id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
cs/0506037
Sriram Narayanaswamy Kizhakkemadam
Sriram N. Kizhakkemadam, Panos Papamichalis, Mandyam Srinath, Dinesh Rajan
Tradeoff Between Source and Channel Coding for Erasure Channels
International Symposium on Information Theory, Adelaide, Sept. 2005(accepted)
null
null
null
cs.IT math.IT
null
In this paper, we investigate the optimal tradeoff between source and channel coding for channels with bit or packet erasure. Upper and Lower bounds on the optimal channel coding rate are computed to achieve minimal end-to-end distortion. The bounds are calculated based on a combination of sphere packing, straight line and expurgated error exponents and also high rate vector quantization theory. By modeling a packet erasure channel in terms of an equivalent bit erasure channel, we obtain bounds on the packet size for a specified limit on the distortion.
[ { "version": "v1", "created": "Fri, 10 Jun 2005 22:49:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Kizhakkemadam", "Sriram N.", "" ], [ "Papamichalis", "Panos", "" ], [ "Srinath", "Mandyam", "" ], [ "Rajan", "Dinesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506038
Wen Ding
Wen Ding & William Yurcik
A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market
16 pages, 2 figures
null
null
null
cs.GT
null
On information security outsourcing market, an important reason that firms do not want to let outside firms(usually called MSSPs-Managed Security Service Providers) to take care of their security need is that they worry about service quality MSSPs provide because they cannot monitor effort of the MSSPs. Since MSSPs action is unobservable to buyers, MSSPs can lower cost by working less hard than required in the contract and get higher profit. In the asymmetric information literature, this possible secret shirking behavior is termed as moral hazard problem. This paper considers a game theoretic economic framework to show that under information asymmetry, an optimal contract can be designed so that MSSPs will stick to their promised effort level. We also show that the optimal contract should be performance-based, i.e., payment to MSSP should base on performance of MSSP's security service period by period. For comparison, we also showed that if the moral hazard problem does not exist, the optimal contract does not depend on MSSP's performance. A contract that specifies constant payment to MSSP will be optimal. Besides these, we show that for no matter under perfect information scenario or imperfect information scenario, the higher the transaction cost is, the lower payment to MSSPs will be.
[ { "version": "v1", "created": "Fri, 10 Jun 2005 23:58:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Ding", "Wen", "" ], [ "Yurcik", "William", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0506039
Heechoon Lee
Weijun Zhu, Heechoon Lee, Daniel Liu and Michael P. Fitz
Antenna array geometry and coding performance
5 pages, 7 figures, ISIT 2005
null
null
null
cs.IT math.IT
null
This paper provides details about experiments in realistic, urban, and frequency flat channels with space-time coding that specifically examines the impact of the number of receive antennas and the design criteria for code selection on the performance. Also the performance characteristics are examined of the coded modulations in the presence of finite size array geometries. This paper gives some insight into which of the theories are most useful in realistic deployments.
[ { "version": "v1", "created": "Sat, 11 Jun 2005 02:38:26 GMT" } ]
2007-07-13T00:00:00
[ [ "Zhu", "Weijun", "" ], [ "Lee", "Heechoon", "" ], [ "Liu", "Daniel", "" ], [ "Fitz", "Michael P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506040
Sheng Bao
Jie Liu, Sheng Bao, Zhiqiang Jing, Shi Chen
A Fixed-Length Coding Algorithm for DNA Sequence Compression
2 pages,2 tables,using Bioinformatics Latex template,no more relationship between us and that magazine
null
null
null
cs.IT math.IT
null
While achieving a compression ratio of 2.0 bits/base, the new algorithm codes non-N bases in fixed length. It dramatically reduces the time of coding and decoding than previous DNA compression algorithms and some universal compression programs.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 08:49:07 GMT" } ]
2007-07-16T00:00:00
[ [ "Liu", "Jie", "" ], [ "Bao", "Sheng", "" ], [ "Jing", "Zhiqiang", "" ], [ "Chen", "Shi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506041
Vladimir Vovk
Vladimir Vovk
Competitive on-line learning with a convex loss function
26 pages
null
null
null
cs.LG cs.AI
null
We consider the problem of sequential decision making under uncertainty in which the loss caused by a decision depends on the following binary observation. In competitive on-line learning, the goal is to design decision algorithms that are almost as good as the best decision rules in a wide benchmark class, without making any assumptions about the way the observations are generated. However, standard algorithms in this area can only deal with finite-dimensional (often countable) benchmark classes. In this paper we give similar results for decision rules ranging over an arbitrary reproducing kernel Hilbert space. For example, it is shown that for a wide class of loss functions (including the standard square, absolute, and log loss functions) the average loss of the master algorithm, over the first $N$ observations, does not exceed the average loss of the best decision rule with a bounded norm plus $O(N^{-1/2})$. Our proof technique is very different from the standard ones and is based on recent results about defensive forecasting. Given the probabilities produced by a defensive forecasting algorithm, which are known to be well calibrated and to have good resolution in the long run, we use the expected loss minimization principle to find a suitable decision.
[ { "version": "v1", "created": "Sat, 11 Jun 2005 18:11:22 GMT" }, { "version": "v2", "created": "Wed, 27 Jul 2005 16:49:33 GMT" }, { "version": "v3", "created": "Fri, 2 Sep 2005 14:27:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0506042
Deepak Sridhara
Deepak Sridhara, Christine Kelley, and Joachim Rosenthal
Tree-Based Construction of LDPC Codes
5 pages, 12 figures. To appear in the Proceedings of IEEE International Symposium on Information Theory, Sept. 4-9, 2005, Adelaide, Australia
null
10.1109/ISIT.2005.1523456
null
cs.IT math.IT
null
We present a construction of LDPC codes that have minimum pseudocodeword weight equal to the minimum distance, and perform well with iterative decoding. The construction involves enumerating a d-regular tree for a fixed number of layers and employing a connection algorithm based on mutually orthogonal Latin squares to close the tree. Methods are presented for degrees d=p^s and d = p^s+1, for p a prime, -- one of which includes the well-known finite-geometry-based LDPC codes.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 09:00:09 GMT" } ]
2016-11-17T00:00:00
[ [ "Sridhara", "Deepak", "" ], [ "Kelley", "Christine", "" ], [ "Rosenthal", "Joachim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506043
Kapil Bhattad
Krishna R. Narayanan and Kapil Bhattad
A Decision Feedback Based Scheme for Slepian-Wolf Coding of sources with Hidden Markov Correlation
Submitted to IEEE Comm. Letters
null
10.1109/LCOMM.2006.1633329
null
cs.IT math.IT
null
We consider the problem of compression of two memoryless binary sources, the correlation between which is defined by a Hidden Markov Model (HMM). We propose a Decision Feedback (DF) based scheme which when used with low density parity check codes results in compression close to the Slepian Wolf limits.
[ { "version": "v1", "created": "Mon, 13 Jun 2005 13:17:21 GMT" } ]
2016-11-17T00:00:00
[ [ "Narayanan", "Krishna R.", "" ], [ "Bhattad", "Kapil", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506044
Kapil Bhattad
Kapil Bhattad, Niranjan Ratnakar, Ralf Koetter, and Krishna R. Narayanan
Minimal Network Coding for Multicast
accepted for publication at ISIT 2005
null
null
null
cs.IT math.IT
null
We give an information flow interpretation for multicasting using network coding. This generalizes the fluid model used to represent flows to a single receiver. Using the generalized model, we present a decentralized algorithm to minimize the number of packets that undergo network coding. We also propose a decentralized algorithm to construct capacity achieving multicast codes when the processing at some nodes is restricted to routing. The proposed algorithms can be coupled with existing decentralized schemes to achieve minimum cost muticast.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 15:20:05 GMT" } ]
2007-07-13T00:00:00
[ [ "Bhattad", "Kapil", "" ], [ "Ratnakar", "Niranjan", "" ], [ "Koetter", "Ralf", "" ], [ "Narayanan", "Krishna R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506045
Kapil Bhattad
Krishna R. Narayanan and Kapil Bhattad
Decision Feedback Based Scheme for Slepian-Wolf Coding of sources with Hidden Markov Correlation
Submitted to IEEE Comm. Letters
null
10.1109/LCOMM.2006.1633329
null
cs.IT math.IT
null
We consider the problem of compression of two memoryless binary sources, the correlation between which is defined by a Hidden Markov Model (HMM). We propose a Decision Feedback (DF) based scheme which when used with low density parity check codes results in compression close to the Slepian Wolf limits.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 15:18:07 GMT" } ]
2016-11-17T00:00:00
[ [ "Narayanan", "Krishna R.", "" ], [ "Bhattad", "Kapil", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506046
Bernard Jacquemin
Bernard Jacquemin (ISC)
Dictionaries merger for text expansion in question answering
4 pp
Proceedings of COLING 2004 (2004) 1398
null
null
cs.DL
null
This paper presents an original way to add new data in a reference dictionary from several other lexical resources, without loosing any consistence. This operation is carried in order to get lexical information classified by the sense of the entry. This classification makes it possible to enrich utterances (in QA: the queries) following the meaning, and to reduce noise. An analysis of the experienced problems shows the interest of this method, and insists on the points that have to be tackled.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 16:36:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacquemin", "Bernard", "", "ISC" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0506047
Bernard Jacquemin
Bernard Jacquemin (ISC)
Analyse et expansion des textes en question-r\'{e}ponse
11 pp
Le poids des mots. Actes des 7es journ\'{e}es internationales d'Analyse statistique des Donn\'{e}es Textuelles (2004) 1219
null
null
cs.IR
null
This paper presents an original methodology to consider question answering. We noticed that query expansion is often incorrect because of a bad understanding of the question. But the automatic good understanding of an utterance is linked to the context length, and the question are often short. This methodology proposes to analyse the documents and to construct an informative structure from the results of the analysis and from a semantic text expansion. The linguistic analysis identifies words (tokenization and morphological analysis), links between words (syntactic analysis) and word sense (semantic disambiguation). The text expansion adds to each word the synonyms matching its sense and replaces the words in the utterances by derivatives, modifying the syntactic schema if necessary. In this way, whatever enrichment may be, the text keeps the same meaning, but each piece of information matches many realisations. The questioning method consists in constructing a local informative structure without enrichment, and matches it with the documentary structure. If a sentence in the informative structure matches the question structure, this sentence is the answer to the question.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 16:39:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacquemin", "Bernard", "", "ISC" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0506048
Bernard Jacquemin
Bernard Jacquemin (ISC), Caroline Brun, Claude Roux
Enriching a Text by Semantic Disambiguation for Information Extraction
7 pp
LREC 2002 Workshop Proceedings "Using semantics for informaiton retrival and filtering" (2002) 45-51
null
null
cs.IR
null
External linguistic resources have been used for a very long time in information extraction. These methods enrich a document with data that are semantically equivalent, in order to improve recall. For instance, some of these methods use synonym dictionaries. These dictionaries enrich a sentence with words that have a similar meaning. However, these methods present some serious drawbacks, since words are usually synonyms only in restricted contexts. The method we propose here consists of using word sense disambiguation rules (WSD) to restrict the selection of synonyms to only these that match a specific syntactico-semantic context. We show how WSD rules are built and how information extraction techniques can benefit from the application of these rules.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 16:44:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacquemin", "Bernard", "", "ISC" ], [ "Brun", "Caroline", "" ], [ "Roux", "Claude", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0506049
Bernard Jacquemin
Caroline Brun (XRCE), Bernard Jacquemin (ISC, XRCE), Fr\'ed\'erique Segond (XRCE)
Exploitation de dictionnaires \'{e}lectroniques pour la d\'{e}sambigu\"{i}sation s\'{e}mantique lexicale
25 pp
Traitement Automatique des Langues (TAL) 42, no. 3 (2001) pp. 667-690
null
null
cs.DL
null
This paper presents a lexical disambiguation system, initially developed for English and now adapted to French. This system associates a word with its meaning in a given context using electronic dictionaries as semantically annotated corpora in order to extract semantic disambiguation rules. We describe the rule extraction and application process as well as the evaluation of the system. The results for French give us insight information on some possible improvments of the nature and content of lexical resources adapted for disambiguation in this framework.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 16:48:33 GMT" } ]
2016-08-16T00:00:00
[ [ "Brun", "Caroline", "", "XRCE" ], [ "Jacquemin", "Bernard", "", "ISC, XRCE" ], [ "Segond", "Frédérique", "", "XRCE" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0506050
Alex Wiesmaier
A. Wiesmaier, V. Karatsiolis, M. Lippert, J. Buchmann
The Workshop - Implementing Well Structured Enterprise Applications
7 pages (ieee), 1 figure, accepted for SERP'05
Proceedings of "The 2005 International Conference on Software Engineering Research and Practice"; June 2005
null
null
cs.SE
null
We specify an abstraction layer to be used between an enterprise application and the utilized enterprise framework (like J2EE or .NET). This specification is called the Workshop. It provides an intuitive metaphor supporting the programmer in designing easy understandable code. We present an implementation of this specification. It is based upon the J2EE framework and is called the JWorkshop. As a proof of concept we implement a special certification authority called the Key Authority based upon the JWorkshop. The mentioned certification authority runs very successfully in a variety of different real world projects.
[ { "version": "v1", "created": "Mon, 13 Jun 2005 13:25:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Wiesmaier", "A.", "" ], [ "Karatsiolis", "V.", "" ], [ "Lippert", "M.", "" ], [ "Buchmann", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0506051
Heiko Herrmann
Heiko Herrmann, Gunnar Rueckner
Comparison of two different implementations of a finite-difference-method for first-order pde in mathematica and matlab
LaTeX, 6 pages, 9 eps-figures, v2: minor additions/corrections
null
null
null
cs.CE cs.DM
null
In this article two implementations of a symmetric finite difference algorithm for a first-order partial differential equation are discussed. The considered partial differential equation discribes the time evolution of the crack length distribution of microcracks in brittle materia.
[ { "version": "v1", "created": "Mon, 13 Jun 2005 15:26:16 GMT" }, { "version": "v2", "created": "Fri, 11 Nov 2005 10:25:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Herrmann", "Heiko", "" ], [ "Rueckner", "Gunnar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0506052
Vignesh Sethuraman
Vignesh Sethuraman, Bruce Hajek
Comments on `Bit Interleaved Coded Modulation'
This is the version after review (shorter, better etc)
null
null
null
cs.IT math.IT
null
Caire, Taricco and Biglieri presented a detailed analysis of bit interleaved coded modulation, a simple and popular technique used to improve system performance, especially in the context of fading channels. They derived an upper bound to the probability of error, called the expurgated bound. In this correspondence, the proof of the expurgated bound is shown to be flawed. A new upper bound is also derived. It is not known whether the original expurgated bound is valid for the important special case of square QAM with Gray labeling, but the new bound is very close to, and slightly tighter than, the original bound for a numerical example.
[ { "version": "v1", "created": "Mon, 13 Jun 2005 16:38:01 GMT" }, { "version": "v2", "created": "Tue, 22 Nov 2005 18:14:39 GMT" } ]
2007-07-13T00:00:00
[ [ "Sethuraman", "Vignesh", "" ], [ "Hajek", "Bruce", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506053
Hongyuan Zhang
Hongyuan Zhang, Huaiyu Dai, Quan Zhou, Brian L. Hughes
Analysis on Transmit Antenna Selection for Spatial Multiplexing Systems: A Geometrical Approach
28 Pages, Submitted IEEE Trans. Info. Theory
null
null
null
cs.IT math.IT
null
Recently, the remarkable potential of a multiple-input multiple-output (MIMO) wireless communication system was unveiled for its ability to provide spatial diversity or multiplexing gains. For MIMO diversity schemes, it is already known that. by the optimal antenna selection maximizing the post-processing signal-to-noise ratio, the diversity order of the full system can be maintained. On the other hand, the diversity order achieved by antenna selection in spatial multiplexing systems, especially those exploiting practical coding and decoding schemes, has not been rigorously analyzed thus far. In this paper, from a geometric standpoint, we propose a new framework for theoretically analyzing the diversity order achieved by transmit antenna selection for separately encoded spatial multiplexing systems with linear and decision-feedback receivers. We rigorously show that a diversity order of (Nt-1)(Nr-1) can be achieved for an Nr by Nt SM system when L=2 antennas are selected from the transmit side; while for L>2 scenarios, we give bounds for the achievable diversity order and show that the optimal diversity order is at least (Nt-L+1)(Nr-L+1) . Furthermore, the same geometrical approach can be used to evaluate the diversity-multiplexing tradeoff curves for the considered spatial multiplexing systems with transmit antenna selection.
[ { "version": "v1", "created": "Mon, 13 Jun 2005 16:45:37 GMT" } ]
2007-07-13T00:00:00
[ [ "Zhang", "Hongyuan", "" ], [ "Dai", "Huaiyu", "" ], [ "Zhou", "Quan", "" ], [ "Hughes", "Brian L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506054
Ramesh Johari
Ramesh Johari (Stanford University), Shie Mannor (McGill University), John N. Tsitsiklis (MIT)
Efficiency Loss in a Network Resource Allocation Game: The Case of Elastic Supply
Originally Laboratory for Information and Decision Systems (MIT) Publication 2605
null
null
null
cs.GT
null
We consider a resource allocation problem where individual users wish to send data across a network to maximize their utility, and a cost is incurred at each link that depends on the total rate sent through the link. It is known that as long as users do not anticipate the effect of their actions on prices, a simple proportional pricing mechanism can maximize the sum of users' utilities minus the cost (called aggregate surplus). Continuing previous efforts to quantify the effects of selfish behavior in network pricing mechanisms, we consider the possibility that users anticipate the effect of their actions on link prices. Under the assumption that the links' marginal cost functions are convex, we establish existence of a Nash equilibrium. We show that the aggregate surplus at a Nash equilibrium is no worse than a factor of 4*sqrt{2} - 5 times the optimal aggregate surplus; thus, the efficiency loss when users are selfish is no more than approximately 34%.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 02:11:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Johari", "Ramesh", "", "Stanford University" ], [ "Mannor", "Shie", "", "McGill University" ], [ "Tsitsiklis", "John N.", "", "MIT" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0506055
Lane A. Hemaspaandra
Edith Hemaspaandra, Lane A. Hemaspaandra, Osamu Watanabe
The Complexity of Kings
null
null
null
URCS-TR-2005-870
cs.CC cs.DM
null
A king in a directed graph is a node from which each node in the graph can be reached via paths of length at most two. There is a broad literature on tournaments (completely oriented digraphs), and it has been known for more than half a century that all tournaments have at least one king [Lan53]. Recently, kings have proven useful in theoretical computer science, in particular in the study of the complexity of the semifeasible sets [HNP98,HT05] and in the study of the complexity of reachability problems [Tan01,NT02]. In this paper, we study the complexity of recognizing kings. For each succinctly specified family of tournaments, the king problem is known to belong to $\Pi_2^p$ [HOZZ]. We prove that this bound is optimal: We construct a succinctly specified tournament family whose king problem is $\Pi_2^p$-complete. It follows easily from our proof approach that the problem of testing kingship in succinctly specified graphs (which need not be tournaments) is $\Pi_2^p$-complete. We also obtain $\Pi_2^p$-completeness results for k-kings in succinctly specified j-partite tournaments, $k,j \geq 2$, and we generalize our main construction to show that $\Pi_2^p$-completeness holds for testing k-kingship in succinctly specified families of tournaments for all $k \geq 2$.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 02:31:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Watanabe", "Osamu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0506056
Travis Gagie
Travis Gagie
Large Alphabets and Incompressibility
null
null
10.1016/j.ipl.2006.04.008
null
cs.IT math.IT
null
We briefly survey some concepts related to empirical entropy -- normal numbers, de Bruijn sequences and Markov processes -- and investigate how well it approximates Kolmogorov complexity. Our results suggest $\ell$th-order empirical entropy stops being a reasonable complexity metric for almost all strings of length $m$ over alphabets of size $n$ about when $n^\ell$ surpasses $m$.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 03:08:57 GMT" }, { "version": "v2", "created": "Tue, 21 Feb 2006 16:27:45 GMT" }, { "version": "v3", "created": "Thu, 9 Mar 2006 19:00:02 GMT" } ]
2007-07-16T00:00:00
[ [ "Gagie", "Travis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506057
Victor Kromer
Kromer Victor
About one 3-parameter Model of Testing
9 pages; in Russian; Paper with changed content
null
null
null
cs.LG
null
This article offers a 3-parameter model of testing, with 1) the difference between the ability level of the examinee and item difficulty; 2) the examinee discrimination and 3) the item discrimination as model parameters.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 04:00:38 GMT" }, { "version": "v2", "created": "Thu, 21 Jul 2005 02:43:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Victor", "Kromer", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0506058
Kapil Bhattad
Kapil Bhattad and Krishna Narayanan
An MSE Based Ttransfer Chart to Analyze Iterative Decoding Schemes
null
null
null
null
cs.IT math.IT
null
An alternative to extrinsic information transfer (EXIT) charts called mean squared error (MSE) charts that use a measure related to the MSE instead of mutual information is proposed. Using the relationship between mutual information and minimum mean squared error (MMSE), a relationship between the rate of any code and the area under a plot of MSE versus signal to noise ratio (SNR) is obtained, when the log likelihood ratios (LLR) can be assumed to be from a Gaussian channel. Using this result, a theoretical justification is provided for designing concatenated codes by matching the EXIT charts of the inner and outer decoders, when the LLRs are Gaussian which is typically assumed for code design using EXIT charts. Finally, for the special case of AWGN channel it is shown that any capacity achieving code has an EXIT curve that is flat. This extends Ashikhmin et als results for erasure channels to the Gaussian channel.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 07:56:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Bhattad", "Kapil", "" ], [ "Narayanan", "Krishna", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506059
Hubie Chen
Hubie Chen
Existentially Restricted Quantified Constraint Satisfaction
null
null
null
null
cs.CC cs.LO
null
The quantified constraint satisfaction problem (QCSP) is a powerful framework for modelling computational problems. The general intractability of the QCSP has motivated the pursuit of restricted cases that avoid its maximal complexity. In this paper, we introduce and study a new model for investigating QCSP complexity in which the types of constraints given by the existentially quantified variables, is restricted. Our primary technical contribution is the development and application of a general technology for proving positive results on parameterizations of the model, of inclusion in the complexity class coNP.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 11:57:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hubie", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0506060
Yong Luo
Yong Luo
Yet another normalisation proof for Martin-Lof's logical framework--Terms with correct arities are strongly normalising
19 pages
null
null
null
cs.LO
null
In this paper, we prove the strong normalisation for Martin-L\"{o}f's Logical Framework, and suggest that {}``correct arity'', a condition weaker than well-typedness, will also guarantee the strong normalisation.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 12:13:22 GMT" }, { "version": "v2", "created": "Wed, 15 Jun 2005 16:56:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Luo", "Yong", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0506061
Daniele Gorla
Daniele Gorla, Matthew Hennessy and Vladimiro Sassone
Security Policies as Membranes in Systems for Global Computing
23 pages; to appear in Logical Methods in Computer Science
Logical Methods in Computer Science, Volume 1, Issue 3 (December 20, 2005) lmcs:2262
10.2168/LMCS-1(3:2)2005
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a simple global computing framework, whose main concern is code migration. Systems are structured in sites, and each site is divided into two parts: a computing body, and a membrane, which regulates the interactions between the computing body and the external environment. More precisely, membranes are filters which control access to the associated site, and they also rely on the well-established notion of trust between sites. We develop a basic theory to express and enforce security policies via membranes. Initially, these only control the actions incoming agents intend to perform locally. We then adapt the basic theory to encompass more sophisticated policies, where the number of actions an agent wants to perform, and also their order, are considered.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 18:08:10 GMT" }, { "version": "v2", "created": "Tue, 20 Dec 2005 15:09:21 GMT" }, { "version": "v3", "created": "Wed, 26 Jul 2006 17:15:10 GMT" }, { "version": "v4", "created": "Thu, 27 Jul 2006 07:25:51 GMT" }, { "version": "v5", "created": "Tue, 7 Oct 2008 09:58:55 GMT" } ]
2017-01-11T00:00:00
[ [ "Gorla", "Daniele", "" ], [ "Hennessy", "Matthew", "" ], [ "Sassone", "Vladimiro", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0506062
Yoshiyuki Kabashima
Yoshiyuki Kabashima
A CDMA multiuser detection algorithm based on survey propagation
Abstract for my presentation at Randomness and Computation Joint Workshop ``New Horizons in Computing'' and ``Statistical Mechanical Approach to Probabilistic Information Processing'' (18-21 July, 2005, Sendai, Japan)
null
null
null
cs.IT math.IT
null
A computationally tractable CDMA multiuser detection algorithm is developed based on survey propagation.
[ { "version": "v1", "created": "Wed, 15 Jun 2005 01:40:57 GMT" }, { "version": "v2", "created": "Thu, 16 Jun 2005 01:32:47 GMT" }, { "version": "v3", "created": "Fri, 15 Jul 2005 02:18:27 GMT" }, { "version": "v4", "created": "Sat, 23 Jul 2005 16:35:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Kabashima", "Yoshiyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506063
Slawomir Staworko
Slawomir Staworko and Jan Chomicki
Priority-Based Conflict Resolution in Inconsistent Relational Databases
null
null
null
UB CSE Technical Report 2005-11
cs.DB
null
We study here the impact of priorities on conflict resolution in inconsistent relational databases. We extend the framework of repairs and consistent query answers. We propose a set of postulates that an extended framework should satisfy and consider two instantiations of the framework: (locally preferred) l-repairs and (globally preferred) g-repairs. We study the relationships between them and the impact each notion of repair has on the computational complexity of repair checking and consistent query answers.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 23:10:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Staworko", "Slawomir", "" ], [ "Chomicki", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0506064
Mitsugu Iwamoto
Mitsugu Iwamoto, Hirosuke Yamamoto, Hirohisa Ogawa
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures
null
null
null
null
cs.CR cs.IT math.IT
null
It is known that for any general access structure, a secret sharing scheme (SSS) can be constructed from an (m,m)-threshold scheme by using the so-called cumulative map or from a (t,m)-threshold SSS by a modified cumulative map. However, such constructed SSSs are not efficient generally. In this paper, we propose a new method to construct a SSS from a $(t,m)$-threshold scheme for any given general access structure. In the proposed method, integer programming is used to distribute optimally the shares of (t,m)-threshold scheme to each participant of the general access structure. From the optimality, it can always attain lower coding rate than the cumulative maps except the cases that they give the optimal distribution. The same method is also applied to construct SSSs for incomplete access structures and/or ramp access structures.
[ { "version": "v1", "created": "Wed, 15 Jun 2005 06:07:42 GMT" } ]
2007-07-13T00:00:00
[ [ "Iwamoto", "Mitsugu", "" ], [ "Yamamoto", "Hirosuke", "" ], [ "Ogawa", "Hirohisa", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506065
Mitsugu Iwamoto
Mitsugu Iwamoto, Hirosuke Yamamoto
Strongly secure ramp secret sharing schemes for general access structures
null
null
null
null
cs.CR cs.IT math.IT
null
Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly even in the case where some information about the secret leaks from a non-qualified set of shares, and hence, they are more desirable than weak ramp SS schemes. However, it is not known how to construct the strong ramp SS schemes in the case of general access structures. In this paper, it is shown that a strong ramp SS scheme can always be constructed from a SS scheme with plural secrets for any feasible general access structure. As a byproduct, it is pointed out that threshold ramp SS schemes based on Shamir's polynomial interpolation method are {\em not} always strong.
[ { "version": "v1", "created": "Wed, 15 Jun 2005 06:36:17 GMT" } ]
2016-08-31T00:00:00
[ [ "Iwamoto", "Mitsugu", "" ], [ "Yamamoto", "Hirosuke", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506066
Yoo Chung
Yoo Chung and Dongman Lee
Impersonation with the Echo Protocol
submitted to ACM Workshop on Wireless Security (2005)
null
null
null
cs.CR cs.NI
null
The Echo protocol tries to do secure location verification using physical limits imposed by the speeds of light and sound. While the protocol is able to guarantee that a certain object is within a certain region, it cannot ensure the authenticity of further messages from the object without using cryptography. This paper describes an impersonation attack against the protocol based on this weakness. It also describes a couple of approaches which can be used to defend against the attack.
[ { "version": "v1", "created": "Wed, 15 Jun 2005 10:57:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Chung", "Yoo", "" ], [ "Lee", "Dongman", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0506067
Juan Jose Amor
Juan Jose Amor, Gregorio Robles, Jesus Gonzalez-Barahona
Measuring Woody: The Size of Debian 3.0
null
null
null
null
cs.SE
null
Debian is possibly the largest free software distribution, with well over 4,500 source packages in the latest stable release (Debian 3.0) and more than 8,000 source packages in the release currently in preparation. However, we wish to know what these numbers mean. In this paper, we use David A. Wheeler's SLOCCount system to determine the number of physical source lines of code (SLOC) of Debian 3.0 (aka woody). We show that Debian 3.0 includes more than 105,000,000 physical SLOC (almost twice than Red Hat 9, released about 8 months later), showing that the Debian development model (based on the work of a large group of voluntary developers spread around the world) is at least as capable as other development methods (like the more centralized one, based on the work of employees, used by Red Hat or Microsoft) to manage distributions of this size. It is also shown that if Debian had been developed using traditional proprietary methods, the COCOMO model estimates that its cost would be close to $6.1 billion USD to develop Debian 3.0. In addition, we offer both an analysis of the programming languages used in the distribution (C amounts for about 65%, C++ for about 12%, Shell for about 8% and LISP is around 4%, with many others to follow), and the largest packages (The Linux kernel, Mozilla, XFree86, PM3, etc.)
[ { "version": "v1", "created": "Wed, 15 Jun 2005 21:48:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Amor", "Juan Jose", "" ], [ "Robles", "Gregorio", "" ], [ "Gonzalez-Barahona", "Jesus", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0506068
John Watrous
Chris Marriott and John Watrous
Quantum Arthur-Merlin Games
22 pages
Computational Complexity, 14(2): 122 - 152, 2005
null
null
cs.CC quant-ph
null
This paper studies quantum Arthur-Merlin games, which are Arthur-Merlin games in which Arthur and Merlin can perform quantum computations and Merlin can send Arthur quantum information. As in the classical case, messages from Arthur to Merlin are restricted to be strings of uniformly generated random bits. It is proved that for one-message quantum Arthur-Merlin games, which correspond to the complexity class QMA, completeness and soundness errors can be reduced exponentially without increasing the length of Merlin's message. Previous constructions for reducing error required a polynomial increase in the length of Merlin's message. Applications of this fact include a proof that logarithmic length quantum certificates yield no increase in power over BQP and a simple proof that QMA is contained in PP. Other facts that are proved include the equivalence of three (or more) message quantum Arthur-Merlin games with ordinary quantum interactive proof systems and some basic properties concerning two-message quantum Arthur-Merlin games.
[ { "version": "v1", "created": "Wed, 15 Jun 2005 22:13:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Marriott", "Chris", "" ], [ "Watrous", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0506069
Remi Monasson
Remi Monasson (LPTENS)
A generating function method for the average-case analysis of DPLL
RANDOM 2005, Berkeley, August 22-24
RANDOM 2005, Berkeley, CA, \'Etats-Unis d'Am\'erique, p.402-413
null
null
cs.CC cond-mat.dis-nn
null
A method to calculate the average size of Davis-Putnam-Loveland-Logemann (DPLL) search trees for random computational problems is introduced, and applied to the satisfiability of random CNF formulas (SAT) and the coloring of random graph (COL) problems. We establish recursion relations for the generating functions of the average numbers of (variable or color) assignments at a given height in the search tree, which allow us to derive the asymptotics of the expected DPLL tree size, 2^{N w + o(N)}, where N is the instance size. w is calculated as a function of the input distribution parameters (ratio of clauses per variable for SAT, average vertex degree for COL), and the branching heuristics.
[ { "version": "v1", "created": "Thu, 16 Jun 2005 09:17:21 GMT" } ]
2008-06-20T00:00:00
[ [ "Monasson", "Remi", "", "LPTENS" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" } ]
cs/0506070
Yuriy Chashkov
Ph.D. Yuriy A. Chashkov
Data Visualization on Shared Usage Multi-Screen Environment
4 pages, 1 figure
null
null
null
cs.MM
null
The modern multimedia technologies based on the whole palette of hardware and software facilities of real-time high-speed information processing, in a combination with effective facilities of the remote access to information resources, allow us to visualize diverse types of information. Data visualization facilities – is the face of the Automated Control System on whom often judge about their efficiency. They take a special place, providing visualization of the diverse information necessary for decision-making by a final control link - the person allocated by certain powers.
[ { "version": "v1", "created": "Thu, 16 Jun 2005 10:15:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Chashkov", "Ph. D. Yuriy A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
cs/0506071
Yuriy Reznykov
Yu. Reznykov
Signal transmission on lossy lines as a dissipative quantum state propagation
6 pages, revtex4
null
null
BTU LTP-05-06
cs.NI
null
The transmission of electric signals on a coupled line with distributed RLC-parameters is considered as a propagation of a dissipative quasi particle. A calculation technique is developed, alternative to the one, accepted for lumped lines. The relativistic wave equation for the transient response is deduced following the common Ohm-low-type considerations. The exact expressions for the Green function, for information transfer velocity and for time delay are obtained on this base. The fundamental restrictions on the measurement accuracy of the time delay are pointed out. The obtained results are naturally generalized for the multilevel networks of the arbitrary dimension.
[ { "version": "v1", "created": "Thu, 16 Jun 2005 11:40:54 GMT" }, { "version": "v2", "created": "Fri, 17 Jun 2005 07:28:35 GMT" }, { "version": "v3", "created": "Tue, 21 Jun 2005 09:31:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Reznykov", "Yu.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0506072
Jing Jiang
Jing Jiang and Krishna R. Narayanan
Performance Analysis of Algebraic Soft Decoding of Reed-Solomon Codes over Binary Symmetric and Erasure Channels
5 pages, 3 figures
null
null
null
cs.IT math.IT
null
In this paper, we characterize the decoding region of algebraic soft decoding (ASD) of Reed-Solomon (RS) codes over erasure channels and binary symmetric channel (BSC). Optimal multiplicity assignment strategies (MAS) are investigated and tight bounds are derived to show the ASD can significantly outperform conventional Berlekamp Massey (BM) decoding over these channels for a wide code rate range. The analysis technique can also be extended to other channel models, e.g., RS coded modulation over erasure channels.
[ { "version": "v1", "created": "Fri, 17 Jun 2005 02:20:52 GMT" } ]
2009-09-29T00:00:00
[ [ "Jiang", "Jing", "" ], [ "Narayanan", "Krishna R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506073
Jing Jiang
Jing Jiang and Krishna R. Narayanan
Iterative Soft Input Soft Output Decoding of Reed-Solomon Codes by Adapting the Parity Check Matrix
10 pages, 10 figures, final version accepted by IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
null
An iterative algorithm is presented for soft-input-soft-output (SISO) decoding of Reed-Solomon (RS) codes. The proposed iterative algorithm uses the sum product algorithm (SPA) in conjunction with a binary parity check matrix of the RS code. The novelty is in reducing a submatrix of the binary parity check matrix that corresponds to less reliable bits to a sparse nature before the SPA is applied at each iteration. The proposed algorithm can be geometrically interpreted as a two-stage gradient descent with an adaptive potential function. This adaptive procedure is crucial to the convergence behavior of the gradient descent algorithm and, therefore, significantly improves the performance. Simulation results show that the proposed decoding algorithm and its variations provide significant gain over hard decision decoding (HDD) and compare favorably with other popular soft decision decoding methods.
[ { "version": "v1", "created": "Fri, 17 Jun 2005 02:46:09 GMT" }, { "version": "v2", "created": "Thu, 30 Mar 2006 05:46:39 GMT" } ]
2009-09-29T00:00:00
[ [ "Jiang", "Jing", "" ], [ "Narayanan", "Krishna R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506074
Paolo Liberatore
Paolo Liberatore
Redundancy in Logic II: 2CNF and Horn Propositional Formulae
Corrected figures on Theorem 10; added and modified some references
null
10.1016/j.artint.2007.06.003
null
cs.AI cs.LO
null
We report complexity results about redundancy of formulae in 2CNF form. We first consider the problem of checking redundancy and show some algorithms that are slightly better than the trivial one. We then analyze problems related to finding irredundant equivalent subsets (I.E.S.) of a given set. The concept of cyclicity proved to be relevant to the complexity of these problems. Some results about Horn formulae are also shown.
[ { "version": "v1", "created": "Fri, 17 Jun 2005 19:28:29 GMT" }, { "version": "v2", "created": "Mon, 20 Jun 2005 15:07:15 GMT" }, { "version": "v3", "created": "Tue, 21 Jun 2005 14:16:22 GMT" } ]
2021-04-12T00:00:00
[ [ "Liberatore", "Paolo", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0506075
Lillian Lee
Bo Pang and Lillian Lee
Seeing stars: Exploiting class relationships for sentiment categorization with respect to rating scales
To appear, Proceedings of ACL 2005
null
null
null
cs.CL cs.LG
null
We address the rating-inference problem, wherein rather than simply decide whether a review is "thumbs up" or "thumbs down", as in previous sentiment analysis work, one must determine an author's evaluation with respect to a multi-point scale (e.g., one to five "stars"). This task represents an interesting twist on standard multi-class text categorization because there are several different degrees of similarity between class labels; for example, "three stars" is intuitively closer to "four stars" than to "one star". We first evaluate human performance at the task. Then, we apply a meta-algorithm, based on a metric labeling formulation of the problem, that alters a given n-ary classifier's output in an explicit attempt to ensure that similar items receive similar labels. We show that the meta-algorithm can provide significant improvements over both multi-class and regression versions of SVMs when we employ a novel similarity measure appropriate to the problem.
[ { "version": "v1", "created": "Fri, 17 Jun 2005 20:10:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Pang", "Bo", "" ], [ "Lee", "Lillian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0506076
Wojciech Mazurczyk
Wojciech Mazurczyk, Zbigniew Kotulski
Alternative security architecture for IP Telephony based on digital watermarking
10 pages, 5 figures
Lecture Notes in Computer Science 4166, pp. 170 - 181, Springer, Heidelberg 2006. ISBN 978-3-540-45762-6
null
null
cs.CR cs.MM
null
Problems with securing IP Telephony systems, insufficient standardization and lack of security mechanisms emerged the need for new approaches and solutions. In this paper a new, alternative security architecture for voice-systems is presented. It is based on digital watermarking: a new, flexible and powerful technology that is increasingly gaining more and more attention. Besides known applications e.g. to solve copyright protection problems, we propose to use digital watermarking to secure not only transmitted audio but also signaling protocol that IP Telephony is based on.
[ { "version": "v1", "created": "Sat, 18 Jun 2005 21:41:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Mazurczyk", "Wojciech", "" ], [ "Kotulski", "Zbigniew", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
cs/0506077
Kalyanarama Sesha Sayee KCV
KCV Kalyanarama Sesha Sayee and Utpal Mukherji
Stability of Scheduled Multi-access Communication over Quasi-static Flat Fading Channels with Random Coding and Independent Decoding
5 pages, 1 figure, To be presented at 2005 IEEE International Symposium on Information Theory, corrected version
null
null
null
cs.IT math.IT
null
The stability of scheduled multiaccess communication with random coding and independent decoding of messages is investigated. The number of messages that may be scheduled for simultaneous transmission is limited to a given maximum value, and the channels from transmitters to receiver are quasi-static, flat, and have independent fades. Requests for message transmissions are assumed to arrive according to an i.i.d. arrival process. Then, we show the following: (1) in the limit of large message alphabet size, the stability region has an interference limited information-theoretic capacity interpretation, (2) state-independent scheduling policies achieve this asymptotic stability region, and (3) in the asymptotic limit corresponding to immediate access, the stability region for non-idling scheduling policies is shown to be identical irrespective of received signal powers.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 07:51:33 GMT" }, { "version": "v2", "created": "Mon, 25 Jul 2005 03:56:00 GMT" }, { "version": "v3", "created": "Tue, 26 Jul 2005 12:04:15 GMT" } ]
2009-09-29T00:00:00
[ [ "Sayee", "KCV Kalyanarama Sesha", "" ], [ "Mukherji", "Utpal", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506078
David Renato Carreta Dominguez
David Dominguez, Kostadin Koroutchev, Eduardo Serrano & Francisco B. Rodriguez
Dynamical Neural Network: Information and Topology
10pg, 5fig
null
null
null
cs.IR cs.NE
null
A neural network works as an associative memory device if it has large storage capacity and the quality of the retrieval is good enough. The learning and attractor abilities of the network both can be measured by the mutual information (MI), between patterns and retrieval states. This paper deals with a search for an optimal topology, of a Hebb network, in the sense of the maximal MI. We use small-world topology. The connectivity $\gamma$ ranges from an extremely diluted to the fully connected network; the randomness $\omega$ ranges from purely local to completely random neighbors. It is found that, while stability implies an optimal $MI(\gamma,\omega)$ at $\gamma_{opt}(\omega)\to 0$, for the dynamics, the optimal topology holds at certain $\gamma_{opt}>0$ whenever $0\leq\omega<0.3$.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 14:54:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Dominguez", "David", "" ], [ "Koroutchev", "Kostadin", "" ], [ "Serrano", "Eduardo", "" ], [ "Rodriguez", "Francisco B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0506079
Ugo Dal Lago
U. Dal Lago and M. Hofmann
Quantitative Models and Implicit Complexity
29 pages
null
null
null
cs.LO cs.CC
null
We give new proofs of soundness (all representable functions on base types lies in certain complexity classes) for Elementary Affine Logic, LFPL (a language for polytime computation close to realistic functional programming introduced by one of us), Light Affine Logic and Soft Affine Logic. The proofs are based on a common semantical framework which is merely instantiated in four different ways. The framework consists of an innovative modification of realizability which allows us to use resource-bounded computations as realisers as opposed to including all Turing computable functions as is usually the case in realizability constructions. For example, all realisers in the model for LFPL are polynomially bounded computations whence soundness holds by construction of the model. The work then lies in being able to interpret all the required constructs in the model. While being the first entirely semantical proof of polytime soundness for light logi cs, our proof also provides a notable simplification of the original already semantical proof of polytime soundness for LFPL. A new result made possible by the semantic framework is the addition of polymorphism and a modality to LFPL thus allowing for an internal definition of inductive datatypes.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 16:00:10 GMT" }, { "version": "v2", "created": "Fri, 24 Jun 2005 13:20:25 GMT" }, { "version": "v3", "created": "Tue, 25 Oct 2005 15:21:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Lago", "U. Dal", "" ], [ "Hofmann", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0506080
Ugo Dal Lago
U. Dal Lago
The Geometry of Linear Higher-Order Recursion
23 pages, extended version of a paper appearing in LICS 2005 proceedings
null
null
null
cs.LO cs.CC
null
Linearity and ramification constraints have been widely used to weaken higher-order (primitive) recursion in such a way that the class of representable functions equals the class of polytime functions. We show that fine-tuning these two constraints leads to different expressive strengths, some of them lying well beyond polynomial time. This is done by introducing a new semantics, called algebraic context semantics. The framework stems from Gonthier's original work and turns out to be a versatile and powerful tool for the quantitative analysis of normalization in presence of constants and higher-order recursion.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 17:52:02 GMT" }, { "version": "v2", "created": "Wed, 4 Oct 2006 13:22:14 GMT" } ]
2009-09-29T00:00:00
[ [ "Lago", "U. Dal", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0506081
Gatis Midrijanis
Gatis Midrijanis
Three lines proof of the lower bound for the matrix rigidity
4 pages
null
null
null
cs.CC
null
The rigidity of a matrix describes the minimal number of entries one has to change to reduce matrix's rank to r. We give very simple combinatorial proof of the lower bound for the rigidity of Sylvester (special case of Hadamard) matrix that matches the best known result by de Wolf(2005) for Hadamard matrices proved by quantum information theoretical arguments.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 19:54:48 GMT" }, { "version": "v2", "created": "Mon, 20 Jun 2005 20:12:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Midrijanis", "Gatis", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0506082
Lane A. Hemaspaandra
Piotr Faliszewski and Lane A. Hemaspaandra
Open Questions in the Theory of Semifeasible Computation
null
null
null
URCS-TR-2005-872
cs.CC
null
The study of semifeasible algorithms was initiated by Selman's work a quarter of century ago [Sel79,Sel81,Sel82]. Informally put, this research stream studies the power of those sets L for which there is a deterministic (or in some cases, the function may belong to one of various nondeterministic function classes) polynomial-time function f such that when at least one of x and y belongs to L, then f(x,y) \in L \cap \{x,y\}. The intuition here is that it is saying: ``Regarding membership in L, if you put a gun to my head and forced me to bet on one of x or y as belonging to L, my money would be on f(x,y).'' In this article, we present a number of open problems from the theory of semifeasible algorithms. For each we present its background and review what partial results, if any, are known.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 22:33:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Faliszewski", "Piotr", "" ], [ "Hemaspaandra", "Lane A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0506083
Andrea Montanari
Cyril Measson, Andrea Montanari, Ruediger Urbanke
Maxwell Construction: The Hidden Bridge between Iterative and Maximum a Posteriori Decoding
29 pages, 77 ps files
null
null
null
cs.IT cond-mat.dis-nn math.IT
null
There is a fundamental relationship between belief propagation and maximum a posteriori decoding. A decoding algorithm, which we call the Maxwell decoder, is introduced and provides a constructive description of this relationship. Both, the algorithm itself and the analysis of the new decoder are reminiscent of the Maxwell construction in thermodynamics. This paper investigates in detail the case of transmission over the binary erasure channel, while the extension to general binary memoryless channels is discussed in a companion paper.
[ { "version": "v1", "created": "Tue, 21 Jun 2005 09:20:19 GMT" } ]
2007-07-13T00:00:00
[ [ "Measson", "Cyril", "" ], [ "Montanari", "Andrea", "" ], [ "Urbanke", "Ruediger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506084
Jason Holt
Jason E. Holt (BYU)
The One Page Model Checker
12 pages
null
null
null
cs.LO
null
We show how standard IPC mechanisms can be used with the fork() system call to perform explicit state model checking on all interleavings of a multithreaded application. We specifically show how to check for deadlock and race conditions in programs with two threads. Our techniques are easy to apply to other languages, and require only the most rudimentary parsing of the target language. Our fundamental system fits in one page of C code.
[ { "version": "v1", "created": "Wed, 22 Jun 2005 20:54:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Holt", "Jason E.", "", "BYU" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0506085
Jason Holt
Jason E. Holt (BYU)
On the Job Training
8 pages, submitted to NIPS 2005
null
null
null
cs.LG
null
We propose a new framework for building and evaluating machine learning algorithms. We argue that many real-world problems require an agent which must quickly learn to respond to demands, yet can continue to perform and respond to new training throughout its useful life. We give a framework for how such agents can be built, describe several metrics for evaluating them, and show that subtle changes in system construction can significantly affect agent performance.
[ { "version": "v1", "created": "Wed, 22 Jun 2005 21:21:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Holt", "Jason E.", "", "BYU" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0506086
Sudharman K. Jayaweera
Sudharman K. Jayaweera
Large System Decentralized Detection Performance Under Communication Constraints
3 pages, 2 figures, to be published in IEEE Communication Letters
null
null
null
cs.IT math.IT
null
The problem of decentralized detection in a sensor network subjected to a total average power constraint and all nodes sharing a common bandwidth is investigated. The bandwidth constraint is taken into account by assuming non-orthogonal communication between sensors and the data fusion center via direct-sequence code-division multiple-access (DS-CDMA). In the case of large sensor systems and random spreading, the asymptotic decentralized detection performance is derived assuming independent and identically distributed (iid) sensor observations via random matrix theory. The results show that, even under both power and bandwidth constraints, it is better to combine many not-so-good local decisions rather than relying on one (or a few) very-good local decisions.
[ { "version": "v1", "created": "Wed, 22 Jun 2005 22:30:30 GMT" } ]
2007-07-13T00:00:00
[ [ "Jayaweera", "Sudharman K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506087
Ryutaroh Matsumoto
Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu
Primal-dual distance bounds of linear codes with application to cryptography
6 pages, using IEEEtran.cls. To appear in IEEE Trans. Inform. Theory, Sept. 2006. Two authors were added in the revised version
IEEE Trans. Inform. Theory, vol. 52, no. 9, pp. 4251-4256, Sept. 2006
10.1109/TIT.2006.880050
null
cs.IT cs.CR math.IT
null
Let $N(d,d^\perp)$ denote the minimum length $n$ of a linear code $C$ with $d$ and $d^{\bot}$, where $d$ is the minimum Hamming distance of $C$ and $d^{\bot}$ is the minimum Hamming distance of $C^{\bot}$. In this paper, we show a lower bound and an upper bound on $N(d,d^\perp)$. Further, for small values of $d$ and $d^\perp$, we determine $N(d,d^\perp)$ and give a generator matrix of the optimum linear code. This problem is directly related to the design method of cryptographic Boolean functions suggested by Kurosawa et al.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 07:35:51 GMT" }, { "version": "v2", "created": "Mon, 12 Jun 2006 08:04:07 GMT" } ]
2007-07-13T00:00:00
[ [ "Matsumoto", "Ryutaroh", "" ], [ "Kurosawa", "Kaoru", "" ], [ "Itoh", "Toshiya", "" ], [ "Konno", "Toshimitsu", "" ], [ "Uyematsu", "Tomohiko", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506088
Olivier Rioul
Olivier Rioul
An Alternative to Huffman's Algorithm for Constructing Variable-Length Codes
This paper has been withdrawn
null
null
null
cs.IT math.IT
null
This paper has been withdrawn by the author.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 09:53:17 GMT" }, { "version": "v2", "created": "Thu, 11 Jan 2007 12:03:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Rioul", "Olivier", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506089
Patrick C. McGuire
Patrick C. McGuire, Javier Gomez-Elvira, Jose Antonio Rodriguez-Manfredi, Eduardo Sebastian-Martinez, Jens Ormo, Enrique Diaz-Martinez, Markus Oesker, Robert Haschke, Joerg Ontrup, Helge Ritter
Field geology with a wearable computer: 1st results of the Cyborg Astrobiologist System
accepted by ICINCO 2005, 2nd International Conference on Informatics in Control, Automation and Robotics, 14-17 September 2005, Barcelona, Spain. 9 pages, 7 figures
"Proceedings of the <a href="http://www.icinco.org">ICINCO</a>'2005 (International Conference on Informatics in Control, Automation and Robotics)", September 14-17, Barcelona, Spain, vol. 3, pp. 283-291 (2005).
null
null
cs.CV astro-ph cs.AI cs.CE cs.HC cs.RO
null
We present results from the first geological field tests of the `Cyborg Astrobiologist', which is a wearable computer and video camcorder system that we are using to test and train a computer-vision system towards having some of the autonomous decision-making capabilities of a field-geologist. The Cyborg Astrobiologist platform has thus far been used for testing and development of these algorithms and systems: robotic acquisition of quasi-mosaics of images, real-time image segmentation, and real-time determination of interesting points in the image mosaics. This work is more of a test of the whole system, rather than of any one part of the system. However, beyond the concept of the system itself, the uncommon map (despite its simplicity) is the main innovative part of the system. The uncommon map helps to determine interest-points in a context-free manner. Overall, the hardware and software systems function reliably, and the computer-vision algorithms are adequate for the first field tests. In addition to the proof-of-concept aspect of these field tests, the main result of these field tests is the enumeration of those issues that we can improve in the future, including: dealing with structural shadow and microtexture, and also, controlling the camera's zoom lens in an intelligent manner. Nonetheless, despite these and other technical inadequacies, this Cyborg Astrobiologist system, consisting of a camera-equipped wearable-computer and its computer-vision algorithms, has demonstrated its ability of finding genuinely interesting points in real-time in the geological scenery, and then gathering more information about these interest points in an automated manner. We use these capabilities for autonomous guidance towards geological points-of-interest.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 10:25:22 GMT" } ]
2016-08-31T00:00:00
[ [ "McGuire", "Patrick C.", "" ], [ "Gomez-Elvira", "Javier", "" ], [ "Rodriguez-Manfredi", "Jose Antonio", "" ], [ "Sebastian-Martinez", "Eduardo", "" ], [ "Ormo", "Jens", "" ], [ "Diaz-Martinez", "Enrique", "" ], [ "Oesker", "Markus", "" ], [ "Haschke", "Robert", "" ], [ "Ontrup", "Joerg", "" ], [ "Ritter", "Helge", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, null, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0506090
Tobias Riege
Tobias Riege, J\"org Rothe
An Exact 2.9416^n Algorithm for the Three Domatic Number Problem
20 pages, 1 figure
null
null
null
cs.CC
null
The three domatic number problem asks whether a given undirected graph can be partitioned into at least three dominating sets, i.e., sets whose closed neighborhood equals the vertex set of the graph. Since this problem is NP-complete, no polynomial-time algorithm is known for it. The naive deterministic algorithm for this problem runs in time 3^n, up to polynomial factors. In this paper, we design an exact deterministic algorithm for this problem running in time 2.9416^n. Thus, our algorithm can handle problem instances of larger size than the naive algorithm in the same amount of time. We also present another deterministic and a randomized algorithm for this problem that both have an even better performance for graphs with small maximum degree.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 12:58:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Riege", "Tobias", "" ], [ "Rothe", "Jörg", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0506091
Oscar Takeshita
Oscar Y. Takeshita
A New Construction for LDPC Codes using Permutation Polynomials over Integer Rings
12 pages, 4 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
A new construction is proposed for low density parity check (LDPC) codes using quadratic permutation polynomials over finite integer rings. The associated graphs for the new codes have both algebraic and pseudo-random nature, and the new codes are quasi-cyclic. Graph isomorphisms and automorphisms are identified and used in an efficient search for good codes. Graphs with girth as large as 12 were found. Upper bounds on the minimum Hamming distance are found both analytically and algorithmically. The bounds indicate that the minimum distance grows with block length. Near-codewords are one of the causes for error floors in LDPC codes; the new construction provides a good framework for studying near-codewords in LDPC codes. Nine example codes are given, and computer simulation results show the excellent error performance of these codes. Finally, connections are made between this new LDPC construction and turbo codes using interleavers generated by quadratic permutation polynomials.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 15:37:04 GMT" } ]
2007-07-13T00:00:00
[ [ "Takeshita", "Oscar Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506092
Simone Alfarano
Thomas Lux
Emergent Statistical Wealth Distributions in Simple Monetary Exchange Models: A Critical Review
null
null
null
null
cs.MA
null
This paper reviews recent attempts at modelling inequality of wealth as an emergent phenomenon of interacting-agent processes. We point out that recent models of wealth condensation which draw their inspiration from molecular dynamics have, in fact, reinvented a process introduced quite some time ago by Angle (1986) in the sociological literature. We emphasize some problematic aspects of simple wealth exchange models and contrast them with a monetary model based on economic principles of market mediated exchange. The paper also reports new results on the influence of market power on the wealth distribution in statistical equilibrium. As it turns out, inequality increases but market power alone is not sufficient for changing the exponential tails of simple exchange models into Pareto tails.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 16:46:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Lux", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0506093
Oscar Takeshita
Oscar Y. Takeshita
On Maximum Contention-Free Interleavers and Permutation Polynomials over Integer Rings
13 pages, 2 figures, submitted as a correspondence to the IEEE Transactions on Information Theory, revised version
null
10.1109/TIT.2005.864450
null
cs.IT math.IT
null
An interleaver is a critical component for the channel coding performance of turbo codes. Algebraic constructions are of particular interest because they admit analytical designs and simple, practical hardware implementation. Contention-free interleavers have been recently shown to be suitable for parallel decoding of turbo codes. In this correspondence, it is shown that permutation polynomials generate maximum contention-free interleavers, i.e., every factor of the interleaver length becomes a possible degree of parallel processing of the decoder. Further, it is shown by computer simulations that turbo codes using these interleavers perform very well for the 3rd Generation Partnership Project (3GPP) standard.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 20:30:06 GMT" }, { "version": "v2", "created": "Wed, 2 Nov 2005 00:06:31 GMT" } ]
2016-11-17T00:00:00
[ [ "Takeshita", "Oscar Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506094
Boris Ryabko
Boris Ryabko and Jaakko Astola
Universal Codes as a Basis for Nonparametric Testing of Serial Independence for Time Series
accepted for ISIT'05
null
null
null
cs.IT math.IT
null
We consider a stationary and ergodic source $p$ generated symbols $x_1 ... x_t$ from some finite set $A$ and a null hypothesis $H_0$ that $p$ is Markovian source with memory (or connectivity) not larger than $m, (m >= 0).$ The alternative hypothesis $H_1$ is that the sequence is generated by a stationary and ergodic source, which differs from the source under $H_0$. In particular, if $m= 0$ we have the null hypothesis $H_0$ that the sequence is generated by Bernoully source (or the hypothesis that $x_1 ...x_t$ are independent.) Some new tests which are based on universal codes and universal predictors, are suggested.
[ { "version": "v1", "created": "Sun, 26 Jun 2005 06:06:36 GMT" } ]
2007-07-13T00:00:00
[ [ "Ryabko", "Boris", "" ], [ "Astola", "Jaakko", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506095
Yi-Dong Shen
Y. D. Shen, Q. Yang, J. H. You and L. Y. Yuan
Deriving a Stationary Dynamic Bayesian Network from a Logic Program with Recursive Loops
29 pages
null
null
null
cs.AI cs.LG cs.LO
null
Recursive loops in a logic program present a challenging problem to the PLP framework. On the one hand, they loop forever so that the PLP backward-chaining inferences would never stop. On the other hand, they generate cyclic influences, which are disallowed in Bayesian networks. Therefore, in existing PLP approaches logic programs with recursive loops are considered to be problematic and thus are excluded. In this paper, we propose an approach that makes use of recursive loops to build a stationary dynamic Bayesian network. Our work stems from an observation that recursive loops in a logic program imply a time sequence and thus can be used to model a stationary dynamic Bayesian network without using explicit time parameters. We introduce a Bayesian knowledge base with logic clauses of the form $A \leftarrow A_1,...,A_l, true, Context, Types$, which naturally represents the knowledge that the $A_i$s have direct influences on $A$ in the context $Context$ under the type constraints $Types$. We then use the well-founded model of a logic program to define the direct influence relation and apply SLG-resolution to compute the space of random variables together with their parental connections. We introduce a novel notion of influence clauses, based on which a declarative semantics for a Bayesian knowledge base is established and algorithms for building a two-slice dynamic Bayesian network from a logic program are developed.
[ { "version": "v1", "created": "Mon, 27 Jun 2005 04:07:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Y. D.", "" ], [ "Yang", "Q.", "" ], [ "You", "J. H.", "" ], [ "Yuan", "L. Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0506096
Nicolas Baudru
Nicolas Baudru (LIF), R\'emi Morin (LIF)
Polynomial Synthesis of Asynchronous Automata
The MOdelling and VErification (MOVE) team
null
null
null
cs.CC cs.LO
null
Zielonka's theorem shows that each regular set of Mazurkiewicz traces can be implemented as a system of synchronized processes with a distributed control structure called asynchronous automaton. This paper gives a polynomial algorithm for the synthesis of a non-deterministic asynchronous automaton from a regular Mazurkiewicz trace language. This new construction is based on an unfolding approach that improves the complexity of Zielonka's and Pighizzini's techniques in terms of the number of states.
[ { "version": "v1", "created": "Mon, 27 Jun 2005 06:09:37 GMT" } ]
2016-08-16T00:00:00
[ [ "Baudru", "Nicolas", "", "LIF" ], [ "Morin", "Rémi", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0506097
Samuel Thibault
Samuel Thibault (INRIA Futurs)
A Flexible Thread Scheduler for Hierarchical Multiprocessor Machines
null
null
null
null
cs.DC
null
With the current trend of multiprocessor machines towards more and more hierarchical architectures, exploiting the full computational power requires careful distribution of execution threads and data so as to limit expensive remote memory accesses. Existing multi-threaded libraries provide only limited facilities to let applications express distribution indications, so that programmers end up with explicitly distributing tasks according to the underlying architecture, which is difficult and not portable. In this article, we present: (1) a model for dynamically expressing the structure of the computation; (2) a scheduler interpreting this model so as to make judicious hierarchical distribution decisions; (3) an implementation within the Marcel user-level thread library. We experimented our proposal on a scientific application running on a ccNUMA Bull NovaScale with 16 Intel Itanium II processors; results show a 30% gain compared to a classical scheduler, and are similar to what a handmade scheduler achieves in a non-portable way.
[ { "version": "v1", "created": "Mon, 27 Jun 2005 14:32:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Thibault", "Samuel", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0506098
Russell Martin
Petra Berenbrink, Tom Friedetzky, Leslie Ann Goldberg, Paul Goldberg, Zengjian Hu, Russell Martin
Distributed Selfish Load Balancing
null
null
null
null
cs.GT math.OC
null
Suppose that a set of $m$ tasks are to be shared as equally as possible amongst a set of $n$ resources. A game-theoretic mechanism to find a suitable allocation is to associate each task with a ``selfish agent'', and require each agent to select a resource, with the cost of a resource being the number of agents to select it. Agents would then be expected to migrate from overloaded to underloaded resources, until the allocation becomes balanced. Recent work has studied the question of how this can take place within a distributed setting in which agents migrate selfishly without any centralized control. In this paper we discuss a natural protocol for the agents which combines the following desirable features: It can be implemented in a strongly distributed setting, uses no central control, and has good convergence properties. For $m\gg n$, the system becomes approximately balanced (an $\epsilon$-Nash equilibrium) in expected time $O(\log\log m)$. We show using a martingale technique that the process converges to a perfectly balanced allocation in expected time $O(\log\log m+n^4)$. We also give a lower bound of $\Omega(\max\{\log\log m,n\})$ for the convergence time.
[ { "version": "v1", "created": "Mon, 27 Jun 2005 14:54:23 GMT" }, { "version": "v2", "created": "Mon, 22 May 2006 18:04:06 GMT" }, { "version": "v3", "created": "Mon, 2 Apr 2007 15:20:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Berenbrink", "Petra", "" ], [ "Friedetzky", "Tom", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Goldberg", "Paul", "" ], [ "Hu", "Zengjian", "" ], [ "Martin", "Russell", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
cs/0506099
Yuval Shavitt
Yuval Shavitt and Eran Shir
DIMES: Let the Internet Measure Itself
10 pages, 12 figures
null
null
null
cs.NI
null
Today's Internet maps, which are all collected from a small number of vantage points, are falling short of being accurate. We suggest here a paradigm shift for this task. DIMES is a distributed measurement infrastructure for the Internet that is based on the deployment of thousands of light weight measurement agents around the globe. We describe the rationale behind DIMES deployment, discuss its design trade-offs and algorithmic challenges, and analyze the structure of the Internet as it seen with DIMES.
[ { "version": "v1", "created": "Tue, 28 Jun 2005 20:29:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Shavitt", "Yuval", "" ], [ "Shir", "Eran", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0506100
Satu Elisa Schaeffer
Jiri Sima and Satu Elisa Schaeffer
On the NP-Completeness of Some Graph Cluster Measures
9 pages, no figures
null
null
null
cs.CC
null
Graph clustering is the problem of identifying sparsely connected dense subgraphs (clusters) in a given graph. Proposed clustering algorithms usually optimize various fitness functions that measure the quality of a cluster within the graph. Examples of such cluster measures include the conductance, the local and relative densities, and single cluster editing. We prove that the decision problems associated with the optimization tasks of finding the clusters that are optimal with respect to these fitness measures are NP-complete.
[ { "version": "v1", "created": "Wed, 29 Jun 2005 18:12:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Sima", "Jiri", "" ], [ "Schaeffer", "Satu Elisa", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0506101
Patrick Haffner
Patrick Haffner, Steven Phillips, Rob Schapire
Efficient Multiclass Implementations of L1-Regularized Maximum Entropy
13 pages, describes new conditional maxent algorithm, to be submitted
null
null
null
cs.LG cs.CL
null
This paper discusses the application of L1-regularized maximum entropy modeling or SL1-Max [9] to multiclass categorization problems. A new modification to the SL1-Max fast sequential learning algorithm is proposed to handle conditional distributions. Furthermore, unlike most previous studies, the present research goes beyond a single type of conditional distribution. It describes and compares a variety of modeling assumptions about the class distribution (independent or exclusive) and various types of joint or conditional distributions. It results in a new methodology for combining binary regularized classifiers to achieve multiclass categorization. In this context, Maximum Entropy can be considered as a generic and efficient regularized classification tool that matches or outperforms the state-of-the art represented by AdaBoost and SVMs.
[ { "version": "v1", "created": "Wed, 29 Jun 2005 20:26:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Haffner", "Patrick", "" ], [ "Phillips", "Steven", "" ], [ "Schapire", "Rob", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0506102
John B. Little
John Little, Ryan Schwarz
On $m$-dimensional toric codes
17 pages, 4 figures; typos corrected
null
null
null
cs.IT math.AC math.AG math.IT
null
Toric codes are a class of $m$-dimensional cyclic codes introduced recently by J. Hansen. They may be defined as evaluation codes obtained from monomials corresponding to integer lattice points in an integral convex polytope $P \subseteq \R^m$. As such, they are in a sense a natural extension of Reed-Solomon codes. Several authors have used intersection theory on toric surfaces to derive bounds on the minimum distance of some toric codes with $m = 2$. In this paper, we will provide a more elementary approach that applies equally well to many toric codes for all $m \ge 2$. Our methods are based on a sort of multivariate generalization of Vandermonde determinants that has also been used in the study of multivariate polynomial interpolation. We use these Vandermonde determinants to determine the minimum distance of toric codes from rectangular polytopes and simplices. We also prove a general result showing that if there is a unimodular integer affine transformation taking one polytope $P_1$ to a second polytope $P_2$, then the corresponding toric codes are monomially equivalent (hence have the same parameters). We use this to begin a classification of two-dimensional toric codes with small dimension.
[ { "version": "v1", "created": "Wed, 29 Jun 2005 21:09:37 GMT" }, { "version": "v2", "created": "Mon, 25 Jul 2005 14:15:38 GMT" } ]
2007-07-13T00:00:00
[ [ "Little", "John", "" ], [ "Schwarz", "Ryan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0506103
Aneta Zwierko
Aneta Zwierko, Zbigniew Kotulski
Security of mobile agents: a new concept of the integrity protection
11 pages, 2 figures
null
null
null
cs.CR
null
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The proposed mechanisms not only secure the compiled program, but also the data, that can be gathered during its "journey". The oldest and the simplest methods are more concentrated on integrity of the code itself and on the detection of unauthorized manipulation. Other, more advanced proposals protect not only the code but also the execution state and the collected data. The paper is divided into two parts. The first one is mostly devoted to different methods of securing the code and protecting its integrity; starting from watermarking and fingerprinting, up to methods designed specially for mobile agent systems: encrypted function, cryptographic traces, time limited black-box security, chained-MAC protocol, publicly-verifiable chained digital signatures The second part presents new concept for providing mobile agents with integrity protection, based on a zero-knowledge proof system.
[ { "version": "v1", "created": "Wed, 29 Jun 2005 22:01:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Zwierko", "Aneta", "" ], [ "Kotulski", "Zbigniew", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0506104
Miroslaw Truszczynski
Z. Lonc, M. Truszczynski
Computing minimal models, stable models and answer sets
55 pages, 1 figure. To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO cs.DS
null
We propose and study algorithms to compute minimal models, stable models and answer sets of t-CNF theories, and normal and disjunctive t-programs. We are especially interested in algorithms with non-trivial worst-case performance bounds. The bulk of the paper is concerned with the classes of 2- and 3-CNF theories, and normal and disjunctive 2- and 3-programs, for which we obtain significantly stronger results than those implied by our general considerations. We show that one can find all minimal models of 2-CNF theories and all answer sets of disjunctive 2-programs in time O(m 1.4422..^n). Our main results concern computing stable models of normal 3-programs, minimal models of 3-CNF theories and answer sets of disjunctive 3-programs. We design algorithms that run in time O(m 1.6701..^n), in the case of the first problem, and in time O(mn^2 2.2782..^n), in the case of the latter two. All these bounds improve by exponential factors the best algorithms known previously. We also obtain closely related upper bounds on the number of minimal models, stable models and answer sets a t-CNF theory, a normal t-program or a disjunctive t-program may have. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Thu, 30 Jun 2005 01:51:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Lonc", "Z.", "" ], [ "Truszczynski", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0506105
Ren-Chiun Wang
Ren-Chiun Wang, Chou-Chen Yang, Kun-Ru Mo
A protected password change protocol
null
null
null
null
cs.CR
null
Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation atacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors shall show that password guessing, denial of service and known-key attacks can work in their password change protocol. At the same time, authors shall propose a new password change protocol to withstand all the threats of security.
[ { "version": "v1", "created": "Thu, 30 Jun 2005 03:20:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Ren-Chiun", "" ], [ "Yang", "Chou-Chen", "" ], [ "Mo", "Kun-Ru", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0507001
Hirosuke Yamamoto
Hideyuki Sakai and Hirosuke Yamamoto
Asymptotically Optimal Tree-based Group Key Management Schemes
15 pages including 1 figure and 2 tables, submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT cs.CR math.IT
null
In key management schemes that realize secure multicast communications encrypted by group keys on a public network, tree structures are often used to update the group keys efficiently. Selcuk and Sidhu have proposed an efficient scheme which updates dynamically the tree structures based on the withdrawal probabilities of members. In this paper, it is shown that Selcuk-Sidhu scheme is asymptotically optimal for the cost of withdrawal. Furthermore, a new key management scheme, which takes account of key update costs of joining in addition to withdrawal, is proposed. It is proved that the proposed scheme is also asymptotically optimal, and it is shown by simulation that it can attain good performance for nonasymptotic cases.
[ { "version": "v1", "created": "Fri, 1 Jul 2005 01:07:00 GMT" } ]
2007-07-16T00:00:00
[ [ "Sakai", "Hideyuki", "" ], [ "Yamamoto", "Hirosuke", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507002
Lifeng Lai
Lifeng Lai, Ke Liu, and Hesham El Gamal
The Three Node Wireless Network: Achievable Rates and Cooperation Strategies
52 pages
null
null
null
cs.IT math.IT
null
We consider a wireless network composed of three nodes and limited by the half-duplex and total power constraints. This formulation encompasses many of the special cases studied in the literature and allows for capturing the common features shared by them. Here, we focus on three special cases, namely 1) Relay Channel, 2) Multicast Channel, and 3) Conference Channel. These special cases are judicially chosen to reflect varying degrees of complexity while highlighting the common ground shared by the different variants of the three node wireless network. For the relay channel, we propose a new cooperation scheme that exploits the wireless feedback gain. This scheme combines the benefits of decode-and-forward and compress-and-forward strategies and avoids the idealistic feedback assumption adopted in earlier works. Our analysis of the achievable rate of this scheme reveals the diminishing feedback gain at both the low and high signal-to-noise ratio regimes. Inspired by the proposed feedback strategy, we identify a greedy cooperation framework applicable to both the multicast and conference channels. Our performance analysis reveals several nice properties of the proposed greedy approach and the central role of cooperative source-channel coding in exploiting the receiver side information in the wireless network setting. Our proofs for the cooperative multicast with side-information rely on novel nested and independent binning encoders along with a list decoder.
[ { "version": "v1", "created": "Fri, 1 Jul 2005 02:36:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Lai", "Lifeng", "" ], [ "Liu", "Ke", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507003
Anwar Shiekh Dr.
A.Y. Shiekh
The role of Quantum Interference in Quantum Computing
3 pages, no figures (citation added)
Int. Jour. of Theo. Phys., 45, 1653, 2006
10.1007/s10773-005-9025-8
null
cs.CC quant-ph
null
Quantum interference is proposed as a tool to augment Quantum Computation.
[ { "version": "v1", "created": "Fri, 1 Jul 2005 16:08:23 GMT" }, { "version": "v2", "created": "Thu, 4 Aug 2005 19:47:26 GMT" }, { "version": "v3", "created": "Sun, 11 Dec 2005 17:17:13 GMT" } ]
2009-11-11T00:00:00
[ [ "Shiekh", "A. Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0507004
Markus Fidler
Markus Fidler
An End-to-End Probabilistic Network Calculus with Moment Generating Functions
null
IWQoS 2006
null
null
cs.IT cs.PF math.IT
null
Network calculus is a min-plus system theory for performance evaluation of queuing networks. Its elegance stems from intuitive convolution formulas for concatenation of deterministic servers. Recent research dispenses with the worst-case assumptions of network calculus to develop a probabilistic equivalent that benefits from statistical multiplexing. Significant achievements have been made, owing for example to the theory of effective bandwidths, however, the outstanding scalability set up by concatenation of deterministic servers has not been shown. This paper establishes a concise, probabilistic network calculus with moment generating functions. The presented work features closed-form, end-to-end, probabilistic performance bounds that achieve the objective of scaling linearly in the number of servers in series. The consistent application of moment generating functions put forth in this paper utilizes independence beyond the scope of current statistical multiplexing of flows. A relevant additional gain is demonstrated for tandem servers with independent cross-traffic.
[ { "version": "v1", "created": "Sun, 3 Jul 2005 20:02:01 GMT" }, { "version": "v2", "created": "Mon, 1 May 2006 18:54:30 GMT" } ]
2009-09-29T00:00:00
[ [ "Fidler", "Markus", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507005
Sinan Gezici
Sinan Gezici, Mung Chiang, H. Vincent Poor and Hisashi Kobayashi
A Genetic Algorithm Based Finger Selection Scheme for UWB MMSE Rake Receivers
To appear in the Proc. IEEE International Conference on Ultrawideband (ICU-2005)
null
10.1109/ICU.2005.1569977
null
cs.IT math.IT
null
Due to a large number of multipath components in a typical ultra wideband (UWB) system, selective Rake (SRake) receivers, which combine energy from a subset of multipath components, are commonly employed. In order to optimize system performance, an optimal selection of multipath components to be employed at fingers of an SRake receiver needs to be considered. In this paper, this finger selection problem is investigated for a minimum mean square error (MMSE) UWB SRake receiver. Since the optimal solution is NP hard, a genetic algorithm (GA) based iterative scheme is proposed, which can achieve near-optimal performance after a reasonable number of iterations. Simulation results are presented to compare the performance of the proposed finger selection algorithm with those of the conventional and optimal schemes.
[ { "version": "v1", "created": "Mon, 4 Jul 2005 05:08:37 GMT" } ]
2016-11-17T00:00:00
[ [ "Gezici", "Sinan", "" ], [ "Chiang", "Mung", "" ], [ "Poor", "H. Vincent", "" ], [ "Kobayashi", "Hisashi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507006
Sinan Gezici
Sinan Gezici, Zafer Sahinoglu, Andreas F. Molisch, Hisashi Kobayashi, and H. Vincent Poor
A Two-Step Time of Arrival Estimation Algorithm for Impulse Radio Ultra Wideband Systems
To appear in the Proc. of EUSIPCO 2005, Antalya, Turkey
null
null
null
cs.IT math.IT
null
High time resolution of ultra wideband (UWB) signals facilitates very precise positioning capabilities based on time-of-arrival (TOA) measurements. Although the theoretical lower bound for TOA estimation can be achieved by the maximum likelihood principle, it is impractical due to the need for extremely high-rate sampling and the presence of large number of multipath components. On the other hand, the conventional correlation-based algorithm, which serially searches possible signal delays, takes a very long time to estimate the TOA of a received UWB signal. Moreover, the first signal path does not always have the strongest correlation output. Therefore, first path detection algorithms need to be considered. In this paper, a data-aided two-step TOA estimation algorithm is proposed. In order to speed up the estimation process, the first step estimates the rough TOA of the received signal based on received signal energy. Then, in the second step, the arrival time of the first signal path is estimated by considering a hypothesis testing approach. The proposed scheme uses low-rate correlation outputs, and is able to perform accurate TOA estimation in reasonable time intervals. The simulation results are presented to analyze the performance of the estimator.
[ { "version": "v1", "created": "Mon, 4 Jul 2005 14:32:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Gezici", "Sinan", "" ], [ "Sahinoglu", "Zafer", "" ], [ "Molisch", "Andreas F.", "" ], [ "Kobayashi", "Hisashi", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507007
Ulrich Berger
Ulrich Berger
Strong normalisation for applied lambda calculi
14 pages, paper acceptet at electronic journal LMCS
Logical Methods in Computer Science, Volume 1, Issue 2 (October 5, 2005) lmcs:2267
10.2168/LMCS-1(2:3)2005
null
cs.GT
null
We consider the untyped lambda calculus with constructors and recursively defined constants. We construct a domain-theoretic model such that any term not denoting bottom is strongly normalising provided all its `stratified approximations' are. From this we derive a general normalisation theorem for applied typed lambda-calculi: If all constants have a total value, then all typeable terms are strongly normalising. We apply this result to extensions of G\"odel's system T and system F extended by various forms of bar recursion for which strong normalisation was hitherto unknown.
[ { "version": "v1", "created": "Mon, 4 Jul 2005 18:49:48 GMT" }, { "version": "v2", "created": "Tue, 5 Jul 2005 15:48:53 GMT" }, { "version": "v3", "created": "Tue, 27 Sep 2005 12:57:21 GMT" }, { "version": "v4", "created": "Wed, 28 Sep 2005 10:12:27 GMT" } ]
2017-01-11T00:00:00
[ [ "Berger", "Ulrich", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0507008
Craig Alan Feinstein
Craig Alan Feinstein
Complexity Science for Simpletons
10 pages, made a minor correction
Progress in Physics, 2006, v. 3, 35-42
null
null
cs.CC cs.GL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we shall describe some of the most interesting topics in the subject of Complexity Science for a general audience. Anyone with a solid foundation in high school mathematics (with some calculus) and an elementary understanding of computer programming will be able to follow this article. First, we shall explain the significance of the P versus NP problem and solve it. Next, we shall describe two other famous mathematics problems, the Collatz 3n+1 Conjecture and the Riemann Hypothesis, and show how both Chaitin's incompleteness theorem and Wolfram's notion of "computational irreducibility" are important for understanding why no one has, as of yet, solved these two problems.
[ { "version": "v1", "created": "Tue, 5 Jul 2005 17:03:37 GMT" }, { "version": "v2", "created": "Mon, 11 Jul 2005 19:09:39 GMT" }, { "version": "v3", "created": "Thu, 21 Jul 2005 17:11:14 GMT" }, { "version": "v4", "created": "Tue, 18 Apr 2006 02:48:39 GMT" }, { "version": "v5", "created": "Fri, 21 Apr 2006 05:17:37 GMT" }, { "version": "v6", "created": "Fri, 3 Feb 2012 19:33:53 GMT" }, { "version": "v7", "created": "Mon, 25 Jun 2012 00:09:32 GMT" } ]
2012-06-26T00:00:00
[ [ "Feinstein", "Craig Alan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
cs/0507009
Ming Zhao
Ming Zhao, Zhigang Chen, Xiaoheng Deng, Lianming Zhang, Anfeng Liu and Guosheng Huang
MAEC : A Movement-Assisted Energy Conserving Method in Event Driven Wireless Sensor Networks
IEEE International Conference on Wireless Communications, Networking and Mobile Computing, 2005, to appear
null
10.1109/TENCON.2005.301075
null
cs.NI
null
Energy is one of the most important resources in wireless sensor networks. Recently, the mobility of base station has been exploited to preserve the energy. But in event driven networks, the mobility issue is quite different from the continuous monitoring one because only a small portion of sensor node has data to send at one time. The number of sensor node that forward traffic should be minimized to prolong the network lifetime. In this paper, we propose a movement-assisted energy conserving method which tries to reduce the amount of forwarding sensor node by directing the base station to move close to the hotspots. This method achieves good performance especially when applied to a network with a set of cooperative mobile base station. Extensive simulation has been done to verify the effectiveness of the propose schema.
[ { "version": "v1", "created": "Tue, 5 Jul 2005 00:59:17 GMT" } ]
2016-11-17T00:00:00
[ [ "Zhao", "Ming", "" ], [ "Chen", "Zhigang", "" ], [ "Deng", "Xiaoheng", "" ], [ "Zhang", "Lianming", "" ], [ "Liu", "Anfeng", "" ], [ "Huang", "Guosheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0507010
Jiayang Wang
Jiayang Wang
A Study for the Feature Core of Dynamic Reduct
9 pages
null
null
null
cs.AI
null
To the reduct problems of decision system, the paper proposes the notion of dynamic core according to the dynamic reduct model. It describes various formal definitions of dynamic core, and discusses some properties about dynamic core. All of these show that dynamic core possesses the essential characters of the feature core.
[ { "version": "v1", "created": "Tue, 5 Jul 2005 13:02:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Jiayang", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0507011
Farhad Meshkati
Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz and Narayan B. Mandayam
A Utility-Based Approach to Power Control and Receiver Design in Wireless Data Networks
To appear in the IEEE Transactions on Communications
null
null
null
cs.IT math.IT
null
In this work, the cross-layer design problem of joint multiuser detection and power control is studied using a game-theoretic approach. The uplink of a direct-sequence code division multiple access (DS-CDMA) data network is considered and a non-cooperative game is proposed in which users in the network are allowed to choose their uplink receivers as well as their transmit powers to maximize their own utilities. The utility function measures the number of reliable bits transmitted by the user per joule of energy consumed. Focusing on linear receivers, the Nash equilibrium for the proposed game is derived. It is shown that the equilibrium is one where the powers are SIR-balanced with the minimum mean square error (MMSE) detector as the receiver. In addition, this framework is used to study power control games for the matched filter, the decorrelator, and the MMSE detector; and the receivers' performance is compared in terms of the utilities achieved at equilibrium (in bits/Joule). The optimal cooperative solution is also discussed and compared with the non-cooperative approach. Extensions of the results to the case of multiple receive antennas are also presented. In addition, an admission control scheme based on maximizing the total utility in the network is proposed.
[ { "version": "v1", "created": "Tue, 5 Jul 2005 15:43:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Meshkati", "Farhad", "" ], [ "Poor", "H. Vincent", "" ], [ "Schwartz", "Stuart C.", "" ], [ "Mandayam", "Narayan B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507012
Adilson Xavier V.
Gilson A. Giraldi, Adilson V. Xavier, Antonio L. Apolinario Jr, Paulo S. Rodrigues
Lattice Gas Cellular Automata for Computational Fluid Animation
null
null
null
null
cs.GR
null
The past two decades showed a rapid growing of physically-based modeling of fluids for computer graphics applications. In this area, a common top down approach is to model the fluid dynamics by Navier-Stokes equations and apply a numerical techniques such as Finite Differences or Finite Elements for the simulation. In this paper we focus on fluid modeling through Lattice Gas Cellular Automata (LGCA) for computer graphics applications. LGCA are discrete models based on point particles that move on a lattice, according to suitable and simple rules in order to mimic a fully molecular dynamics. By Chapman-Enskog expansion, a known multiscale technique in this area, it can be demonstrated that the Navier-Stokes model can be reproduced by the LGCA technique. Thus, with LGCA we get a fluid model that does not require solution of complicated equations. Therefore, we combine the advantage of the low computational cost of LGCA and its ability to mimic the realistic fluid dynamics to develop a new animating framework for computer graphics applications. In this work, we discuss the theoretical elements of our proposal and show experimental results.
[ { "version": "v1", "created": "Tue, 5 Jul 2005 19:48:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "Xavier", "Adilson V.", "" ], [ "Apolinario", "Antonio L.", "Jr" ], [ "Rodrigues", "Paulo S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/0507013
Mirela Damian
Justin Colannino, Mirela Damian, Ferran Hurtado, John Iacono, Henk Meijer, Suneeta Ramaswami and Godfried Toussaint
An O(n log n)-Time Algorithm for the Restricted Scaffold Assignment
13 pages, 8 figures
null
null
null
cs.CG cs.DM
null
The assignment problem takes as input two finite point sets S and T and establishes a correspondence between points in S and points in T, such that each point in S maps to exactly one point in T, and each point in T maps to at least one point in S. In this paper we show that this problem has an O(n log n)-time solution, provided that the points in S and T are restricted to lie on a line (linear time, if S and T are presorted).
[ { "version": "v1", "created": "Tue, 5 Jul 2005 19:50:11 GMT" }, { "version": "v2", "created": "Tue, 5 Jul 2005 21:26:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Colannino", "Justin", "" ], [ "Damian", "Mirela", "" ], [ "Hurtado", "Ferran", "" ], [ "Iacono", "John", "" ], [ "Meijer", "Henk", "" ], [ "Ramaswami", "Suneeta", "" ], [ "Toussaint", "Godfried", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0507014
Moshe Schwartz
Moshe Schwartz
Isomorphism of graphs-a polynomial test
null
null
null
null
cs.DS
null
An explicit algorithm is presented for testing whether two non-directed graphs are isomorphic or not. It is shown that for a graph of n vertices, the number of n independent operations needed for the test is polynomial in n. A proof that the algorithm actually performs the test is presented.
[ { "version": "v1", "created": "Wed, 6 Jul 2005 11:35:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Schwartz", "Moshe", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0507015
Alexander Vardy
G\'erard Cohen and Alexander Vardy
Duality between Packings and Coverings of the Hamming Space
5 pages
null
null
null
cs.IT cs.DM math.IT
null
We investigate the packing and covering densities of linear and nonlinear binary codes, and establish a number of duality relationships between the packing and covering problems. Specifically, we prove that if almost all codes (in the class of linear or nonlinear codes) are good packings, then only a vanishing fraction of codes are good coverings, and vice versa: if almost all codes are good coverings, then at most a vanishing fraction of codes are good packings. We also show that any specific maximal binary code is either a good packing or a good covering, in a certain well-defined sense.
[ { "version": "v1", "created": "Wed, 6 Jul 2005 13:01:43 GMT" } ]
2009-09-29T00:00:00
[ [ "Cohen", "Gérard", "" ], [ "Vardy", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507016
Julien Fondrevelle
Julien Fondrevelle (INRIA Lorraine - LORIA), Ammar Oulamara (INRIA Lorraine - LORIA), Marie-Claude Portmann (INRIA Lorraine - LORIA)
Minimizing makespan in flowshop with time lags
2 pages. Also available at http://hal.inria.fr/inria-00000149
Dans MAPSP'2005 [OAI: oai:hal.inria.fr:inria-00000149_v1]
null
null
cs.DM
null
We consider the problem of minimizing the makespan in a flowshop involving maximal and minimal time lags. Time lag constraints generalize the classical precedence constraints between operations. We assume that such constraints are only defined between operations of the same job. We propose a solution method and present several extensions.
[ { "version": "v1", "created": "Wed, 6 Jul 2005 15:24:55 GMT" } ]
2019-05-01T00:00:00
[ [ "Fondrevelle", "Julien", "", "INRIA Lorraine - LORIA" ], [ "Oulamara", "Ammar", "", "INRIA\n Lorraine - LORIA" ], [ "Portmann", "Marie-Claude", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0507017
Gregory Gutin
G. Gutin, A. Rafiey, A. Yeo
Minimum Cost and List Homomorphisms to Semicomplete Digraphs
8 pages
null
null
null
cs.DM
null
The following optimization problem was introduced in \cite{gutinDAM}, where it was motivated by a real-world problem in defence logistics. Suppose we are given a pair of digraphs $D,H$ and a positive cost $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$. The cost of a homomorphism $f$ of $D$ to $H$ is $\sum_{u\in V(D)}c_{f(u)}(u)$. For a fixed digraph $H$, the minimum cost homomorphism problem for $H$, MinHOMP($H$), is stated as follows: For an input digraph $D$ and costs $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$, verify whether there is a homomorphism of $D$ to $H$ and, if it exists, find such a homomorphism of minimum cost. We obtain dichotomy classifications of the computational complexity of the list homomorphism problem and MinHOMP($H$), when $H$ is a semicomplete digraph (a digraph in which every two vertices have at least one arc between them). Our dichotomy for the list homomorphism problem coincides with the one obtained by Bang-Jensen, Hell and MacGillivray in 1988 for the homomorphism problem when $H$ is a semicomplete digraph: both problems are polynomial solvable if $H$ has at most one cycle; otherwise, both problems are NP-complete. The dichotomy for \MiP is different: the problem is polynomial time solvable if $H$ is acyclic or $H$ is a cycle of length 2 or 3; otherwise, the problem is NP-hard.
[ { "version": "v1", "created": "Wed, 6 Jul 2005 18:45:50 GMT" }, { "version": "v2", "created": "Wed, 24 Aug 2005 13:31:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Rafiey", "A.", "" ], [ "Yeo", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0507018
Youngchul Sung
Youngchul Sung, Lang Tong and H. Vincent Poor
Optimal and Suboptimal Detection of Gaussian Signals in Noise: Asymptotic Relative Efficiency
To appear in the Proceedings of the SPIE Conference on Advanced Signal Processing Algorithms, Architectures and Implementations XV, San Diego, CA, Jul. 1 - Aug. 4, 2005
null
10.1117/12.620177
null
cs.IT math.IT
null
The performance of Bayesian detection of Gaussian signals using noisy observations is investigated via the error exponent for the average error probability. Under unknown signal correlation structure or limited processing capability it is reasonable to use the simple quadratic detector that is optimal in the case of an independent and identically distributed (i.i.d.) signal. Using the large deviations principle, the performance of this detector (which is suboptimal for non-i.i.d. signals) is compared with that of the optimal detector for correlated signals via the asymptotic relative efficiency defined as the ratio between sample sizes of two detectors required for the same performance in the large-sample-size regime. The effects of SNR on the ARE are investigated. It is shown that the asymptotic efficiency of the simple quadratic detector relative to the optimal detector converges to one as the SNR increases without bound for any bounded spectrum, and that the simple quadratic detector performs as well as the optimal detector for a wide range of the correlation values at high SNR.
[ { "version": "v1", "created": "Wed, 6 Jul 2005 19:05:09 GMT" } ]
2009-11-11T00:00:00
[ [ "Sung", "Youngchul", "" ], [ "Tong", "Lang", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507019
Paul M. Aoki
Paul M. Aoki and Allison Woodruff
Making Space for Stories: Ambiguity in the Design of Personal Communication Systems
10 pages
Proc. ACM SIGCHI Conf. on Human Factors in Computing Systems, Portland, OR, Apr. 2005, 181-190. ACM Press.
10.1145/1054972.1054998
null
cs.HC
null
Pervasive personal communication technologies offer the potential for important social benefits for individual users, but also the potential for significant social difficulties and costs. In research on face-to-face social interaction, ambiguity is often identified as an important resource for resolving social difficulties. In this paper, we discuss two design cases of personal communication systems, one based on fieldwork of a commercial system and another based on an unrealized design concept. The cases illustrate how user behavior concerning a particular social difficulty, unexplained unresponsiveness, can be influenced by technological issues that result in interactional ambiguity. The cases also highlight the need to balance the utility of ambiguity against the utility of usability and communicative clarity.
[ { "version": "v1", "created": "Wed, 6 Jul 2005 21:29:09 GMT" } ]
2008-04-18T00:00:00
[ [ "Aoki", "Paul M.", "" ], [ "Woodruff", "Allison", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0507020
Arnaud Durand
Arnaud Durand, Etienne Grandjean
First-order queries on structures of bounded degree are computable with constant delay
18 pages, 1 figure
null
null
null
cs.LO cs.CC
null
A bounded degree structure is either a relational structure all of whose relations are of bounded degree or a functional structure involving bijective functions only. In this paper, we revisit the complexity of the evaluation problem of not necessarily Boolean first-order queries over structures of bounded degree. Query evaluation is considered here as a dynamical process. We prove that any query on bounded degree structures is $\constantdelaylin$, i.e., can be computed by an algorithm that has two separate parts: it has a precomputation step of linear time in the size of the structure and then, it outputs all tuples one by one with a constant (i.e. depending on the size of the formula only) delay between each. Seen as a global process, this implies that queries on bounded structures can be evaluated in total time $O(f(|\phi|).(|\calS|+|\phi(\calS)|))$ and space $O(f(|\phi|).|\calS|)$ where $\calS$ is the structure, $\phi$ is the formula, $\phi(\calS)$ is the result of the query and $f$ is some function. Among other things, our results generalize a result of \cite{Seese-96} on the data complexity of the model-checking problem for bounded degree structures. Besides, the originality of our approach compared to that \cite{Seese-96} and comparable results is that it does not rely on the Hanf's model-theoretic technic (see \cite{Hanf-65}) and is completely effective.
[ { "version": "v1", "created": "Thu, 7 Jul 2005 09:40:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Durand", "Arnaud", "" ], [ "Grandjean", "Etienne", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0507021
Valmir Barbosa
Renato C. Dutra, Valmir C. Barbosa
Finding routes in anonymous sensor networks
null
Information Processing Letters 98 (2006), 139-144
10.1016/j.ipl.2006.01.001
null
cs.NI
null
We consider networks of anonymous sensors and address the problem of constructing routes for the delivery of information from a group of sensors in response to a query by a sink. In order to circumvent the restrictions imposed by anonymity, we rely on using the power level perceived by the sensors in the query from the sink. We introduce a simple distributed algorithm to achieve the building of routes to the sink and evaluate its performance by means of simulations.
[ { "version": "v1", "created": "Thu, 7 Jul 2005 16:28:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Dutra", "Renato C.", "" ], [ "Barbosa", "Valmir C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0507022
{\L}ukasz D\c{e}bowski
{\L}ukasz D\c{e}bowski
On Hilberg's Law and Its Links with Guiraud's Law
To appear in Journal of Quantitative Linguistics
Journal of Quantitative Linguistics 13(1):81-109, 2006
10.1080/09296170500500637
null
cs.CL cs.IT math.IT
null
Hilberg (1990) supposed that finite-order excess entropy of a random human text is proportional to the square root of the text length. Assuming that Hilberg's hypothesis is true, we derive Guiraud's law, which states that the number of word types in a text is greater than proportional to the square root of the text length. Our derivation is based on some mathematical conjecture in coding theory and on several experiments suggesting that words can be defined approximately as the nonterminals of the shortest context-free grammar for the text. Such operational definition of words can be applied even to texts deprived of spaces, which do not allow for Mandelbrot's ``intermittent silence'' explanation of Zipf's and Guiraud's laws. In contrast to Mandelbrot's, our model assumes some probabilistic long-memory effects in human narration and might be capable of explaining Menzerath's law.
[ { "version": "v1", "created": "Thu, 7 Jul 2005 18:53:14 GMT" } ]
2020-03-11T00:00:00
[ [ "Dȩbowski", "Łukasz", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507023
Valmir Barbosa
Luis O. Rigo Jr., Valmir C. Barbosa
Two-dimensional cellular automata and the analysis of correlated time series
null
Pattern Recognition Letters 27 (2006), 1353-1360
10.1016/j.patrec.2006.01.005
null
cs.AI
null
Correlated time series are time series that, by virtue of the underlying process to which they refer, are expected to influence each other strongly. We introduce a novel approach to handle such time series, one that models their interaction as a two-dimensional cellular automaton and therefore allows them to be treated as a single entity. We apply our approach to the problems of filling gaps and predicting values in rainfall time series. Computational results show that the new approach compares favorably to Kalman smoothing and filtering.
[ { "version": "v1", "created": "Fri, 8 Jul 2005 12:47:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Rigo", "Luis O.", "Jr." ], [ "Barbosa", "Valmir C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0507024
Anne-Marie Vercoustre
Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis), Brigitte Trousse (INRIA Rocquencourt / INRIA Sophia Antipolis), Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis)
Experiments in Clustering Homogeneous XML Documents to Validate an Existing Typology
(postprint); This version corrects a couple of errors in authors' names in the bibliography
null
null
null
cs.IR
null
This paper presents some experiments in clustering homogeneous XMLdocuments to validate an existing classification or more generally anorganisational structure. Our approach integrates techniques for extracting knowledge from documents with unsupervised classification (clustering) of documents. We focus on the feature selection used for representing documents and its impact on the emerging classification. We mix the selection of structured features with fine textual selection based on syntactic characteristics.We illustrate and evaluate this approach with a collection of Inria activity reports for the year 2003. The objective is to cluster projects into larger groups (Themes), based on the keywords or different chapters of these activity reports. We then compare the results of clustering using different feature selections, with the official theme structure used by Inria.
[ { "version": "v1", "created": "Fri, 8 Jul 2005 13:42:42 GMT" }, { "version": "v2", "created": "Tue, 9 Aug 2005 13:52:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Despeyroux", "Thierry", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Lechevallier", "Yves", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Trousse", "Brigitte", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Vercoustre", "Anne-Marie", "", "INRIA\n Rocquencourt / INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0507025
Olivier Cappe
Randal Douc (CMAP), Olivier Capp\'e (LTCI), Eric Moulines (LTCI)
Comparison of Resampling Schemes for Particle Filtering
null
Image and Signal Processing and Analysis, 2005. ISPA 2005. Proceedings of the 4th International Symposium on (2005) 64-69
null
null
cs.CE
null
This contribution is devoted to the comparison of various resampling approaches that have been proposed in the literature on particle filtering. It is first shown using simple arguments that the so-called residual and stratified methods do yield an improvement over the basic multinomial resampling approach. A simple counter-example showing that this property does not hold true for systematic resampling is given. Finally, some results on the large-sample behavior of the simple bootstrap filter algorithm are given. In particular, a central limit theorem is established for the case where resampling is performed using the residual approach.
[ { "version": "v1", "created": "Fri, 8 Jul 2005 15:14:51 GMT" } ]
2016-08-16T00:00:00
[ [ "Douc", "Randal", "", "CMAP" ], [ "Cappé", "Olivier", "", "LTCI" ], [ "Moulines", "Eric", "", "LTCI" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0507026
Qi Cheng
Qi Cheng
Hard Problems of Algebraic Geometry Codes
13 pages, No figure
null
null
null
cs.IT math.IT
null
The minimum distance is one of the most important combinatorial characterizations of a code. The maximum likelihood decoding problem is one of the most important algorithmic problems of a code. While these problems are known to be hard for general linear codes, the techniques used to prove their hardness often rely on the construction of artificial codes. In general, much less is known about the hardness of the specific classes of natural linear codes. In this paper, we show that both problems are NP-hard for algebraic geometry codes. We achieve this by reducing a well-known NP-complete problem to these problems using a randomized algorithm. The family of codes in the reductions are based on elliptic curves. They have positive rates, but the alphabet sizes are exponential in the block lengths.
[ { "version": "v1", "created": "Fri, 8 Jul 2005 16:22:52 GMT" } ]
2016-08-31T00:00:00
[ [ "Cheng", "Qi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507027
Lane A. Hemaspaandra
Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg Rothe
Anyone but Him: The Complexity of Precluding an Alternative
Preliminary version appeared in AAAI '05. Also appears as URCS-TR-2005-873
null
null
null
cs.GT cs.CC cs.MA
null
Preference aggregation in a multiagent setting is a central issue in both human and computer contexts. In this paper, we study in terms of complexity the vulnerability of preference aggregation to destructive control. That is, we study the ability of an election's chair to, through such mechanisms as voter/candidate addition/suppression/partition, ensure that a particular candidate (equivalently, alternative) does not win. And we study the extent to which election systems can make it impossible, or computationally costly (NP-complete), for the chair to execute such control. Among the systems we study--plurality, Condorcet, and approval voting--we find cases where systems immune or computationally resistant to a chair choosing the winner nonetheless are vulnerable to the chair blocking a victory. Beyond that, we see that among our studied systems no one system offers the best protection against destructive control. Rather, the choice of a preference aggregation system will depend closely on which types of control one wishes to be protected against. We also find concrete cases where the complexity of or susceptibility to control varies dramatically based on the choice among natural tie-handling rules.
[ { "version": "v1", "created": "Sat, 9 Jul 2005 18:20:00 GMT" }, { "version": "v2", "created": "Sun, 17 Jul 2005 23:01:02 GMT" }, { "version": "v3", "created": "Thu, 28 Jul 2005 15:20:07 GMT" }, { "version": "v4", "created": "Thu, 16 Mar 2006 16:51:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0507028
Robert Milson
Robert Milson, Aaron Krowne
Adapting CBPP platforms for instructional use
Will be presented at the 2005, Emory university symposium on Free Culture and the Digital Library
null
null
null
cs.DL cs.HC
null
Commons based peer-production (CBPP) is the de-centralized, net-based approach to the creation and dissemination of information resources. Underlying every CBPP system is a virtual community brought together by an internet tool (such as a web site) and structured by a specific collaboration protocol. In this talk we will argue that the value of such platforms can be leveraged by adapting them for pedagogical purposes. We report on one such recent adaptation. The Noosphere system is a web-based collaboration environment that underlies the popular Planetmath website, a collaboratively written encyclopedia of mathematics licensed under the GNU Free Documentation License (FDL). Recently, the system was used to host a graduate-level mathematics course at Dalhousie University, in Halifax, Canada. The course consisted of regular lectures and assignment problems. The students in the course collaborated on a set of course notes, encapsulating the lecture content and giving solutions of assigned problems. The successful outcome of this experiment demonstrated that a dedicated Noosphere system is well suited for classroom applications. We argue that this ``proof of concept'' experience also strongly suggests that every successful CBPP platform possesses latent pedagogical value.
[ { "version": "v1", "created": "Sun, 10 Jul 2005 19:05:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Milson", "Robert", "" ], [ "Krowne", "Aaron", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0507029
Samuel Landau
Samuel Landau (INRIA Futurs), Olivier Sigaud (LIP6), Marc Schoenauer (INRIA Futurs)
ATNoSFERES revisited
null
Dans Proceedings of the Genetic and Evolutionary Computation Conference, GECCO-2005 [OAI: oai:hal.inria.fr:inria-00000158_v1] - http://hal.inria.fr/inria-00000158
null
null
cs.AI
null
ATNoSFERES is a Pittsburgh style Learning Classifier System (LCS) in which the rules are represented as edges of an Augmented Transition Network. Genotypes are strings of tokens of a stack-based language, whose execution builds the labeled graph. The original ATNoSFERES, using a bitstring to represent the language tokens, has been favorably compared in previous work to several Michigan style LCSs architectures in the context of Non Markov problems. Several modifications of ATNoSFERES are proposed here: the most important one conceptually being a representational change: each token is now represented by an integer, hence the genotype is a string of integers; several other modifications of the underlying grammar language are also proposed. The resulting ATNoSFERES-II is validated on several standard animat Non Markov problems, on which it outperforms all previously published results in the LCS literature. The reasons for these improvement are carefully analyzed, and some assumptions are proposed on the underlying mechanisms in order to explain these good results.
[ { "version": "v1", "created": "Mon, 11 Jul 2005 13:11:25 GMT" } ]
2019-05-01T00:00:00
[ [ "Landau", "Samuel", "", "INRIA Futurs" ], [ "Sigaud", "Olivier", "", "LIP6" ], [ "Schoenauer", "Marc", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0507030
G\"unter Rote
Imre Barany and Guenter Rote
Strictly convex drawings of planar graphs
20 pages, 13 figures. to be published in Documenta Mathematica. The revision includes numerous small additions, corrections, and improvements, in particular: - a discussion of the constants in the O-notation, after the statement of thm.1. - a different set-up and clarification of the case distinction for Lemma 1
DOCUMENTA MATHEMATICA, Vol. 11 (2006), 369-391
null
null
cs.CG cs.DM
null
Every three-connected planar graph with n vertices has a drawing on an O(n^2) x O(n^2) grid in which all faces are strictly convex polygons. These drawings are obtained by perturbing (not strictly) convex drawings on O(n) x O(n) grids. More generally, a strictly convex drawing exists on a grid of size O(W) x O(n^4/W), for any choice of a parameter W in the range n<W<n^2. Tighter bounds are obtained when the faces have fewer sides. In the proof, we derive an explicit lower bound on the number of primitive vectors in a triangle.
[ { "version": "v1", "created": "Mon, 11 Jul 2005 20:06:06 GMT" }, { "version": "v2", "created": "Wed, 21 Jun 2006 10:01:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Barany", "Imre", "" ], [ "Rote", "Guenter", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0507031
Misha Stepanov
M. G. Stepanov, M. Chertkov
The error-floor of LDPC codes in the Laplacian channel
43rd Allerton Conference (September 28-30, 2005, Allerton, IL)
null
null
LA-UR-05-5131
cs.IT cond-mat.dis-nn math.IT
null
We analyze the performance of Low-Density-Parity-Check codes in the error-floor domain where the Signal-to-Noise-Ratio, s, is large, s >> 1. We describe how the instanton method of theoretical physics, recently adapted to coding theory, solves the problem of characterizing the error-floor domain in the Laplacian channel. An example of the (155,64,20) LDPC code with four iterations (each iteration consisting of two semi-steps: from bits-to-checks and from checks-to-bits) of the min-sum decoding is discussed. A generalized computational tree analysis is devised to explain the rational structure of the leading instantons. The asymptotic for the symbol Bit-Error-Rate in the error-floor domain is comprised of individual instanton contributions, each estimated as ~ \exp(-l_{inst;L} s), where the effective distances, l_{inst;L}, of the the leading instantons are 7.6, 8.0 and 8.0 respectively. (The Hamming distance of the code is 20.) The analysis shows that the instantons are distinctly different from the ones found for the same coding/decoding scheme performing over the Gaussian channel. We validate instanton results against direct simulations and offer an explanation for remarkable performance of the instanton approximation not only in the extremal, s -> \infty, limit but also at the moderate s values of practical interest.
[ { "version": "v1", "created": "Tue, 12 Jul 2005 02:02:23 GMT" }, { "version": "v2", "created": "Mon, 3 Oct 2005 17:33:02 GMT" } ]
2007-07-13T00:00:00
[ [ "Stepanov", "M. G.", "" ], [ "Chertkov", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]