
],
[
"Narayanan",
"Krishna",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506059
|
Hubie Chen
|
Hubie Chen
|
Existentially Restricted Quantified Constraint Satisfaction
| null | null | null | null |
cs.CC cs.LO
| null |
The quantified constraint satisfaction problem (QCSP) is a powerful framework
for modelling computational problems. The general intractability of the QCSP
has motivated the pursuit of restricted cases that avoid its maximal
complexity. In this paper, we introduce and study a new model for investigating
QCSP complexity in which the types of constraints given by the existentially
quantified variables, is restricted. Our primary technical contribution is the
development and application of a general technology for proving positive
results on parameterizations of the model, of inclusion in the complexity class
coNP.
|
[
{
"version": "v1",
"created": "Tue, 14 Jun 2005 11:57:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chen",
"Hubie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0506060
|
Yong Luo
|
Yong Luo
|
Yet another normalisation proof for Martin-Lof's logical
framework--Terms with correct arities are strongly normalising
|
19 pages
| null | null | null |
cs.LO
| null |
In this paper, we prove the strong normalisation for Martin-L\"{o}f's Logical
Framework, and suggest that {}``correct arity'', a condition weaker than
well-typedness, will also guarantee the strong normalisation.
|
[
{
"version": "v1",
"created": "Tue, 14 Jun 2005 12:13:22 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Jun 2005 16:56:44 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Luo",
"Yong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0506061
|
Daniele Gorla
|
Daniele Gorla, Matthew Hennessy and Vladimiro Sassone
|
Security Policies as Membranes in Systems for Global Computing
|
23 pages; to appear in Logical Methods in Computer Science
|
Logical Methods in Computer Science, Volume 1, Issue 3 (December
20, 2005) lmcs:2262
|
10.2168/LMCS-1(3:2)2005
| null |
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a simple global computing framework, whose main concern is code
migration. Systems are structured in sites, and each site is divided into two
parts: a computing body, and a membrane, which regulates the interactions
between the computing body and the external environment. More precisely,
membranes are filters which control access to the associated site, and they
also rely on the well-established notion of trust between sites. We develop a
basic theory to express and enforce security policies via membranes. Initially,
these only control the actions incoming agents intend to perform locally. We
then adapt the basic theory to encompass more sophisticated policies, where the
number of actions an agent wants to perform, and also their order, are
considered.
|
[
{
"version": "v1",
"created": "Tue, 14 Jun 2005 18:08:10 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Dec 2005 15:09:21 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Jul 2006 17:15:10 GMT"
},
{
"version": "v4",
"created": "Thu, 27 Jul 2006 07:25:51 GMT"
},
{
"version": "v5",
"created": "Tue, 7 Oct 2008 09:58:55 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Gorla",
"Daniele",
""
],
[
"Hennessy",
"Matthew",
""
],
[
"Sassone",
"Vladimiro",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0506062
|
Yoshiyuki Kabashima
|
Yoshiyuki Kabashima
|
A CDMA multiuser detection algorithm based on survey propagation
|
Abstract for my presentation at Randomness and Computation Joint
Workshop ``New Horizons in Computing'' and ``Statistical Mechanical Approach
to Probabilistic Information Processing'' (18-21 July, 2005, Sendai, Japan)
| null | null | null |
cs.IT math.IT
| null |
A computationally tractable CDMA multiuser detection algorithm is developed
based on survey propagation.
|
[
{
"version": "v1",
"created": "Wed, 15 Jun 2005 01:40:57 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Jun 2005 01:32:47 GMT"
},
{
"version": "v3",
"created": "Fri, 15 Jul 2005 02:18:27 GMT"
},
{
"version": "v4",
"created": "Sat, 23 Jul 2005 16:35:46 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kabashima",
"Yoshiyuki",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506063
|
Slawomir Staworko
|
Slawomir Staworko and Jan Chomicki
|
Priority-Based Conflict Resolution in Inconsistent Relational Databases
| null | null | null |
UB CSE Technical Report 2005-11
|
cs.DB
| null |
We study here the impact of priorities on conflict resolution in inconsistent
relational databases. We extend the framework of repairs and consistent query
answers. We propose a set of postulates that an extended framework should
satisfy and consider two instantiations of the framework: (locally preferred)
l-repairs and (globally preferred) g-repairs. We study the relationships
between them and the impact each notion of repair has on the computational
complexity of repair checking and consistent query answers.
|
[
{
"version": "v1",
"created": "Tue, 14 Jun 2005 23:10:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Staworko",
"Slawomir",
""
],
[
"Chomicki",
"Jan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0506064
|
Mitsugu Iwamoto
|
Mitsugu Iwamoto, Hirosuke Yamamoto, Hirohisa Ogawa
|
Optimal multiple assignments based on integer programming in secret
sharing schemes with general access structures
| null | null | null | null |
cs.CR cs.IT math.IT
| null |
It is known that for any general access structure, a secret sharing scheme
(SSS) can be constructed from an (m,m)-threshold scheme by using the so-called
cumulative map or from a (t,m)-threshold SSS by a modified cumulative map.
However, such constructed SSSs are not efficient generally. In this paper, we
propose a new method to construct a SSS from a $(t,m)$-threshold scheme for any
given general access structure. In the proposed method, integer programming is
used to distribute optimally the shares of (t,m)-threshold scheme to each
participant of the general access structure. From the optimality, it can always
attain lower coding rate than the cumulative maps except the cases that they
give the optimal distribution. The same method is also applied to construct
SSSs for incomplete access structures and/or ramp access structures.
|
[
{
"version": "v1",
"created": "Wed, 15 Jun 2005 06:07:42 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Iwamoto",
"Mitsugu",
""
],
[
"Yamamoto",
"Hirosuke",
""
],
[
"Ogawa",
"Hirohisa",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506065
|
Mitsugu Iwamoto
|
Mitsugu Iwamoto, Hirosuke Yamamoto
|
Strongly secure ramp secret sharing schemes for general access
structures
| null | null | null | null |
cs.CR cs.IT math.IT
| null |
Ramp secret sharing (SS) schemes can be classified into strong ramp SS
schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out
any part of a secret explicitly even in the case where some information about
the secret leaks from a non-qualified set of shares, and hence, they are more
desirable than weak ramp SS schemes. However, it is not known how to construct
the strong ramp SS schemes in the case of general access structures. In this
paper, it is shown that a strong ramp SS scheme can always be constructed from
a SS scheme with plural secrets for any feasible general access structure. As a
byproduct, it is pointed out that threshold ramp SS schemes based on Shamir's
polynomial interpolation method are {\em not} always strong.
|
[
{
"version": "v1",
"created": "Wed, 15 Jun 2005 06:36:17 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Iwamoto",
"Mitsugu",
""
],
[
"Yamamoto",
"Hirosuke",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506066
|
Yoo Chung
|
Yoo Chung and Dongman Lee
|
Impersonation with the Echo Protocol
|
submitted to ACM Workshop on Wireless Security (2005)
| null | null | null |
cs.CR cs.NI
| null |
The Echo protocol tries to do secure location verification using physical
limits imposed by the speeds of light and sound. While the protocol is able to
guarantee that a certain object is within a certain region, it cannot ensure
the authenticity of further messages from the object without using
cryptography. This paper describes an impersonation attack against the protocol
based on this weakness. It also describes a couple of approaches which can be
used to defend against the attack.
|
[
{
"version": "v1",
"created": "Wed, 15 Jun 2005 10:57:41 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chung",
"Yoo",
""
],
[
"Lee",
"Dongman",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0506067
|
Juan Jose Amor
|
Juan Jose Amor, Gregorio Robles, Jesus Gonzalez-Barahona
|
Measuring Woody: The Size of Debian 3.0
| null | null | null | null |
cs.SE
| null |
Debian is possibly the largest free software distribution, with well over
4,500 source packages in the latest stable release (Debian 3.0) and more than
8,000 source packages in the release currently in preparation. However, we wish
to know what these numbers mean. In this paper, we use David A. Wheeler's
SLOCCount system to determine the number of physical source lines of code
(SLOC) of Debian 3.0 (aka woody). We show that Debian 3.0 includes more than
105,000,000 physical SLOC (almost twice than Red Hat 9, released about 8 months
later), showing that the Debian development model (based on the work of a large
group of voluntary developers spread around the world) is at least as capable
as other development methods (like the more centralized one, based on the work
of employees, used by Red Hat or Microsoft) to manage distributions of this
size.
It is also shown that if Debian had been developed using traditional
proprietary methods, the COCOMO model estimates that its cost would be close to
$6.1 billion USD to develop Debian 3.0. In addition, we offer both an analysis
of the programming languages used in the distribution (C amounts for about 65%,
C++ for about 12%, Shell for about 8% and LISP is around 4%, with many others
to follow), and the largest packages (The Linux kernel, Mozilla, XFree86, PM3,
etc.)
|
[
{
"version": "v1",
"created": "Wed, 15 Jun 2005 21:48:06 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Amor",
"Juan Jose",
""
],
[
"Robles",
"Gregorio",
""
],
[
"Gonzalez-Barahona",
"Jesus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0506068
|
John Watrous
|
Chris Marriott and John Watrous
|
Quantum Arthur-Merlin Games
|
22 pages
|
Computational Complexity, 14(2): 122 - 152, 2005
| null | null |
cs.CC quant-ph
| null |
This paper studies quantum Arthur-Merlin games, which are Arthur-Merlin games
in which Arthur and Merlin can perform quantum computations and Merlin can send
Arthur quantum information. As in the classical case, messages from Arthur to
Merlin are restricted to be strings of uniformly generated random bits. It is
proved that for one-message quantum Arthur-Merlin games, which correspond to
the complexity class QMA, completeness and soundness errors can be reduced
exponentially without increasing the length of Merlin's message. Previous
constructions for reducing error required a polynomial increase in the length
of Merlin's message. Applications of this fact include a proof that logarithmic
length quantum certificates yield no increase in power over BQP and a simple
proof that QMA is contained in PP. Other facts that are proved include the
equivalence of three (or more) message quantum Arthur-Merlin games with
ordinary quantum interactive proof systems and some basic properties concerning
two-message quantum Arthur-Merlin games.
|
[
{
"version": "v1",
"created": "Wed, 15 Jun 2005 22:13:52 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Marriott",
"Chris",
""
],
[
"Watrous",
"John",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0506069
|
Remi Monasson
|
Remi Monasson (LPTENS)
|
A generating function method for the average-case analysis of DPLL
|
RANDOM 2005, Berkeley, August 22-24
|
RANDOM 2005, Berkeley, CA, \'Etats-Unis d'Am\'erique, p.402-413
| null | null |
cs.CC cond-mat.dis-nn
| null |
A method to calculate the average size of Davis-Putnam-Loveland-Logemann
(DPLL) search trees for random computational problems is introduced, and
applied to the satisfiability of random CNF formulas (SAT) and the coloring of
random graph (COL) problems. We establish recursion relations for the
generating functions of the average numbers of (variable or color) assignments
at a given height in the search tree, which allow us to derive the asymptotics
of the expected DPLL tree size, 2^{N w + o(N)}, where N is the instance size. w
is calculated as a function of the input distribution parameters (ratio of
clauses per variable for SAT, average vertex degree for COL), and the branching
heuristics.
|
[
{
"version": "v1",
"created": "Thu, 16 Jun 2005 09:17:21 GMT"
}
] | 2008-06-20T00:00:00 |
[
[
"Monasson",
"Remi",
"",
"LPTENS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
}
] |
cs/0506070
|
Yuriy Chashkov
|
Ph.D. Yuriy A. Chashkov
|
Data Visualization on Shared Usage Multi-Screen Environment
|
4 pages, 1 figure
| null | null | null |
cs.MM
| null |
The modern multimedia technologies based on the whole palette of hardware and
software facilities of real-time high-speed information processing, in a
combination with effective facilities of the remote access to information
resources, allow us to visualize diverse types of information. Data
visualization facilities – is the face of the Automated Control System on
whom often judge about their efficiency. They take a special place, providing
visualization of the diverse information necessary for decision-making by a
final control link - the person allocated by certain powers.
|
[
{
"version": "v1",
"created": "Thu, 16 Jun 2005 10:15:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chashkov",
"Ph. D. Yuriy A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0506071
|
Yuriy Reznykov
|
Yu. Reznykov
|
Signal transmission on lossy lines as a dissipative quantum state
propagation
|
6 pages, revtex4
| null | null |
BTU LTP-05-06
|
cs.NI
| null |
The transmission of electric signals on a coupled line with distributed
RLC-parameters is considered as a propagation of a dissipative quasi particle.
A calculation technique is developed, alternative to the one, accepted for
lumped lines. The relativistic wave equation for the transient response is
deduced following the common Ohm-low-type considerations. The exact expressions
for the Green function, for information transfer velocity and for time delay
are obtained on this base. The fundamental restrictions on the measurement
accuracy of the time delay are pointed out. The obtained results are naturally
generalized for the multilevel networks of the arbitrary dimension.
|
[
{
"version": "v1",
"created": "Thu, 16 Jun 2005 11:40:54 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Jun 2005 07:28:35 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Jun 2005 09:31:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Reznykov",
"Yu.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0506072
|
Jing Jiang
|
Jing Jiang and Krishna R. Narayanan
|
Performance Analysis of Algebraic Soft Decoding of Reed-Solomon Codes
over Binary Symmetric and Erasure Channels
|
5 pages, 3 figures
| null | null | null |
cs.IT math.IT
| null |
In this paper, we characterize the decoding region of algebraic soft decoding
(ASD) of Reed-Solomon (RS) codes over erasure channels and binary symmetric
channel (BSC). Optimal multiplicity assignment strategies (MAS) are
investigated and tight bounds are derived to show the ASD can significantly
outperform conventional Berlekamp Massey (BM) decoding over these channels for
a wide code rate range. The analysis technique can also be extended to other
channel models, e.g., RS coded modulation over erasure channels.
|
[
{
"version": "v1",
"created": "Fri, 17 Jun 2005 02:20:52 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Jiang",
"Jing",
""
],
[
"Narayanan",
"Krishna R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506073
|
Jing Jiang
|
Jing Jiang and Krishna R. Narayanan
|
Iterative Soft Input Soft Output Decoding of Reed-Solomon Codes by
Adapting the Parity Check Matrix
|
10 pages, 10 figures, final version accepted by IEEE Trans. on
Information Theory
| null | null | null |
cs.IT math.IT
| null |
An iterative algorithm is presented for soft-input-soft-output (SISO)
decoding of Reed-Solomon (RS) codes. The proposed iterative algorithm uses the
sum product algorithm (SPA) in conjunction with a binary parity check matrix of
the RS code. The novelty is in reducing a submatrix of the binary parity check
matrix that corresponds to less reliable bits to a sparse nature before the SPA
is applied at each iteration. The proposed algorithm can be geometrically
interpreted as a two-stage gradient descent with an adaptive potential
function. This adaptive procedure is crucial to the convergence behavior of the
gradient descent algorithm and, therefore, significantly improves the
performance. Simulation results show that the proposed decoding algorithm and
its variations provide significant gain over hard decision decoding (HDD) and
compare favorably with other popular soft decision decoding methods.
|
[
{
"version": "v1",
"created": "Fri, 17 Jun 2005 02:46:09 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Mar 2006 05:46:39 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Jiang",
"Jing",
""
],
[
"Narayanan",
"Krishna R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506074
|
Paolo Liberatore
|
Paolo Liberatore
|
Redundancy in Logic II: 2CNF and Horn Propositional Formulae
|
Corrected figures on Theorem 10; added and modified some references
| null |
10.1016/j.artint.2007.06.003
| null |
cs.AI cs.LO
| null |
We report complexity results about redundancy of formulae in 2CNF form. We
first consider the problem of checking redundancy and show some algorithms that
are slightly better than the trivial one. We then analyze problems related to
finding irredundant equivalent subsets (I.E.S.) of a given set. The concept of
cyclicity proved to be relevant to the complexity of these problems. Some
results about Horn formulae are also shown.
|
[
{
"version": "v1",
"created": "Fri, 17 Jun 2005 19:28:29 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Jun 2005 15:07:15 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Jun 2005 14:16:22 GMT"
}
] | 2021-04-12T00:00:00 |
[
[
"Liberatore",
"Paolo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0506075
|
Lillian Lee
|
Bo Pang and Lillian Lee
|
Seeing stars: Exploiting class relationships for sentiment
categorization with respect to rating scales
|
To appear, Proceedings of ACL 2005
| null | null | null |
cs.CL cs.LG
| null |
We address the rating-inference problem, wherein rather than simply decide
whether a review is "thumbs up" or "thumbs down", as in previous sentiment
analysis work, one must determine an author's evaluation with respect to a
multi-point scale (e.g., one to five "stars"). This task represents an
interesting twist on standard multi-class text categorization because there are
several different degrees of similarity between class labels; for example,
"three stars" is intuitively closer to "four stars" than to "one star". We
first evaluate human performance at the task. Then, we apply a meta-algorithm,
based on a metric labeling formulation of the problem, that alters a given
n-ary classifier's output in an explicit attempt to ensure that similar items
receive similar labels. We show that the meta-algorithm can provide significant
improvements over both multi-class and regression versions of SVMs when we
employ a novel similarity measure appropriate to the problem.
|
[
{
"version": "v1",
"created": "Fri, 17 Jun 2005 20:10:43 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pang",
"Bo",
""
],
[
"Lee",
"Lillian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0506076
|
Wojciech Mazurczyk
|
Wojciech Mazurczyk, Zbigniew Kotulski
|
Alternative security architecture for IP Telephony based on digital
watermarking
|
10 pages, 5 figures
|
Lecture Notes in Computer Science 4166, pp. 170 - 181, Springer,
Heidelberg 2006. ISBN 978-3-540-45762-6
| null | null |
cs.CR cs.MM
| null |
Problems with securing IP Telephony systems, insufficient standardization and
lack of security mechanisms emerged the need for new approaches and solutions.
In this paper a new, alternative security architecture for voice-systems is
presented. It is based on digital watermarking: a new, flexible and powerful
technology that is increasingly gaining more and more attention. Besides known
applications e.g. to solve copyright protection problems, we propose to use
digital watermarking to secure not only transmitted audio but also signaling
protocol that IP Telephony is based on.
|
[
{
"version": "v1",
"created": "Sat, 18 Jun 2005 21:41:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mazurczyk",
"Wojciech",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0506077
|
Kalyanarama Sesha Sayee KCV
|
KCV Kalyanarama Sesha Sayee and Utpal Mukherji
|
Stability of Scheduled Multi-access Communication over Quasi-static Flat
Fading Channels with Random Coding and Independent Decoding
|
5 pages, 1 figure, To be presented at 2005 IEEE International
Symposium on Information Theory, corrected version
| null | null | null |
cs.IT math.IT
| null |
The stability of scheduled multiaccess communication with random coding and
independent decoding of messages is investigated. The number of messages that
may be scheduled for simultaneous transmission is limited to a given maximum
value, and the channels from transmitters to receiver are quasi-static, flat,
and have independent fades. Requests for message transmissions are assumed to
arrive according to an i.i.d. arrival process. Then, we show the following: (1)
in the limit of large message alphabet size, the stability region has an
interference limited information-theoretic capacity interpretation, (2)
state-independent scheduling policies achieve this asymptotic stability region,
and (3) in the asymptotic limit corresponding to immediate access, the
stability region for non-idling scheduling policies is shown to be identical
irrespective of received signal powers.
|
[
{
"version": "v1",
"created": "Mon, 20 Jun 2005 07:51:33 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jul 2005 03:56:00 GMT"
},
{
"version": "v3",
"created": "Tue, 26 Jul 2005 12:04:15 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Sayee",
"KCV Kalyanarama Sesha",
""
],
[
"Mukherji",
"Utpal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506078
|
David Renato Carreta Dominguez
|
David Dominguez, Kostadin Koroutchev, Eduardo Serrano & Francisco B.
Rodriguez
|
Dynamical Neural Network: Information and Topology
|
10pg, 5fig
| null | null | null |
cs.IR cs.NE
| null |
A neural network works as an associative memory device if it has large
storage capacity and the quality of the retrieval is good enough. The learning
and attractor abilities of the network both can be measured by the mutual
information (MI), between patterns and retrieval states. This paper deals with
a search for an optimal topology, of a Hebb network, in the sense of the
maximal MI. We use small-world topology. The connectivity $\gamma$ ranges from
an extremely diluted to the fully connected network; the randomness $\omega$
ranges from purely local to completely random neighbors. It is found that,
while stability implies an optimal $MI(\gamma,\omega)$ at
$\gamma_{opt}(\omega)\to 0$, for the dynamics, the optimal topology holds at
certain $\gamma_{opt}>0$ whenever $0\leq\omega<0.3$.
|
[
{
"version": "v1",
"created": "Mon, 20 Jun 2005 14:54:41 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dominguez",
"David",
""
],
[
"Koroutchev",
"Kostadin",
""
],
[
"Serrano",
"Eduardo",
""
],
[
"Rodriguez",
"Francisco B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0506079
|
Ugo Dal Lago
|
U. Dal Lago and M. Hofmann
|
Quantitative Models and Implicit Complexity
|
29 pages
| null | null | null |
cs.LO cs.CC
| null |
We give new proofs of soundness (all representable functions on base types
lies in certain complexity classes) for Elementary Affine Logic, LFPL (a
language for polytime computation close to realistic functional programming
introduced by one of us), Light Affine Logic and Soft Affine Logic. The proofs
are based on a common semantical framework which is merely instantiated in four
different ways. The framework consists of an innovative modification of
realizability which allows us to use resource-bounded computations as realisers
as opposed to including all Turing computable functions as is usually the case
in realizability constructions. For example, all realisers in the model for
LFPL are polynomially bounded computations whence soundness holds by
construction of the model. The work then lies in being able to interpret all
the required constructs in the model. While being the first entirely semantical
proof of polytime soundness for light logi cs, our proof also provides a
notable simplification of the original already semantical proof of polytime
soundness for LFPL. A new result made possible by the semantic framework is the
addition of polymorphism and a modality to LFPL thus allowing for an internal
definition of inductive datatypes.
|
[
{
"version": "v1",
"created": "Mon, 20 Jun 2005 16:00:10 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Jun 2005 13:20:25 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Oct 2005 15:21:14 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lago",
"U. Dal",
""
],
[
"Hofmann",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0506080
|
Ugo Dal Lago
|
U. Dal Lago
|
The Geometry of Linear Higher-Order Recursion
|
23 pages, extended version of a paper appearing in LICS 2005
proceedings
| null | null | null |
cs.LO cs.CC
| null |
Linearity and ramification constraints have been widely used to weaken
higher-order (primitive) recursion in such a way that the class of
representable functions equals the class of polytime functions. We show that
fine-tuning these two constraints leads to different expressive strengths, some
of them lying well beyond polynomial time. This is done by introducing a new
semantics, called algebraic context semantics. The framework stems from
Gonthier's original work and turns out to be a versatile and powerful tool for
the quantitative analysis of normalization in presence of constants and
higher-order recursion.
|
[
{
"version": "v1",
"created": "Mon, 20 Jun 2005 17:52:02 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Oct 2006 13:22:14 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Lago",
"U. Dal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0506081
|
Gatis Midrijanis
|
Gatis Midrijanis
|
Three lines proof of the lower bound for the matrix rigidity
|
4 pages
| null | null | null |
cs.CC
| null |
The rigidity of a matrix describes the minimal number of entries one has to
change to reduce matrix's rank to r. We give very simple combinatorial proof of
the lower bound for the rigidity of Sylvester (special case of Hadamard) matrix
that matches the best known result by de Wolf(2005) for Hadamard matrices
proved by quantum information theoretical arguments.
|
[
{
"version": "v1",
"created": "Mon, 20 Jun 2005 19:54:48 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Jun 2005 20:12:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Midrijanis",
"Gatis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0506082
|
Lane A. Hemaspaandra
|
Piotr Faliszewski and Lane A. Hemaspaandra
|
Open Questions in the Theory of Semifeasible Computation
| null | null | null |
URCS-TR-2005-872
|
cs.CC
| null |
The study of semifeasible algorithms was initiated by Selman's work a quarter
of century ago [Sel79,Sel81,Sel82]. Informally put, this research stream
studies the power of those sets L for which there is a deterministic (or in
some cases, the function may belong to one of various nondeterministic function
classes) polynomial-time function f such that when at least one of x and y
belongs to L, then f(x,y) \in L \cap \{x,y\}. The intuition here is that it is
saying: ``Regarding membership in L, if you put a gun to my head and forced me
to bet on one of x or y as belonging to L, my money would be on f(x,y).''
In this article, we present a number of open problems from the theory of
semifeasible algorithms. For each we present its background and review what
partial results, if any, are known.
|
[
{
"version": "v1",
"created": "Mon, 20 Jun 2005 22:33:51 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Faliszewski",
"Piotr",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0506083
|
Andrea Montanari
|
Cyril Measson, Andrea Montanari, Ruediger Urbanke
|
Maxwell Construction: The Hidden Bridge between Iterative and Maximum a
Posteriori Decoding
|
29 pages, 77 ps files
| null | null | null |
cs.IT cond-mat.dis-nn math.IT
| null |
There is a fundamental relationship between belief propagation and maximum a
posteriori decoding. A decoding algorithm, which we call the Maxwell decoder,
is introduced and provides a constructive description of this relationship.
Both, the algorithm itself and the analysis of the new decoder are reminiscent
of the Maxwell construction in thermodynamics. This paper investigates in
detail the case of transmission over the binary erasure channel, while the
extension to general binary memoryless channels is discussed in a companion
paper.
|
[
{
"version": "v1",
"created": "Tue, 21 Jun 2005 09:20:19 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Measson",
"Cyril",
""
],
[
"Montanari",
"Andrea",
""
],
[
"Urbanke",
"Ruediger",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506084
|
Jason Holt
|
Jason E. Holt (BYU)
|
The One Page Model Checker
|
12 pages
| null | null | null |
cs.LO
| null |
We show how standard IPC mechanisms can be used with the fork() system call
to perform explicit state model checking on all interleavings of a
multithreaded application. We specifically show how to check for deadlock and
race conditions in programs with two threads. Our techniques are easy to apply
to other languages, and require only the most rudimentary parsing of the target
language. Our fundamental system fits in one page of C code.
|
[
{
"version": "v1",
"created": "Wed, 22 Jun 2005 20:54:08 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Holt",
"Jason E.",
"",
"BYU"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0506085
|
Jason Holt
|
Jason E. Holt (BYU)
|
On the Job Training
|
8 pages, submitted to NIPS 2005
| null | null | null |
cs.LG
| null |
We propose a new framework for building and evaluating machine learning
algorithms. We argue that many real-world problems require an agent which must
quickly learn to respond to demands, yet can continue to perform and respond to
new training throughout its useful life. We give a framework for how such
agents can be built, describe several metrics for evaluating them, and show
that subtle changes in system construction can significantly affect agent
performance.
|
[
{
"version": "v1",
"created": "Wed, 22 Jun 2005 21:21:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Holt",
"Jason E.",
"",
"BYU"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0506086
|
Sudharman K. Jayaweera
|
Sudharman K. Jayaweera
|
Large System Decentralized Detection Performance Under Communication
Constraints
|
3 pages, 2 figures, to be published in IEEE Communication Letters
| null | null | null |
cs.IT math.IT
| null |
The problem of decentralized detection in a sensor network subjected to a
total average power constraint and all nodes sharing a common bandwidth is
investigated. The bandwidth constraint is taken into account by assuming
non-orthogonal communication between sensors and the data fusion center via
direct-sequence code-division multiple-access (DS-CDMA). In the case of large
sensor systems and random spreading, the asymptotic decentralized detection
performance is derived assuming independent and identically distributed (iid)
sensor observations via random matrix theory. The results show that, even under
both power and bandwidth constraints, it is better to combine many not-so-good
local decisions rather than relying on one (or a few) very-good local
decisions.
|
[
{
"version": "v1",
"created": "Wed, 22 Jun 2005 22:30:30 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jayaweera",
"Sudharman K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506087
|
Ryutaroh Matsumoto
|
Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno,
Tomohiko Uyematsu
|
Primal-dual distance bounds of linear codes with application to
cryptography
|
6 pages, using IEEEtran.cls. To appear in IEEE Trans. Inform. Theory,
Sept. 2006. Two authors were added in the revised version
|
IEEE Trans. Inform. Theory, vol. 52, no. 9, pp. 4251-4256, Sept.
2006
|
10.1109/TIT.2006.880050
| null |
cs.IT cs.CR math.IT
| null |
Let $N(d,d^\perp)$ denote the minimum length $n$ of a linear code $C$ with
$d$ and $d^{\bot}$, where $d$ is the minimum Hamming distance of $C$ and
$d^{\bot}$ is the minimum Hamming distance of $C^{\bot}$. In this paper, we
show a lower bound and an upper bound on $N(d,d^\perp)$. Further, for small
values of $d$ and $d^\perp$, we determine $N(d,d^\perp)$ and give a generator
matrix of the optimum linear code. This problem is directly related to the
design method of cryptographic Boolean functions suggested by Kurosawa et al.
|
[
{
"version": "v1",
"created": "Fri, 24 Jun 2005 07:35:51 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jun 2006 08:04:07 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Matsumoto",
"Ryutaroh",
""
],
[
"Kurosawa",
"Kaoru",
""
],
[
"Itoh",
"Toshiya",
""
],
[
"Konno",
"Toshimitsu",
""
],
[
"Uyematsu",
"Tomohiko",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506088
|
Olivier Rioul
|
Olivier Rioul
|
An Alternative to Huffman's Algorithm for Constructing Variable-Length
Codes
|
This paper has been withdrawn
| null | null | null |
cs.IT math.IT
| null |
This paper has been withdrawn by the author.
|
[
{
"version": "v1",
"created": "Fri, 24 Jun 2005 09:53:17 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jan 2007 12:03:47 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Rioul",
"Olivier",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506089
|
Patrick C. McGuire
|
Patrick C. McGuire, Javier Gomez-Elvira, Jose Antonio
Rodriguez-Manfredi, Eduardo Sebastian-Martinez, Jens Ormo, Enrique
Diaz-Martinez, Markus Oesker, Robert Haschke, Joerg Ontrup, Helge Ritter
|
Field geology with a wearable computer: 1st results of the Cyborg
Astrobiologist System
|
accepted by ICINCO 2005, 2nd International Conference on Informatics
in Control, Automation and Robotics, 14-17 September 2005, Barcelona, Spain.
9 pages, 7 figures
|
"Proceedings of the <a
href="http://www.icinco.org">ICINCO</a>'2005 (International Conference on
Informatics in Control, Automation and Robotics)", September 14-17,
Barcelona, Spain, vol. 3, pp. 283-291 (2005).
| null | null |
cs.CV astro-ph cs.AI cs.CE cs.HC cs.RO
| null |
We present results from the first geological field tests of the `Cyborg
Astrobiologist', which is a wearable computer and video camcorder system that
we are using to test and train a computer-vision system towards having some of
the autonomous decision-making capabilities of a field-geologist. The Cyborg
Astrobiologist platform has thus far been used for testing and development of
these algorithms and systems: robotic acquisition of quasi-mosaics of images,
real-time image segmentation, and real-time determination of interesting points
in the image mosaics. This work is more of a test of the whole system, rather
than of any one part of the system. However, beyond the concept of the system
itself, the uncommon map (despite its simplicity) is the main innovative part
of the system. The uncommon map helps to determine interest-points in a
context-free manner. Overall, the hardware and software systems function
reliably, and the computer-vision algorithms are adequate for the first field
tests. In addition to the proof-of-concept aspect of these field tests, the
main result of these field tests is the enumeration of those issues that we can
improve in the future, including: dealing with structural shadow and
microtexture, and also, controlling the camera's zoom lens in an intelligent
manner. Nonetheless, despite these and other technical inadequacies, this
Cyborg Astrobiologist system, consisting of a camera-equipped wearable-computer
and its computer-vision algorithms, has demonstrated its ability of finding
genuinely interesting points in real-time in the geological scenery, and then
gathering more information about these interest points in an automated manner.
We use these capabilities for autonomous guidance towards geological
points-of-interest.
|
[
{
"version": "v1",
"created": "Fri, 24 Jun 2005 10:25:22 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"McGuire",
"Patrick C.",
""
],
[
"Gomez-Elvira",
"Javier",
""
],
[
"Rodriguez-Manfredi",
"Jose Antonio",
""
],
[
"Sebastian-Martinez",
"Eduardo",
""
],
[
"Ormo",
"Jens",
""
],
[
"Diaz-Martinez",
"Enrique",
""
],
[
"Oesker",
"Markus",
""
],
[
"Haschke",
"Robert",
""
],
[
"Ontrup",
"Joerg",
""
],
[
"Ritter",
"Helge",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
null,
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0506090
|
Tobias Riege
|
Tobias Riege, J\"org Rothe
|
An Exact 2.9416^n Algorithm for the Three Domatic Number Problem
|
20 pages, 1 figure
| null | null | null |
cs.CC
| null |
The three domatic number problem asks whether a given undirected graph can be
partitioned into at least three dominating sets, i.e., sets whose closed
neighborhood equals the vertex set of the graph. Since this problem is
NP-complete, no polynomial-time algorithm is known for it. The naive
deterministic algorithm for this problem runs in time 3^n, up to polynomial
factors. In this paper, we design an exact deterministic algorithm for this
problem running in time 2.9416^n. Thus, our algorithm can handle problem
instances of larger size than the naive algorithm in the same amount of time.
We also present another deterministic and a randomized algorithm for this
problem that both have an even better performance for graphs with small maximum
degree.
|
[
{
"version": "v1",
"created": "Fri, 24 Jun 2005 12:58:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Riege",
"Tobias",
""
],
[
"Rothe",
"Jörg",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0506091
|
Oscar Takeshita
|
Oscar Y. Takeshita
|
A New Construction for LDPC Codes using Permutation Polynomials over
Integer Rings
|
12 pages, 4 figures, submitted to IEEE Transactions on Information
Theory
| null | null | null |
cs.IT math.IT
| null |
A new construction is proposed for low density parity check (LDPC) codes
using quadratic permutation polynomials over finite integer rings. The
associated graphs for the new codes have both algebraic and pseudo-random
nature, and the new codes are quasi-cyclic. Graph isomorphisms and
automorphisms are identified and used in an efficient search for good codes.
Graphs with girth as large as 12 were found. Upper bounds on the minimum
Hamming distance are found both analytically and algorithmically. The bounds
indicate that the minimum distance grows with block length. Near-codewords are
one of the causes for error floors in LDPC codes; the new construction provides
a good framework for studying near-codewords in LDPC codes. Nine example codes
are given, and computer simulation results show the excellent error performance
of these codes. Finally, connections are made between this new LDPC
construction and turbo codes using interleavers generated by quadratic
permutation polynomials.
|
[
{
"version": "v1",
"created": "Fri, 24 Jun 2005 15:37:04 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Takeshita",
"Oscar Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506092
|
Simone Alfarano
|
Thomas Lux
|
Emergent Statistical Wealth Distributions in Simple Monetary Exchange
Models: A Critical Review
| null | null | null | null |
cs.MA
| null |
This paper reviews recent attempts at modelling inequality of wealth as an
emergent phenomenon of interacting-agent processes. We point out that recent
models of wealth condensation which draw their inspiration from molecular
dynamics have, in fact, reinvented a process introduced quite some time ago by
Angle (1986) in the sociological literature. We emphasize some problematic
aspects of simple wealth exchange models and contrast them with a monetary
model based on economic principles of market mediated exchange. The paper also
reports new results on the influence of market power on the wealth distribution
in statistical equilibrium. As it turns out, inequality increases but market
power alone is not sufficient for changing the exponential tails of simple
exchange models into Pareto tails.
|
[
{
"version": "v1",
"created": "Fri, 24 Jun 2005 16:46:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lux",
"Thomas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0506093
|
Oscar Takeshita
|
Oscar Y. Takeshita
|
On Maximum Contention-Free Interleavers and Permutation Polynomials over
Integer Rings
|
13 pages, 2 figures, submitted as a correspondence to the IEEE
Transactions on Information Theory, revised version
| null |
10.1109/TIT.2005.864450
| null |
cs.IT math.IT
| null |
An interleaver is a critical component for the channel coding performance of
turbo codes. Algebraic constructions are of particular interest because they
admit analytical designs and simple, practical hardware implementation.
Contention-free interleavers have been recently shown to be suitable for
parallel decoding of turbo codes. In this correspondence, it is shown that
permutation polynomials generate maximum contention-free interleavers, i.e.,
every factor of the interleaver length becomes a possible degree of parallel
processing of the decoder. Further, it is shown by computer simulations that
turbo codes using these interleavers perform very well for the 3rd Generation
Partnership Project (3GPP) standard.
|
[
{
"version": "v1",
"created": "Fri, 24 Jun 2005 20:30:06 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Nov 2005 00:06:31 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Takeshita",
"Oscar Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506094
|
Boris Ryabko
|
Boris Ryabko and Jaakko Astola
|
Universal Codes as a Basis for Nonparametric Testing of Serial
Independence for Time Series
|
accepted for ISIT'05
| null | null | null |
cs.IT math.IT
| null |
We consider a stationary and ergodic source $p$ generated symbols $x_1 ...
x_t$ from some finite set $A$ and a null hypothesis $H_0$ that $p$ is Markovian
source with memory (or connectivity) not larger than $m, (m >= 0).$ The
alternative hypothesis $H_1$ is that the sequence is generated by a stationary
and ergodic source, which differs from the source under $H_0$. In particular,
if $m= 0$ we have the null hypothesis $H_0$ that the sequence is generated by
Bernoully source (or the hypothesis that $x_1 ...x_t$ are independent.) Some
new tests which are based on universal codes and universal predictors, are
suggested.
|
[
{
"version": "v1",
"created": "Sun, 26 Jun 2005 06:06:36 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ryabko",
"Boris",
""
],
[
"Astola",
"Jaakko",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506095
|
Yi-Dong Shen
|
Y. D. Shen, Q. Yang, J. H. You and L. Y. Yuan
|
Deriving a Stationary Dynamic Bayesian Network from a Logic Program with
Recursive Loops
|
29 pages
| null | null | null |
cs.AI cs.LG cs.LO
| null |
Recursive loops in a logic program present a challenging problem to the PLP
framework. On the one hand, they loop forever so that the PLP backward-chaining
inferences would never stop. On the other hand, they generate cyclic
influences, which are disallowed in Bayesian networks. Therefore, in existing
PLP approaches logic programs with recursive loops are considered to be
problematic and thus are excluded. In this paper, we propose an approach that
makes use of recursive loops to build a stationary dynamic Bayesian network.
Our work stems from an observation that recursive loops in a logic program
imply a time sequence and thus can be used to model a stationary dynamic
Bayesian network without using explicit time parameters. We introduce a
Bayesian knowledge base with logic clauses of the form $A \leftarrow
A_1,...,A_l, true, Context, Types$, which naturally represents the knowledge
that the $A_i$s have direct influences on $A$ in the context $Context$ under
the type constraints $Types$. We then use the well-founded model of a logic
program to define the direct influence relation and apply SLG-resolution to
compute the space of random variables together with their parental connections.
We introduce a novel notion of influence clauses, based on which a declarative
semantics for a Bayesian knowledge base is established and algorithms for
building a two-slice dynamic Bayesian network from a logic program are
developed.
|
[
{
"version": "v1",
"created": "Mon, 27 Jun 2005 04:07:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Shen",
"Y. D.",
""
],
[
"Yang",
"Q.",
""
],
[
"You",
"J. H.",
""
],
[
"Yuan",
"L. Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0506096
|
Nicolas Baudru
|
Nicolas Baudru (LIF), R\'emi Morin (LIF)
|
Polynomial Synthesis of Asynchronous Automata
|
The MOdelling and VErification (MOVE) team
| null | null | null |
cs.CC cs.LO
| null |
Zielonka's theorem shows that each regular set of Mazurkiewicz traces can be
implemented as a system of synchronized processes with a distributed control
structure called asynchronous automaton. This paper gives a polynomial
algorithm for the synthesis of a non-deterministic asynchronous automaton from
a regular Mazurkiewicz trace language. This new construction is based on an
unfolding approach that improves the complexity of Zielonka's and Pighizzini's
techniques in terms of the number of states.
|
[
{
"version": "v1",
"created": "Mon, 27 Jun 2005 06:09:37 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Baudru",
"Nicolas",
"",
"LIF"
],
[
"Morin",
"Rémi",
"",
"LIF"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0506097
|
Samuel Thibault
|
Samuel Thibault (INRIA Futurs)
|
A Flexible Thread Scheduler for Hierarchical Multiprocessor Machines
| null | null | null | null |
cs.DC
| null |
With the current trend of multiprocessor machines towards more and more
hierarchical architectures, exploiting the full computational power requires
careful distribution of execution threads and data so as to limit expensive
remote memory accesses. Existing multi-threaded libraries provide only limited
facilities to let applications express distribution indications, so that
programmers end up with explicitly distributing tasks according to the
underlying architecture, which is difficult and not portable. In this article,
we present: (1) a model for dynamically expressing the structure of the
computation; (2) a scheduler interpreting this model so as to make judicious
hierarchical distribution decisions; (3) an implementation within the Marcel
user-level thread library. We experimented our proposal on a scientific
application running on a ccNUMA Bull NovaScale with 16 Intel Itanium II
processors; results show a 30% gain compared to a classical scheduler, and are
similar to what a handmade scheduler achieves in a non-portable way.
|
[
{
"version": "v1",
"created": "Mon, 27 Jun 2005 14:32:50 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Thibault",
"Samuel",
"",
"INRIA Futurs"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0506098
|
Russell Martin
|
Petra Berenbrink, Tom Friedetzky, Leslie Ann Goldberg, Paul Goldberg,
Zengjian Hu, Russell Martin
|
Distributed Selfish Load Balancing
| null | null | null | null |
cs.GT math.OC
| null |
Suppose that a set of $m$ tasks are to be shared as equally as possible
amongst a set of $n$ resources. A game-theoretic mechanism to find a suitable
allocation is to associate each task with a ``selfish agent'', and require each
agent to select a resource, with the cost of a resource being the number of
agents to select it. Agents would then be expected to migrate from overloaded
to underloaded resources, until the allocation becomes balanced.
Recent work has studied the question of how this can take place within a
distributed setting in which agents migrate selfishly without any centralized
control. In this paper we discuss a natural protocol for the agents which
combines the following desirable features: It can be implemented in a strongly
distributed setting, uses no central control, and has good convergence
properties. For $m\gg n$, the system becomes approximately balanced (an
$\epsilon$-Nash equilibrium) in expected time $O(\log\log m)$. We show using a
martingale technique that the process converges to a perfectly balanced
allocation in expected time $O(\log\log m+n^4)$. We also give a lower bound of
$\Omega(\max\{\log\log m,n\})$ for the convergence time.
|
[
{
"version": "v1",
"created": "Mon, 27 Jun 2005 14:54:23 GMT"
},
{
"version": "v2",
"created": "Mon, 22 May 2006 18:04:06 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Apr 2007 15:20:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Berenbrink",
"Petra",
""
],
[
"Friedetzky",
"Tom",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Goldberg",
"Paul",
""
],
[
"Hu",
"Zengjian",
""
],
[
"Martin",
"Russell",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
cs/0506099
|
Yuval Shavitt
|
Yuval Shavitt and Eran Shir
|
DIMES: Let the Internet Measure Itself
|
10 pages, 12 figures
| null | null | null |
cs.NI
| null |
Today's Internet maps, which are all collected from a small number of vantage
points, are falling short of being accurate. We suggest here a paradigm shift
for this task. DIMES is a distributed measurement infrastructure for the
Internet that is based on the deployment of thousands of light weight
measurement agents around the globe.
We describe the rationale behind DIMES deployment, discuss its design
trade-offs and algorithmic challenges, and analyze the structure of the
Internet as it seen with DIMES.
|
[
{
"version": "v1",
"created": "Tue, 28 Jun 2005 20:29:36 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Shavitt",
"Yuval",
""
],
[
"Shir",
"Eran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0506100
|
Satu Elisa Schaeffer
|
Jiri Sima and Satu Elisa Schaeffer
|
On the NP-Completeness of Some Graph Cluster Measures
|
9 pages, no figures
| null | null | null |
cs.CC
| null |
Graph clustering is the problem of identifying sparsely connected dense
subgraphs (clusters) in a given graph. Proposed clustering algorithms usually
optimize various fitness functions that measure the quality of a cluster within
the graph. Examples of such cluster measures include the conductance, the local
and relative densities, and single cluster editing. We prove that the decision
problems associated with the optimization tasks of finding the clusters that
are optimal with respect to these fitness measures are NP-complete.
|
[
{
"version": "v1",
"created": "Wed, 29 Jun 2005 18:12:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Sima",
"Jiri",
""
],
[
"Schaeffer",
"Satu Elisa",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0506101
|
Patrick Haffner
|
Patrick Haffner, Steven Phillips, Rob Schapire
|
Efficient Multiclass Implementations of L1-Regularized Maximum Entropy
|
13 pages, describes new conditional maxent algorithm, to be submitted
| null | null | null |
cs.LG cs.CL
| null |
This paper discusses the application of L1-regularized maximum entropy
modeling or SL1-Max [9] to multiclass categorization problems. A new
modification to the SL1-Max fast sequential learning algorithm is proposed to
handle conditional distributions. Furthermore, unlike most previous studies,
the present research goes beyond a single type of conditional distribution. It
describes and compares a variety of modeling assumptions about the class
distribution (independent or exclusive) and various types of joint or
conditional distributions. It results in a new methodology for combining binary
regularized classifiers to achieve multiclass categorization. In this context,
Maximum Entropy can be considered as a generic and efficient regularized
classification tool that matches or outperforms the state-of-the art
represented by AdaBoost and SVMs.
|
[
{
"version": "v1",
"created": "Wed, 29 Jun 2005 20:26:33 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Haffner",
"Patrick",
""
],
[
"Phillips",
"Steven",
""
],
[
"Schapire",
"Rob",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0506102
|
John B. Little
|
John Little, Ryan Schwarz
|
On $m$-dimensional toric codes
|
17 pages, 4 figures; typos corrected
| null | null | null |
cs.IT math.AC math.AG math.IT
| null |
Toric codes are a class of $m$-dimensional cyclic codes introduced recently
by J. Hansen. They may be defined as evaluation codes obtained from monomials
corresponding to integer lattice points in an integral convex polytope $P
\subseteq \R^m$. As such, they are in a sense a natural extension of
Reed-Solomon codes. Several authors have used intersection theory on toric
surfaces to derive bounds on the minimum distance of some toric codes with $m =
2$. In this paper, we will provide a more elementary approach that applies
equally well to many toric codes for all $m \ge 2$. Our methods are based on a
sort of multivariate generalization of Vandermonde determinants that has also
been used in the study of multivariate polynomial interpolation. We use these
Vandermonde determinants to determine the minimum distance of toric codes from
rectangular polytopes and simplices. We also prove a general result showing
that if there is a unimodular integer affine transformation taking one polytope
$P_1$ to a second polytope $P_2$, then the corresponding toric codes are
monomially equivalent (hence have the same parameters). We use this to begin a
classification of two-dimensional toric codes with small dimension.
|
[
{
"version": "v1",
"created": "Wed, 29 Jun 2005 21:09:37 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jul 2005 14:15:38 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Little",
"John",
""
],
[
"Schwarz",
"Ryan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0506103
|
Aneta Zwierko
|
Aneta Zwierko, Zbigniew Kotulski
|
Security of mobile agents: a new concept of the integrity protection
|
11 pages, 2 figures
| null | null | null |
cs.CR
| null |
The recent developments in the mobile technology (mobile phones, middleware)
created a need for new methods of protecting the code transmitted through the
network. The proposed mechanisms not only secure the compiled program, but also
the data, that can be gathered during its "journey". The oldest and the
simplest methods are more concentrated on integrity of the code itself and on
the detection of unauthorized manipulation. Other, more advanced proposals
protect not only the code but also the execution state and the collected data.
The paper is divided into two parts. The first one is mostly devoted to
different methods of securing the code and protecting its integrity; starting
from watermarking and fingerprinting, up to methods designed specially for
mobile agent systems: encrypted function, cryptographic traces, time limited
black-box security, chained-MAC protocol, publicly-verifiable chained digital
signatures The second part presents new concept for providing mobile agents
with integrity protection, based on a zero-knowledge proof system.
|
[
{
"version": "v1",
"created": "Wed, 29 Jun 2005 22:01:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zwierko",
"Aneta",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0506104
|
Miroslaw Truszczynski
|
Z. Lonc, M. Truszczynski
|
Computing minimal models, stable models and answer sets
|
55 pages, 1 figure. To appear in Theory and Practice of Logic
Programming (TPLP)
| null | null | null |
cs.LO cs.DS
| null |
We propose and study algorithms to compute minimal models, stable models and
answer sets of t-CNF theories, and normal and disjunctive t-programs. We are
especially interested in algorithms with non-trivial worst-case performance
bounds. The bulk of the paper is concerned with the classes of 2- and 3-CNF
theories, and normal and disjunctive 2- and 3-programs, for which we obtain
significantly stronger results than those implied by our general
considerations. We show that one can find all minimal models of 2-CNF theories
and all answer sets of disjunctive 2-programs in time O(m 1.4422..^n). Our main
results concern computing stable models of normal 3-programs, minimal models of
3-CNF theories and answer sets of disjunctive 3-programs. We design algorithms
that run in time O(m 1.6701..^n), in the case of the first problem, and in time
O(mn^2 2.2782..^n), in the case of the latter two. All these bounds improve by
exponential factors the best algorithms known previously. We also obtain
closely related upper bounds on the number of minimal models, stable models and
answer sets a t-CNF theory, a normal t-program or a disjunctive t-program may
have.
To appear in Theory and Practice of Logic Programming (TPLP).
|
[
{
"version": "v1",
"created": "Thu, 30 Jun 2005 01:51:41 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lonc",
"Z.",
""
],
[
"Truszczynski",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0506105
|
Ren-Chiun Wang
|
Ren-Chiun Wang, Chou-Chen Yang, Kun-Ru Mo
|
A protected password change protocol
| null | null | null | null |
cs.CR
| null |
Some protected password change protocols were proposed. However, the previous
protocols were easily vulnerable to several attacks such as denial of service,
password guessing, stolen-verifier and impersonation atacks etc. Recently,
Chang et al. proposed a simple authenticated key agreement and protected
password change protocol for enhancing the security and efficiency. In this
paper, authors shall show that password guessing, denial of service and
known-key attacks can work in their password change protocol. At the same time,
authors shall propose a new password change protocol to withstand all the
threats of security.
|
[
{
"version": "v1",
"created": "Thu, 30 Jun 2005 03:20:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Wang",
"Ren-Chiun",
""
],
[
"Yang",
"Chou-Chen",
""
],
[
"Mo",
"Kun-Ru",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0507001
|
Hirosuke Yamamoto
|
Hideyuki Sakai and Hirosuke Yamamoto
|
Asymptotically Optimal Tree-based Group Key Management Schemes
|
15 pages including 1 figure and 2 tables, submitted to the IEEE
Transactions on Information Theory
| null | null | null |
cs.IT cs.CR math.IT
| null |
In key management schemes that realize secure multicast communications
encrypted by group keys on a public network, tree structures are often used to
update the group keys efficiently. Selcuk and Sidhu have proposed an efficient
scheme which updates dynamically the tree structures based on the withdrawal
probabilities of members. In this paper, it is shown that Selcuk-Sidhu scheme
is asymptotically optimal for the cost of withdrawal. Furthermore, a new key
management scheme, which takes account of key update costs of joining in
addition to withdrawal, is proposed. It is proved that the proposed scheme is
also asymptotically optimal, and it is shown by simulation that it can attain
good performance for nonasymptotic cases.
|
[
{
"version": "v1",
"created": "Fri, 1 Jul 2005 01:07:00 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Sakai",
"Hideyuki",
""
],
[
"Yamamoto",
"Hirosuke",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507002
|
Lifeng Lai
|
Lifeng Lai, Ke Liu, and Hesham El Gamal
|
The Three Node Wireless Network: Achievable Rates and Cooperation
Strategies
|
52 pages
| null | null | null |
cs.IT math.IT
| null |
We consider a wireless network composed of three nodes and limited by the
half-duplex and total power constraints. This formulation encompasses many of
the special cases studied in the literature and allows for capturing the common
features shared by them. Here, we focus on three special cases, namely 1) Relay
Channel, 2) Multicast Channel, and 3) Conference Channel. These special cases
are judicially chosen to reflect varying degrees of complexity while
highlighting the common ground shared by the different variants of the three
node wireless network. For the relay channel, we propose a new cooperation
scheme that exploits the wireless feedback gain. This scheme combines the
benefits of decode-and-forward and compress-and-forward strategies and avoids
the idealistic feedback assumption adopted in earlier works. Our analysis of
the achievable rate of this scheme reveals the diminishing feedback gain at
both the low and high signal-to-noise ratio regimes. Inspired by the proposed
feedback strategy, we identify a greedy cooperation framework applicable to
both the multicast and conference channels. Our performance analysis reveals
several nice properties of the proposed greedy approach and the central role of
cooperative source-channel coding in exploiting the receiver side information
in the wireless network setting. Our proofs for the cooperative multicast with
side-information rely on novel nested and independent binning encoders along
with a list decoder.
|
[
{
"version": "v1",
"created": "Fri, 1 Jul 2005 02:36:13 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Lai",
"Lifeng",
""
],
[
"Liu",
"Ke",
""
],
[
"Gamal",
"Hesham El",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507003
|
Anwar Shiekh Dr.
|
A.Y. Shiekh
|
The role of Quantum Interference in Quantum Computing
|
3 pages, no figures (citation added)
|
Int. Jour. of Theo. Phys., 45, 1653, 2006
|
10.1007/s10773-005-9025-8
| null |
cs.CC quant-ph
| null |
Quantum interference is proposed as a tool to augment Quantum Computation.
|
[
{
"version": "v1",
"created": "Fri, 1 Jul 2005 16:08:23 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Aug 2005 19:47:26 GMT"
},
{
"version": "v3",
"created": "Sun, 11 Dec 2005 17:17:13 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Shiekh",
"A. Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0507004
|
Markus Fidler
|
Markus Fidler
|
An End-to-End Probabilistic Network Calculus with Moment Generating
Functions
| null |
IWQoS 2006
| null | null |
cs.IT cs.PF math.IT
| null |
Network calculus is a min-plus system theory for performance evaluation of
queuing networks. Its elegance stems from intuitive convolution formulas for
concatenation of deterministic servers. Recent research dispenses with the
worst-case assumptions of network calculus to develop a probabilistic
equivalent that benefits from statistical multiplexing. Significant
achievements have been made, owing for example to the theory of effective
bandwidths, however, the outstanding scalability set up by concatenation of
deterministic servers has not been shown.
This paper establishes a concise, probabilistic network calculus with moment
generating functions. The presented work features closed-form, end-to-end,
probabilistic performance bounds that achieve the objective of scaling linearly
in the number of servers in series. The consistent application of moment
generating functions put forth in this paper utilizes independence beyond the
scope of current statistical multiplexing of flows. A relevant additional gain
is demonstrated for tandem servers with independent cross-traffic.
|
[
{
"version": "v1",
"created": "Sun, 3 Jul 2005 20:02:01 GMT"
},
{
"version": "v2",
"created": "Mon, 1 May 2006 18:54:30 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Fidler",
"Markus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507005
|
Sinan Gezici
|
Sinan Gezici, Mung Chiang, H. Vincent Poor and Hisashi Kobayashi
|
A Genetic Algorithm Based Finger Selection Scheme for UWB MMSE Rake
Receivers
|
To appear in the Proc. IEEE International Conference on Ultrawideband
(ICU-2005)
| null |
10.1109/ICU.2005.1569977
| null |
cs.IT math.IT
| null |
Due to a large number of multipath components in a typical ultra wideband
(UWB) system, selective Rake (SRake) receivers, which combine energy from a
subset of multipath components, are commonly employed. In order to optimize
system performance, an optimal selection of multipath components to be employed
at fingers of an SRake receiver needs to be considered. In this paper, this
finger selection problem is investigated for a minimum mean square error (MMSE)
UWB SRake receiver. Since the optimal solution is NP hard, a genetic algorithm
(GA) based iterative scheme is proposed, which can achieve near-optimal
performance after a reasonable number of iterations. Simulation results are
presented to compare the performance of the proposed finger selection algorithm
with those of the conventional and optimal schemes.
|
[
{
"version": "v1",
"created": "Mon, 4 Jul 2005 05:08:37 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Gezici",
"Sinan",
""
],
[
"Chiang",
"Mung",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Kobayashi",
"Hisashi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507006
|
Sinan Gezici
|
Sinan Gezici, Zafer Sahinoglu, Andreas F. Molisch, Hisashi Kobayashi,
and H. Vincent Poor
|
A Two-Step Time of Arrival Estimation Algorithm for Impulse Radio Ultra
Wideband Systems
|
To appear in the Proc. of EUSIPCO 2005, Antalya, Turkey
| null | null | null |
cs.IT math.IT
| null |
High time resolution of ultra wideband (UWB) signals facilitates very precise
positioning capabilities based on time-of-arrival (TOA) measurements. Although
the theoretical lower bound for TOA estimation can be achieved by the maximum
likelihood principle, it is impractical due to the need for extremely high-rate
sampling and the presence of large number of multipath components. On the other
hand, the conventional correlation-based algorithm, which serially searches
possible signal delays, takes a very long time to estimate the TOA of a
received UWB signal. Moreover, the first signal path does not always have the
strongest correlation output. Therefore, first path detection algorithms need
to be considered. In this paper, a data-aided two-step TOA estimation algorithm
is proposed. In order to speed up the estimation process, the first step
estimates the rough TOA of the received signal based on received signal energy.
Then, in the second step, the arrival time of the first signal path is
estimated by considering a hypothesis testing approach. The proposed scheme
uses low-rate correlation outputs, and is able to perform accurate TOA
estimation in reasonable time intervals. The simulation results are presented
to analyze the performance of the estimator.
|
[
{
"version": "v1",
"created": "Mon, 4 Jul 2005 14:32:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gezici",
"Sinan",
""
],
[
"Sahinoglu",
"Zafer",
""
],
[
"Molisch",
"Andreas F.",
""
],
[
"Kobayashi",
"Hisashi",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507007
|
Ulrich Berger
|
Ulrich Berger
|
Strong normalisation for applied lambda calculi
|
14 pages, paper acceptet at electronic journal LMCS
|
Logical Methods in Computer Science, Volume 1, Issue 2 (October 5,
2005) lmcs:2267
|
10.2168/LMCS-1(2:3)2005
| null |
cs.GT
| null |
We consider the untyped lambda calculus with constructors and recursively
defined constants. We construct a domain-theoretic model such that any term not
denoting bottom is strongly normalising provided all its `stratified
approximations' are. From this we derive a general normalisation theorem for
applied typed lambda-calculi: If all constants have a total value, then all
typeable terms are strongly normalising. We apply this result to extensions of
G\"odel's system T and system F extended by various forms of bar recursion for
which strong normalisation was hitherto unknown.
|
[
{
"version": "v1",
"created": "Mon, 4 Jul 2005 18:49:48 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Jul 2005 15:48:53 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Sep 2005 12:57:21 GMT"
},
{
"version": "v4",
"created": "Wed, 28 Sep 2005 10:12:27 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Berger",
"Ulrich",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0507008
|
Craig Alan Feinstein
|
Craig Alan Feinstein
|
Complexity Science for Simpletons
|
10 pages, made a minor correction
|
Progress in Physics, 2006, v. 3, 35-42
| null | null |
cs.CC cs.GL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article, we shall describe some of the most interesting topics in the
subject of Complexity Science for a general audience. Anyone with a solid
foundation in high school mathematics (with some calculus) and an elementary
understanding of computer programming will be able to follow this article.
First, we shall explain the significance of the P versus NP problem and solve
it. Next, we shall describe two other famous mathematics problems, the Collatz
3n+1 Conjecture and the Riemann Hypothesis, and show how both Chaitin's
incompleteness theorem and Wolfram's notion of "computational irreducibility"
are important for understanding why no one has, as of yet, solved these two
problems.
|
[
{
"version": "v1",
"created": "Tue, 5 Jul 2005 17:03:37 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jul 2005 19:09:39 GMT"
},
{
"version": "v3",
"created": "Thu, 21 Jul 2005 17:11:14 GMT"
},
{
"version": "v4",
"created": "Tue, 18 Apr 2006 02:48:39 GMT"
},
{
"version": "v5",
"created": "Fri, 21 Apr 2006 05:17:37 GMT"
},
{
"version": "v6",
"created": "Fri, 3 Feb 2012 19:33:53 GMT"
},
{
"version": "v7",
"created": "Mon, 25 Jun 2012 00:09:32 GMT"
}
] | 2012-06-26T00:00:00 |
[
[
"Feinstein",
"Craig Alan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
cs/0507009
|
Ming Zhao
|
Ming Zhao, Zhigang Chen, Xiaoheng Deng, Lianming Zhang, Anfeng Liu and
Guosheng Huang
|
MAEC : A Movement-Assisted Energy Conserving Method in Event Driven
Wireless Sensor Networks
|
IEEE International Conference on Wireless Communications, Networking
and Mobile Computing, 2005, to appear
| null |
10.1109/TENCON.2005.301075
| null |
cs.NI
| null |
Energy is one of the most important resources in wireless sensor networks.
Recently, the mobility of base station has been exploited to preserve the
energy. But in event driven networks, the mobility issue is quite different
from the continuous monitoring one because only a small portion of sensor node
has data to send at one time. The number of sensor node that forward traffic
should be minimized to prolong the network lifetime. In this paper, we propose
a movement-assisted energy conserving method which tries to reduce the amount
of forwarding sensor node by directing the base station to move close to the
hotspots. This method achieves good performance especially when applied to a
network with a set of cooperative mobile base station. Extensive simulation has
been done to verify the effectiveness of the propose schema.
|
[
{
"version": "v1",
"created": "Tue, 5 Jul 2005 00:59:17 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Zhao",
"Ming",
""
],
[
"Chen",
"Zhigang",
""
],
[
"Deng",
"Xiaoheng",
""
],
[
"Zhang",
"Lianming",
""
],
[
"Liu",
"Anfeng",
""
],
[
"Huang",
"Guosheng",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0507010
|
Jiayang Wang
|
Jiayang Wang
|
A Study for the Feature Core of Dynamic Reduct
|
9 pages
| null | null | null |
cs.AI
| null |
To the reduct problems of decision system, the paper proposes the notion of
dynamic core according to the dynamic reduct model. It describes various formal
definitions of dynamic core, and discusses some properties about dynamic core.
All of these show that dynamic core possesses the essential characters of the
feature core.
|
[
{
"version": "v1",
"created": "Tue, 5 Jul 2005 13:02:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Wang",
"Jiayang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0507011
|
Farhad Meshkati
|
Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz and Narayan B.
Mandayam
|
A Utility-Based Approach to Power Control and Receiver Design in
Wireless Data Networks
|
To appear in the IEEE Transactions on Communications
| null | null | null |
cs.IT math.IT
| null |
In this work, the cross-layer design problem of joint multiuser detection and
power control is studied using a game-theoretic approach. The uplink of a
direct-sequence code division multiple access (DS-CDMA) data network is
considered and a non-cooperative game is proposed in which users in the network
are allowed to choose their uplink receivers as well as their transmit powers
to maximize their own utilities. The utility function measures the number of
reliable bits transmitted by the user per joule of energy consumed. Focusing on
linear receivers, the Nash equilibrium for the proposed game is derived. It is
shown that the equilibrium is one where the powers are SIR-balanced with the
minimum mean square error (MMSE) detector as the receiver. In addition, this
framework is used to study power control games for the matched filter, the
decorrelator, and the MMSE detector; and the receivers' performance is compared
in terms of the utilities achieved at equilibrium (in bits/Joule). The optimal
cooperative solution is also discussed and compared with the non-cooperative
approach. Extensions of the results to the case of multiple receive antennas
are also presented. In addition, an admission control scheme based on
maximizing the total utility in the network is proposed.
|
[
{
"version": "v1",
"created": "Tue, 5 Jul 2005 15:43:12 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Meshkati",
"Farhad",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Schwartz",
"Stuart C.",
""
],
[
"Mandayam",
"Narayan B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507012
|
Adilson Xavier V.
|
Gilson A. Giraldi, Adilson V. Xavier, Antonio L. Apolinario Jr, Paulo
S. Rodrigues
|
Lattice Gas Cellular Automata for Computational Fluid Animation
| null | null | null | null |
cs.GR
| null |
The past two decades showed a rapid growing of physically-based modeling of
fluids for computer graphics applications. In this area, a common top down
approach is to model the fluid dynamics by Navier-Stokes equations and apply a
numerical techniques such as Finite Differences or Finite Elements for the
simulation. In this paper we focus on fluid modeling through Lattice Gas
Cellular Automata (LGCA) for computer graphics applications. LGCA are discrete
models based on point particles that move on a lattice, according to suitable
and simple rules in order to mimic a fully molecular dynamics. By
Chapman-Enskog expansion, a known multiscale technique in this area, it can be
demonstrated that the Navier-Stokes model can be reproduced by the LGCA
technique. Thus, with LGCA we get a fluid model that does not require solution
of complicated equations. Therefore, we combine the advantage of the low
computational cost of LGCA and its ability to mimic the realistic fluid
dynamics to develop a new animating framework for computer graphics
applications. In this work, we discuss the theoretical elements of our proposal
and show experimental results.
|
[
{
"version": "v1",
"created": "Tue, 5 Jul 2005 19:48:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Giraldi",
"Gilson A.",
""
],
[
"Xavier",
"Adilson V.",
""
],
[
"Apolinario",
"Antonio L.",
"Jr"
],
[
"Rodrigues",
"Paulo S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0507013
|
Mirela Damian
|
Justin Colannino, Mirela Damian, Ferran Hurtado, John Iacono, Henk
Meijer, Suneeta Ramaswami and Godfried Toussaint
|
An O(n log n)-Time Algorithm for the Restricted Scaffold Assignment
|
13 pages, 8 figures
| null | null | null |
cs.CG cs.DM
| null |
The assignment problem takes as input two finite point sets S and T and
establishes a correspondence between points in S and points in T, such that
each point in S maps to exactly one point in T, and each point in T maps to at
least one point in S. In this paper we show that this problem has an O(n log
n)-time solution, provided that the points in S and T are restricted to lie on
a line (linear time, if S and T are presorted).
|
[
{
"version": "v1",
"created": "Tue, 5 Jul 2005 19:50:11 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Jul 2005 21:26:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Colannino",
"Justin",
""
],
[
"Damian",
"Mirela",
""
],
[
"Hurtado",
"Ferran",
""
],
[
"Iacono",
"John",
""
],
[
"Meijer",
"Henk",
""
],
[
"Ramaswami",
"Suneeta",
""
],
[
"Toussaint",
"Godfried",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0507014
|
Moshe Schwartz
|
Moshe Schwartz
|
Isomorphism of graphs-a polynomial test
| null | null | null | null |
cs.DS
| null |
An explicit algorithm is presented for testing whether two non-directed
graphs are isomorphic or not. It is shown that for a graph of n vertices, the
number of n independent operations needed for the test is polynomial in n. A
proof that the algorithm actually performs the test is presented.
|
[
{
"version": "v1",
"created": "Wed, 6 Jul 2005 11:35:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schwartz",
"Moshe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0507015
|
Alexander Vardy
|
G\'erard Cohen and Alexander Vardy
|
Duality between Packings and Coverings of the Hamming Space
|
5 pages
| null | null | null |
cs.IT cs.DM math.IT
| null |
We investigate the packing and covering densities of linear and nonlinear
binary codes, and establish a number of duality relationships between the
packing and covering problems. Specifically, we prove that if almost all codes
(in the class of linear or nonlinear codes) are good packings, then only a
vanishing fraction of codes are good coverings, and vice versa: if almost all
codes are good coverings, then at most a vanishing fraction of codes are good
packings. We also show that any specific maximal binary code is either a good
packing or a good covering, in a certain well-defined sense.
|
[
{
"version": "v1",
"created": "Wed, 6 Jul 2005 13:01:43 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Cohen",
"Gérard",
""
],
[
"Vardy",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507016
|
Julien Fondrevelle
|
Julien Fondrevelle (INRIA Lorraine - LORIA), Ammar Oulamara (INRIA
Lorraine - LORIA), Marie-Claude Portmann (INRIA Lorraine - LORIA)
|
Minimizing makespan in flowshop with time lags
|
2 pages. Also available at http://hal.inria.fr/inria-00000149
|
Dans MAPSP'2005 [OAI: oai:hal.inria.fr:inria-00000149_v1]
| null | null |
cs.DM
| null |
We consider the problem of minimizing the makespan in a flowshop involving
maximal and minimal time lags. Time lag constraints generalize the classical
precedence constraints between operations. We assume that such constraints are
only defined between operations of the same job. We propose a solution method
and present several extensions.
|
[
{
"version": "v1",
"created": "Wed, 6 Jul 2005 15:24:55 GMT"
}
] | 2019-05-01T00:00:00 |
[
[
"Fondrevelle",
"Julien",
"",
"INRIA Lorraine - LORIA"
],
[
"Oulamara",
"Ammar",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Portmann",
"Marie-Claude",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0507017
|
Gregory Gutin
|
G. Gutin, A. Rafiey, A. Yeo
|
Minimum Cost and List Homomorphisms to Semicomplete Digraphs
|
8 pages
| null | null | null |
cs.DM
| null |
The following optimization problem was introduced in \cite{gutinDAM}, where
it was motivated by a real-world problem in defence logistics. Suppose we are
given a pair of digraphs $D,H$ and a positive cost $c_i(u)$ for each $u\in
V(D)$ and $i\in V(H)$. The cost of a homomorphism $f$ of $D$ to $H$ is
$\sum_{u\in V(D)}c_{f(u)}(u)$. For a fixed digraph $H$, the minimum cost
homomorphism problem for $H$, MinHOMP($H$), is stated as follows: For an input
digraph $D$ and costs $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$, verify
whether there is a homomorphism of $D$ to $H$ and, if it exists, find such a
homomorphism of minimum cost.
We obtain dichotomy classifications of the computational complexity of the
list homomorphism problem and MinHOMP($H$), when $H$ is a semicomplete digraph
(a digraph in which every two vertices have at least one arc between them). Our
dichotomy for the list homomorphism problem coincides with the one obtained by
Bang-Jensen, Hell and MacGillivray in 1988 for the homomorphism problem when
$H$ is a semicomplete digraph: both problems are polynomial solvable if $H$ has
at most one cycle; otherwise, both problems are NP-complete. The dichotomy for
\MiP is different: the problem is polynomial time solvable if $H$ is acyclic or
$H$ is a cycle of length 2 or 3; otherwise, the problem is NP-hard.
|
[
{
"version": "v1",
"created": "Wed, 6 Jul 2005 18:45:50 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Aug 2005 13:31:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gutin",
"G.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Yeo",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0507018
|
Youngchul Sung
|
Youngchul Sung, Lang Tong and H. Vincent Poor
|
Optimal and Suboptimal Detection of Gaussian Signals in Noise:
Asymptotic Relative Efficiency
|
To appear in the Proceedings of the SPIE Conference on Advanced
Signal Processing Algorithms, Architectures and Implementations XV, San
Diego, CA, Jul. 1 - Aug. 4, 2005
| null |
10.1117/12.620177
| null |
cs.IT math.IT
| null |
The performance of Bayesian detection of Gaussian signals using noisy
observations is investigated via the error exponent for the average error
probability. Under unknown signal correlation structure or limited processing
capability it is reasonable to use the simple quadratic detector that is
optimal in the case of an independent and identically distributed (i.i.d.)
signal. Using the large deviations principle, the performance of this detector
(which is suboptimal for non-i.i.d. signals) is compared with that of the
optimal detector for correlated signals via the asymptotic relative efficiency
defined as the ratio between sample sizes of two detectors required for the
same performance in the large-sample-size regime. The effects of SNR on the ARE
are investigated. It is shown that the asymptotic efficiency of the simple
quadratic detector relative to the optimal detector converges to one as the SNR
increases without bound for any bounded spectrum, and that the simple quadratic
detector performs as well as the optimal detector for a wide range of the
correlation values at high SNR.
|
[
{
"version": "v1",
"created": "Wed, 6 Jul 2005 19:05:09 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Sung",
"Youngchul",
""
],
[
"Tong",
"Lang",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507019
|
Paul M. Aoki
|
Paul M. Aoki and Allison Woodruff
|
Making Space for Stories: Ambiguity in the Design of Personal
Communication Systems
|
10 pages
|
Proc. ACM SIGCHI Conf. on Human Factors in Computing Systems,
Portland, OR, Apr. 2005, 181-190. ACM Press.
|
10.1145/1054972.1054998
| null |
cs.HC
| null |
Pervasive personal communication technologies offer the potential for
important social benefits for individual users, but also the potential for
significant social difficulties and costs. In research on face-to-face social
interaction, ambiguity is often identified as an important resource for
resolving social difficulties. In this paper, we discuss two design cases of
personal communication systems, one based on fieldwork of a commercial system
and another based on an unrealized design concept. The cases illustrate how
user behavior concerning a particular social difficulty, unexplained
unresponsiveness, can be influenced by technological issues that result in
interactional ambiguity. The cases also highlight the need to balance the
utility of ambiguity against the utility of usability and communicative
clarity.
|
[
{
"version": "v1",
"created": "Wed, 6 Jul 2005 21:29:09 GMT"
}
] | 2008-04-18T00:00:00 |
[
[
"Aoki",
"Paul M.",
""
],
[
"Woodruff",
"Allison",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0507020
|
Arnaud Durand
|
Arnaud Durand, Etienne Grandjean
|
First-order queries on structures of bounded degree are computable with
constant delay
|
18 pages, 1 figure
| null | null | null |
cs.LO cs.CC
| null |
A bounded degree structure is either a relational structure all of whose
relations are of bounded degree or a functional structure involving bijective
functions only. In this paper, we revisit the complexity of the evaluation
problem of not necessarily Boolean first-order queries over structures of
bounded degree. Query evaluation is considered here as a dynamical process. We
prove that any query on bounded degree structures is $\constantdelaylin$, i.e.,
can be computed by an algorithm that has two separate parts: it has a
precomputation step of linear time in the size of the structure and then, it
outputs all tuples one by one with a constant (i.e. depending on the size of
the formula only) delay between each. Seen as a global process, this implies
that queries on bounded structures can be evaluated in total time
$O(f(|\phi|).(|\calS|+|\phi(\calS)|))$ and space $O(f(|\phi|).|\calS|)$ where
$\calS$ is the structure, $\phi$ is the formula, $\phi(\calS)$ is the result of
the query and $f$ is some function.
Among other things, our results generalize a result of \cite{Seese-96} on the
data complexity of the model-checking problem for bounded degree structures.
Besides, the originality of our approach compared to that \cite{Seese-96} and
comparable results is that it does not rely on the Hanf's model-theoretic
technic (see \cite{Hanf-65}) and is completely effective.
|
[
{
"version": "v1",
"created": "Thu, 7 Jul 2005 09:40:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Durand",
"Arnaud",
""
],
[
"Grandjean",
"Etienne",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0507021
|
Valmir Barbosa
|
Renato C. Dutra, Valmir C. Barbosa
|
Finding routes in anonymous sensor networks
| null |
Information Processing Letters 98 (2006), 139-144
|
10.1016/j.ipl.2006.01.001
| null |
cs.NI
| null |
We consider networks of anonymous sensors and address the problem of
constructing routes for the delivery of information from a group of sensors in
response to a query by a sink. In order to circumvent the restrictions imposed
by anonymity, we rely on using the power level perceived by the sensors in the
query from the sink. We introduce a simple distributed algorithm to achieve the
building of routes to the sink and evaluate its performance by means of
simulations.
|
[
{
"version": "v1",
"created": "Thu, 7 Jul 2005 16:28:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dutra",
"Renato C.",
""
],
[
"Barbosa",
"Valmir C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0507022
|
{\L}ukasz D\c{e}bowski
|
{\L}ukasz D\c{e}bowski
|
On Hilberg's Law and Its Links with Guiraud's Law
|
To appear in Journal of Quantitative Linguistics
|
Journal of Quantitative Linguistics 13(1):81-109, 2006
|
10.1080/09296170500500637
| null |
cs.CL cs.IT math.IT
| null |
Hilberg (1990) supposed that finite-order excess entropy of a random human
text is proportional to the square root of the text length. Assuming that
Hilberg's hypothesis is true, we derive Guiraud's law, which states that the
number of word types in a text is greater than proportional to the square root
of the text length. Our derivation is based on some mathematical conjecture in
coding theory and on several experiments suggesting that words can be defined
approximately as the nonterminals of the shortest context-free grammar for the
text. Such operational definition of words can be applied even to texts
deprived of spaces, which do not allow for Mandelbrot's ``intermittent
silence'' explanation of Zipf's and Guiraud's laws. In contrast to
Mandelbrot's, our model assumes some probabilistic long-memory effects in human
narration and might be capable of explaining Menzerath's law.
|
[
{
"version": "v1",
"created": "Thu, 7 Jul 2005 18:53:14 GMT"
}
] | 2020-03-11T00:00:00 |
[
[
"Dȩbowski",
"Łukasz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507023
|
Valmir Barbosa
|
Luis O. Rigo Jr., Valmir C. Barbosa
|
Two-dimensional cellular automata and the analysis of correlated time
series
| null |
Pattern Recognition Letters 27 (2006), 1353-1360
|
10.1016/j.patrec.2006.01.005
| null |
cs.AI
| null |
Correlated time series are time series that, by virtue of the underlying
process to which they refer, are expected to influence each other strongly. We
introduce a novel approach to handle such time series, one that models their
interaction as a two-dimensional cellular automaton and therefore allows them
to be treated as a single entity. We apply our approach to the problems of
filling gaps and predicting values in rainfall time series. Computational
results show that the new approach compares favorably to Kalman smoothing and
filtering.
|
[
{
"version": "v1",
"created": "Fri, 8 Jul 2005 12:47:38 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Rigo",
"Luis O.",
"Jr."
],
[
"Barbosa",
"Valmir C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0507024
|
Anne-Marie Vercoustre
|
Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves
Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis), Brigitte Trousse
(INRIA Rocquencourt / INRIA Sophia Antipolis), Anne-Marie Vercoustre (INRIA
Rocquencourt / INRIA Sophia Antipolis)
|
Experiments in Clustering Homogeneous XML Documents to Validate an
Existing Typology
|
(postprint); This version corrects a couple of errors in authors'
names in the bibliography
| null | null | null |
cs.IR
| null |
This paper presents some experiments in clustering homogeneous XMLdocuments
to validate an existing classification or more generally anorganisational
structure. Our approach integrates techniques for extracting knowledge from
documents with unsupervised classification (clustering) of documents. We focus
on the feature selection used for representing documents and its impact on the
emerging classification. We mix the selection of structured features with fine
textual selection based on syntactic characteristics.We illustrate and evaluate
this approach with a collection of Inria activity reports for the year 2003.
The objective is to cluster projects into larger groups (Themes), based on the
keywords or different chapters of these activity reports. We then compare the
results of clustering using different feature selections, with the official
theme structure used by Inria.
|
[
{
"version": "v1",
"created": "Fri, 8 Jul 2005 13:42:42 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Aug 2005 13:52:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Despeyroux",
"Thierry",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Lechevallier",
"Yves",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Trousse",
"Brigitte",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Vercoustre",
"Anne-Marie",
"",
"INRIA\n Rocquencourt / INRIA Sophia Antipolis"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0507025
|
Olivier Cappe
|
Randal Douc (CMAP), Olivier Capp\'e (LTCI), Eric Moulines (LTCI)
|
Comparison of Resampling Schemes for Particle Filtering
| null |
Image and Signal Processing and Analysis, 2005. ISPA 2005.
Proceedings of the 4th International Symposium on (2005) 64-69
| null | null |
cs.CE
| null |
This contribution is devoted to the comparison of various resampling
approaches that have been proposed in the literature on particle filtering. It
is first shown using simple arguments that the so-called residual and
stratified methods do yield an improvement over the basic multinomial
resampling approach. A simple counter-example showing that this property does
not hold true for systematic resampling is given. Finally, some results on the
large-sample behavior of the simple bootstrap filter algorithm are given. In
particular, a central limit theorem is established for the case where
resampling is performed using the residual approach.
|
[
{
"version": "v1",
"created": "Fri, 8 Jul 2005 15:14:51 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Douc",
"Randal",
"",
"CMAP"
],
[
"Cappé",
"Olivier",
"",
"LTCI"
],
[
"Moulines",
"Eric",
"",
"LTCI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0507026
|
Qi Cheng
|
Qi Cheng
|
Hard Problems of Algebraic Geometry Codes
|
13 pages, No figure
| null | null | null |
cs.IT math.IT
| null |
The minimum distance is one of the most important combinatorial
characterizations of a code. The maximum likelihood decoding problem is one of
the most important algorithmic problems of a code. While these problems are
known to be hard for general linear codes, the techniques used to prove their
hardness often rely on the construction of artificial codes. In general, much
less is known about the hardness of the specific classes of natural linear
codes. In this paper, we show that both problems are
NP-hard for algebraic geometry codes. We achieve this by reducing a
well-known NP-complete problem to these problems using a randomized algorithm.
The family of codes in the reductions are based on elliptic curves. They have
positive rates, but the alphabet sizes are exponential in the block lengths.
|
[
{
"version": "v1",
"created": "Fri, 8 Jul 2005 16:22:52 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Cheng",
"Qi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507027
|
Lane A. Hemaspaandra
|
Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg Rothe
|
Anyone but Him: The Complexity of Precluding an Alternative
|
Preliminary version appeared in AAAI '05. Also appears as
URCS-TR-2005-873
| null | null | null |
cs.GT cs.CC cs.MA
| null |
Preference aggregation in a multiagent setting is a central issue in both
human and computer contexts. In this paper, we study in terms of complexity the
vulnerability of preference aggregation to destructive control. That is, we
study the ability of an election's chair to, through such mechanisms as
voter/candidate addition/suppression/partition, ensure that a particular
candidate (equivalently, alternative) does not win. And we study the extent to
which election systems can make it impossible, or computationally costly
(NP-complete), for the chair to execute such control. Among the systems we
study--plurality, Condorcet, and approval voting--we find cases where systems
immune or computationally resistant to a chair choosing the winner nonetheless
are vulnerable to the chair blocking a victory. Beyond that, we see that among
our studied systems no one system offers the best protection against
destructive control. Rather, the choice of a preference aggregation system will
depend closely on which types of control one wishes to be protected against. We
also find concrete cases where the complexity of or susceptibility to control
varies dramatically based on the choice among natural tie-handling rules.
|
[
{
"version": "v1",
"created": "Sat, 9 Jul 2005 18:20:00 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Jul 2005 23:01:02 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Jul 2005 15:20:07 GMT"
},
{
"version": "v4",
"created": "Thu, 16 Mar 2006 16:51:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0507028
|
Robert Milson
|
Robert Milson, Aaron Krowne
|
Adapting CBPP platforms for instructional use
|
Will be presented at the 2005, Emory university symposium on Free
Culture and the Digital Library
| null | null | null |
cs.DL cs.HC
| null |
Commons based peer-production (CBPP) is the de-centralized, net-based
approach to the creation and dissemination of information resources. Underlying
every CBPP system is a virtual community brought together by an internet tool
(such as a web site) and structured by a specific collaboration protocol. In
this talk we will argue that the value of such platforms can be leveraged by
adapting them for pedagogical purposes.
We report on one such recent adaptation. The Noosphere system is a web-based
collaboration environment that underlies the popular Planetmath website, a
collaboratively written encyclopedia of mathematics licensed under the GNU Free
Documentation License (FDL). Recently, the system was used to host a
graduate-level mathematics course at Dalhousie University, in Halifax, Canada.
The course consisted of regular lectures and assignment problems. The students
in the course collaborated on a set of course notes, encapsulating the lecture
content and giving solutions of assigned problems. The successful outcome of
this experiment demonstrated that a dedicated Noosphere system is well suited
for classroom applications. We argue that this ``proof of concept'' experience
also strongly suggests that every successful CBPP platform possesses latent
pedagogical value.
|
[
{
"version": "v1",
"created": "Sun, 10 Jul 2005 19:05:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Milson",
"Robert",
""
],
[
"Krowne",
"Aaron",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0507029
|
Samuel Landau
|
Samuel Landau (INRIA Futurs), Olivier Sigaud (LIP6), Marc Schoenauer
(INRIA Futurs)
|
ATNoSFERES revisited
| null |
Dans Proceedings of the Genetic and Evolutionary Computation
Conference, GECCO-2005 [OAI: oai:hal.inria.fr:inria-00000158_v1] -
http://hal.inria.fr/inria-00000158
| null | null |
cs.AI
| null |
ATNoSFERES is a Pittsburgh style Learning Classifier System (LCS) in which
the rules are represented as edges of an Augmented Transition Network.
Genotypes are strings of tokens of a stack-based language, whose execution
builds the labeled graph. The original ATNoSFERES, using a bitstring to
represent the language tokens, has been favorably compared in previous work to
several Michigan style LCSs architectures in the context of Non Markov
problems. Several modifications of ATNoSFERES are proposed here: the most
important one conceptually being a representational change: each token is now
represented by an integer, hence the genotype is a string of integers; several
other modifications of the underlying grammar language are also proposed. The
resulting ATNoSFERES-II is validated on several standard animat Non Markov
problems, on which it outperforms all previously published results in the LCS
literature. The reasons for these improvement are carefully analyzed, and some
assumptions are proposed on the underlying mechanisms in order to explain these
good results.
|
[
{
"version": "v1",
"created": "Mon, 11 Jul 2005 13:11:25 GMT"
}
] | 2019-05-01T00:00:00 |
[
[
"Landau",
"Samuel",
"",
"INRIA Futurs"
],
[
"Sigaud",
"Olivier",
"",
"LIP6"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Futurs"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0507030
|
G\"unter Rote
|
Imre Barany and Guenter Rote
|
Strictly convex drawings of planar graphs
|
20 pages, 13 figures. to be published in Documenta Mathematica. The
revision includes numerous small additions, corrections, and improvements, in
particular: - a discussion of the constants in the O-notation, after the
statement of thm.1. - a different set-up and clarification of the case
distinction for Lemma 1
|
DOCUMENTA MATHEMATICA, Vol. 11 (2006), 369-391
| null | null |
cs.CG cs.DM
| null |
Every three-connected planar graph with n vertices has a drawing on an O(n^2)
x O(n^2) grid in which all faces are strictly convex polygons. These drawings
are obtained by perturbing (not strictly) convex drawings on O(n) x O(n) grids.
More generally, a strictly convex drawing exists on a grid of size O(W) x
O(n^4/W), for any choice of a parameter W in the range n<W<n^2. Tighter bounds
are obtained when the faces have fewer sides.
In the proof, we derive an explicit lower bound on the number of primitive
vectors in a triangle.
|
[
{
"version": "v1",
"created": "Mon, 11 Jul 2005 20:06:06 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Jun 2006 10:01:37 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Barany",
"Imre",
""
],
[
"Rote",
"Guenter",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0507031
|
Misha Stepanov
|
M. G. Stepanov, M. Chertkov
|
The error-floor of LDPC codes in the Laplacian channel
|
43rd Allerton Conference (September 28-30, 2005, Allerton, IL)
| null | null |
LA-UR-05-5131
|
cs.IT cond-mat.dis-nn math.IT
| null |
We analyze the performance of Low-Density-Parity-Check codes in the
error-floor domain where the Signal-to-Noise-Ratio, s, is large, s >> 1. We
describe how the instanton method of theoretical physics, recently adapted to
coding theory, solves the problem of characterizing the error-floor domain in
the Laplacian channel. An example of the (155,64,20) LDPC code with four
iterations (each iteration consisting of two semi-steps: from bits-to-checks
and from checks-to-bits) of the min-sum decoding is discussed. A generalized
computational tree analysis is devised to explain the rational structure of the
leading instantons. The asymptotic for the symbol Bit-Error-Rate in the
error-floor domain is comprised of individual instanton contributions, each
estimated as ~ \exp(-l_{inst;L} s), where the effective distances, l_{inst;L},
of the the leading instantons are 7.6, 8.0 and 8.0 respectively. (The Hamming
distance of the code is 20.) The analysis shows that the instantons are
distinctly different from the ones found for the same coding/decoding scheme
performing over the Gaussian channel. We validate instanton results against
direct simulations and offer an explanation for remarkable performance of the
instanton approximation not only in the extremal, s -> \infty, limit but also
at the moderate s values of practical interest.
|
[
{
"version": "v1",
"created": "Tue, 12 Jul 2005 02:02:23 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Oct 2005 17:33:02 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Stepanov",
"M. G.",
""
],
[
"Chertkov",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.